Powered by Deep Web Technologies
Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Image, Incorporated : a study of securities buildings in Seoul, Korea  

E-Print Network [OSTI]

This study deals with the images of corporate high-rises in Seoul, Korea, the main city of a rapidly growing industrial nation. The questions explored concern mainly the images of office high-rises. Five multi-story ...

Chang, Ji-in

1992-01-01T23:59:59.000Z

2

Electricity-generation mix considering energy security and carbon emission mitigation: Case of Korea and Mongolia  

Science Journals Connector (OSTI)

Abstract To compare electricity-generation fuel mixes in two countries with multiple energy policy goals and unique circumstances, we look at three scenarios reflecting the carbon emissions mitigation targets, differences in energy security levels, and electricity-generating costs of each nation. Korea and Mongolia show clear differences in electricity-generation structure related to import dependency, the potential of renewable energy, and threats to energy security. These variations lead to different decisions on the power-generation fuel mix plan. Use of fossil fuel resources in Korea results in carbon dioxide emissions and energy insecurity, while in Mongolia carbon emissions, also from fossil fuels, and energy insecurity are separate concerns as Mongolia domestically operates coal-fired power plants and imports electricity. Policies targeting two objectives, carbon emissions mitigation and energy security improvement, show complementarity in Korea as fossil fuels are replaced by renewables or nuclear power, but represent trade-offs in Mongolia as emissions mitigation and improved energy security cannot be achieved with one strategy. In conclusion, national plans to achieve two goals differ by country: In Korea, the appropriate portion of nuclear energy is the determining policy factor. In Mongolia, carbon capture and storage is the clear alternative for mitigating carbon emissions despite large renewables potential.

Hanee Ryu; Shonkhor Dorjragchaa; Yeonbae Kim; Kyunam Kim

2014-01-01T23:59:59.000Z

3

Deutsche Hochschulen Eine Erfolgsgeschichte  

E-Print Network [OSTI]

Deutsche Hochschulen Eine Erfolgsgeschichte mit Tradition Die deutschen Hochschulen genieĂ?en welt innovativ Deutsche Hochschulen geben bedeutende Impulse fĂŒr Inno vation und Fortschritt. Ă?ber 80 deutsche gleichberechtigte Partnerschaften auf. Wer sind wir? Der Deutsche Akademische Austauschdienst (DAAD) ist die

Steinhoff, Heinz-JĂŒrgen

4

Energy demand and supply, energy policies, and energy security in the Republic of Korea  

Science Journals Connector (OSTI)

The Republic of Korea (ROK) has enjoyed rapid economic growth and development over the last 30 years. Rapid increases in energy use—especially petroleum, natural gas, and electricity, and especially in the industrial and transport sectors—have fueled the ROK's economic growth, but with limited fossil fuel resources of its own, the result has been that the ROK is almost entirely dependent on energy imports. The article that follows summarizes the recent trends in the ROK energy sector, including trends in energy demand and supply, and trends in economic, demographic, and other activities that underlie trends in energy use. The ROK has been experiencing drastic changes in its energy system, mainly induced by industrial, supply security, and environmental concerns, and energy policies in the ROK have evolved over the years to address such challenges through measures such as privatization of energy-sector activities, emphases on enhancing energy security through development of energy efficiency, nuclear power, and renewable energy, and a related focus on reducing greenhouse gas emissions. The assembly of a model for evaluating energy futures in the ROK (ROK2010 LEAP) is described, and results of several policy-based scenarios focused on different levels of nuclear energy utilization are described, and their impacts on of energy supply and demand in the ROK through the year 2030 are explored, along with their implications for national energy security and long-term policy plans. Nuclear power continues to hold a crucial position in the ROK's energy policy, but aggressive expansion of nuclear power alone, even if possible given post-Fukushima global concerns, will not be sufficient to attain the ROK's “green economy” and greenhouse gas emissions reduction goals.

Hoseok Kim; Eui-soon Shin; Woo-jin Chung

2011-01-01T23:59:59.000Z

5

LTERE DEUTSCHE LITERATUR ...............S. 1 FACHDIDAKTIK DEUTSCH ...............S. 8  

E-Print Network [OSTI]

Inhalt: �LTERE DEUTSCHE LITERATUR ...............S. 1 FACHDIDAKTIK DEUTSCH ...............S. 8 NEUERE DEUTSCHE LITERATUR ...............S. 13 �LTERE DEUTSCHE LITERATUR �DL I �ltere deutsche Literatur Mo, 10:15 ­ 11:45 Uhr HS OpWsches Museum, CZ 12 J

Rossak, Wilhelm R.

6

Zeitunglesen in der Zweitsprache Deutsch.  

E-Print Network [OSTI]

??Die Masterarbeit „Zeitunglesen in der Zweitsprache Deutsch“ stellt die lösungsorientierte Frage, inwieweit SchülerInnen mit Deutsch als Zweitsprache, die eine Haupt- oder Neue Mittelschule besuchen, mithilfe… (more)

Harter, Sonja

2013-01-01T23:59:59.000Z

7

Assicurativo | Bancario | Finanziario DEUTSCHE BANK  

E-Print Network [OSTI]

Assicurativo | Bancario | Finanziario DEUTSCHE BANK CHI SIAMO Deutsche Bank, fondata nel 1870 clientela di standing elevato e crea valore con le sue attivitĂ  per gli azionisti e il personale. Deutsche Finanza & Futuro Banca. Deutsche Bank Ăš inoltre presente sul mercato italiano con le attivitĂ  di

Schettini, Raimondo

8

Deutsche Forschungsgemeinschaft Informationen fr die Wissenschaft  

E-Print Network [OSTI]

Deutsche Forschungsgemeinschaft Informationen fĂŒr die Wissenschaft Deutsche Forschungsgemeinschaft "Homotopy Theory and Algebraic Geometry" (SPP 1786) In March 2014 the Senate of Deutsche

Richter, Birgit

9

Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS  

E-Print Network [OSTI]

PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

Kim, Kwangjo

10

Nonlocality improves Deutsch algorithm  

E-Print Network [OSTI]

Recently, [{arXiv:0810.3134}] is accepted and published. We show that the Bell inequalities lead to a new type of linear-optical Deutsch algorithms. We have considered a use of entangled photon pairs to determine simultaneously and probabilistically two unknown functions. The usual Deutsch algorithm determines one unknown function and exhibits a two to one speed up in a certain computation on a quantum computer rather than on a classical computer. We found that the violation of Bell locality in the Hilbert space formalism of quantum theory predicts that the proposed {\\it probabilistic} Deutsch algorithm for computing two unknown functions exhibits at least a $2\\sqrt{2}(\\simeq 2.83)$ to one speed up.

Koji Nagata; Sangkyung Lee; Jaewook Ahn

2007-03-15T23:59:59.000Z

11

Deutsch and Jozsa's Algorithm Revisited  

E-Print Network [OSTI]

A classical analogue of Deutsch and Jozsa's algorithm is given and its implications on quantum computing is discussed

John W. Cooper

2006-03-27T23:59:59.000Z

12

Deutsches Forschungszentrum fr Knstliche Intelligenz  

E-Print Network [OSTI]

Deutsches Forschungszentrum fĂŒr KĂŒnstliche Intelligenz 10-jĂ€hriges DienstjubilĂ€um PD Dr. Erica Melis / Tell DFKI SaarbrĂŒcken 01. September 2010 #12;Deutsches Forschungszentrum fĂŒr, die DFG und die EuropĂ€ische Union. PD Dr. Erica Melis / Tell #12;Deutsches

Melis, Erica

13

Citizens' social media use and homeland security information policy: Some evidences from Twitter users during the 2013 North Korea nuclear test  

Science Journals Connector (OSTI)

Abstract In the era of Web 2.0, managing risk communication on social networking sites has increasingly become crucial and complicated issues in the field of homeland security. The response to the 2013 nuclear test in North Korea was largely based on a coordinated effort by Korea's Ministry of Defense, the United Nations, and many countries from around the globe. By analyzing risk communication networks emerged from Twitter users for the period from January 30 to February 24, 2013, this study investigates the way in which citizens' risk communication is formulated through social media and how they transmit risk information in homeland security. Analysis results show the dynamic evolution of risk communication networks based on influential actors with critical information who played pivotal roles in distributing this information to other actors.

Kyujin Jung; Han Woo Park

2014-01-01T23:59:59.000Z

14

Die deutsche EntwicklungspolitikDie deutsche Entwicklungspolitik Prof. Dr. Hartmut Ihne  

E-Print Network [OSTI]

Die deutsche EntwicklungspolitikDie deutsche Entwicklungspolitik Prof. Dr. Hartmut Ihne 16 Soziologie Quelle: BMZ #12;Deutsche Akteuredimension Staatliche Akteure Parlament: AWZ + andere Ressorts Institut fĂŒr Politische Wissenschaft und Soziologie #12;Struktur deutsche EZ 1 Vorlesung ,,Aktuelle

Franz, Sven Oliver

15

Kinderzahnheilkunde Terminologievergleich Deutsch-Serbisch.  

E-Print Network [OSTI]

??Das Thema meiner Diplomarbeit lautet „Kinderzahnheilkunde Terminologievergleich Deutsch-Serbisch“. Die Arbeit ist in drei Teile aufgeteilt: in einen soziologischen, einen medizinischen und einen Terminologieteil. Der Schwerpunkt… (more)

Dobric, Sandra

2009-01-01T23:59:59.000Z

16

Beispielprfung Fach: Deutsch: Textwiedergabe/produktive Aufgabe  

E-Print Network [OSTI]

BeispielprĂŒfung Fach: Deutsch: Textwiedergabe/produktive Aufgabe Kurs: T Hilfsmittel: einsprachiges Hybridantrieb. Gerade geht das erste deutsche Hybridauto mit der Verbindung von Elektro- und Benzinmotor

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

17

Deutsche Bank Deutsche Bank S.p.A. la consociata italiana di Deutsche Bank AG che, con oltre  

E-Print Network [OSTI]

Deutsche Bank Deutsche Bank S.p.A. Ăš la consociata italiana di Deutsche Bank AG che, con oltre 100.000 collaboratori in piĂč di 72 Paesi nel mondo, vanta piĂč di 24 milioni di clienti. Deutsche Bank ricerca brillanti

Robbiano, Lorenzo

18

N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Sprachzeugnis fr deutsche Bewerber  

E-Print Network [OSTI]

N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Sprachzeugnis fĂŒr deutsche Bewerber Name Internationales Outgoings #12;N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Common Reference Levels

Kaus, Boris

19

Erstes deutsch-israelisches Masterprogramm Das erste deutsch-israelische Studienprogramm mit einem einheitlichen  

E-Print Network [OSTI]

Erstes deutsch-israelisches Masterprogramm Das erste deutsch-israelische Studienprogramm mit einem einheitlichen Masterabschluss wird im akademischen Jahr 2014/2015 eingefĂŒhrt. Deutsche und israelische

Heermann, Dieter W.

20

A Cavity QED Implementation of Deutsch-Jozsa Algorithm  

E-Print Network [OSTI]

The Deutsch-Jozsa algorithm is a generalization of the Deutsch algorithm which was the first algorithm written. We present schemes to implement the Deutsch algorithm and the Deutsch-Jozsa algorithm via cavity QED.

E. S. Guerra

2004-10-23T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

DECAN Deutsche CanSat Hhenrakete  

E-Print Network [OSTI]

DECAN ­ Deutsche CanSat Höhenrakete Department of Aeronautics and Astronautics Chair of Space Sheet Technische UniversitÀt Berlin Department of Aeronautics and Astronautics #12;The "DECAN ­ Deutsche

Berlin,Technische UniversitÀt

22

Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002  

E-Print Network [OSTI]

1 Seite 1 Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 Martin Dohlus Deutsches.1 W monopole single passage losses #12;2 Seite 2 Martin Dohlus Deutsches Elektronen Synchrotron rissen T > 70K >70K Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 3.3.2 foreseen in tdr #12

23

Ivan H. Deutsch Professor, Regents Lecturer  

E-Print Network [OSTI]

Ivan H. Deutsch Professor, Regents Lecturer CURRICULUM VITAE, October 2013 Dept. of Physics journals: 1. G. Bekefi, J. S. Wurtele, and I. H. Deutsch, "Free-electron laser radiation induced by a periodic dielectric medium", Physical Review A 34, 1228 (1986). 2. I. H. Deutsch and J. C. Garrison

Deutsch, Ivan H.

24

Deutsche Priorittsanmeldung; Internationale Patentanmeldung (PCT), EP Kondensator  

E-Print Network [OSTI]

Deutsche PrioritĂ€tsanmeldung; Internationale Patentanmeldung (PCT), EP TM 420 Kondensator mit Technology Access offered by Hessische Intellectual Property Organisation #12; Deutsche PrioritĂ€tsanmeldung als Sensor fĂŒr chemische Substanzen Patentstatus Deutsche PrioritĂ€tsanmeldung wurde im Nov. 2009

Haller-Dintelmann, Robert

25

Deutsch als Zweitsprache in der Lehrerausbildung  

E-Print Network [OSTI]

Deutsch als Zweitsprache in der Lehrerausbildung Bedarf ­ Umsetzung ­ Perspektiven Dokumentation. Jörg Roche, Ludwig-Maximilians-UniversitĂ€t MĂŒnchen Deutsch als Zweitsprache in der Lehrerausbildung Deutsch als Fremdsprache, Ludwig- Maximilians-UniversitĂ€t MĂŒnchen Wie wird die QualitĂ€t der Da

Prediger, Susanne

26

Deutsches Elektronen-Synchrotron DESY Interne Verffentlichung  

E-Print Network [OSTI]

Deutsches Elektronen-Synchrotron DESY Interne Veröffentlichung DESY-Rundschreiben Nr.: 45/2006 DESY- Gemeinschaft, unterzeichnet wurde, unterstĂŒtzt das Deutsche Elektronen-Synchrotron die Open- Access research organizations, the Helmholtz Association among them, the Deutsches Elektronen-Synchrotron supports

27

Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)  

E-Print Network [OSTI]

Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro�en Einfluss auf eine Vielzahl zellulÀ- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte SpermienmotilitÀt. #12; Deutsches

Haller-Dintelmann, Robert

28

Deutsch Algorithm on Classical Circuits  

E-Print Network [OSTI]

The well-known Deutsch Algorithm (DA) and Deutsch-Jozsha Algorithm (DJA) both are used as an evidence to the power of quantum computers over classical computation mediums. In these theoretical experiments, it has been shown that a quantum computer can find the answer with certainty within a few steps although classical electronic systems must evaluate more iterations than quantum computer. In this paper, it is shown that a classical computation system formed by using ordinary electronic parts may perform the same task with equal performance than quantum computers. DA and DJA quantum circuits act like an analog computer, so it is unfair to compare the bit of classical digital computers with the qubit of quantum computers. An analog signal carrying wire will of course carry more information that a bit carrying wire without serial communication protocols.

Osman Kaan Erol

2008-03-21T23:59:59.000Z

29

A Generalization of Deutsch's Example  

E-Print Network [OSTI]

Quantum parallelism is the main feature of quantum computation. In 1985 D. Deutsch showed that a single quantum computation may be sufficient to state whether a two-valued function of a two-valued variable is constant or not. Though the generalized problem with unconstrained domain and range size admits no deterministic quantum solution, a fully probabilistic quantum algorithm is presented in which quantum parallelism is harnessed to achieve a quicker exploration of the domain with respect to the classical ``sampling'' strategy.

Giovanni Costantini; Fabrizio Smeraldi

1997-02-07T23:59:59.000Z

30

Soziale Beziehungen und Unterrichtsklima im Deutsch als Fremdsprache–/Deutsch als Zweitsprache–Unterricht.  

E-Print Network [OSTI]

??In der vorliegenden Arbeit wird das Konzept „Klima“ in Bezug auf den Deutsch als Fremdsprache–/Deutsch als Zweitsprache–Unterricht untersucht. Es wird dargestellt, welchen Stellenwert ein positives… (more)

Tischler, Christina

2013-01-01T23:59:59.000Z

31

Märchenfilme im Unterricht Deutsch als Fremdsprache.  

E-Print Network [OSTI]

??Diese Masterarbeit befasst sich mit dem Einsatz von Märchenfilmen im Unterricht Deutsch als Fremdsprache und versucht folgende Fragen zu beantworten: Welches Potential stellen Märchenfilme für… (more)

Serdinsky, Andrea

2014-01-01T23:59:59.000Z

32

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

33

Adiabatic Quantum Computation and Deutsch's Algorithm  

E-Print Network [OSTI]

We show that by a suitable choice of a time dependent Hamiltonian, Deutsch's algorithm can be implemented by an adiabatic quantum computer. We extend our analysis to the Deutsch-Jozsa problem and estimate the required running time for both global and local adiabatic evolutions.

Saurya Das; Randy Kobes; Gabor Kunstatter

2001-11-06T23:59:59.000Z

34

Deutsch-Amerikanische Gesellschaft Siegerland-Wittgenstein e.V.  

E-Print Network [OSTI]

Deutsch-Amerikanische Gesellschaft Siegerland-Wittgenstein e.V. Vorstand: Jeane Freifrau von. 116 576 0 BLZ 370 700 24 Deutsche Bank Der Amerika Haus e.V. NRW lÀdt in Kooperation mit der Deutsch Frankfurter Rundschau. Der Vortrag findet auf Deutsch statt. Der Eintritt ist frei. Wir danken der DAG

Siegen, UniversitÀt

35

Österreichisches Deutsch in Lehrbüchern der Sekundarstufe I für Deutsch als Muttersprache.  

E-Print Network [OSTI]

??Bei der vorliegenden Diplomarbeit handelt es sich um eine exemplarische Studie, welche sich mit dem österreichischen Deutsch und der Einbeziehung desselben als nationale Varietät der… (more)

Heinrich, Ilona Elisabeth

2010-01-01T23:59:59.000Z

36

Deutsches Windenergie Institut | Open Energy Information  

Open Energy Info (EERE)

Deutsches Windenergie Institut Deutsches Windenergie Institut Jump to: navigation, search Logo: Deutsches Windenergie Institut Name Deutsches Windenergie Institut Address Ebertstrasse 96 D-26382 Place Wilhelmshaven, Germany Year founded 1990 Phone number +49 (0) 4421 4808 0 Coordinates 53.5180401°, 8.1191847° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":53.5180401,"lon":8.1191847,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

37

Energy Security for North Korea  

Science Journals Connector (OSTI)

...and quite possibly less, is actually operable today (9). Of this, about 3.9 GWe...depending on the season and availability of operable supply. The thermal (fossil fuel-based...for the DPRK's one operating major refinery. Since the end of heavy fuel oil shipments...

David Von Hippel; Peter Hayes

2007-06-01T23:59:59.000Z

38

28. Jahrgang Juli Juristen lehren deutsches Recht in Moskau 3  

E-Print Network [OSTI]

28. Jahrgang Juli 2003 Juristen lehren deutsches Recht in Moskau 3 Zehn Jahre Partnerschaft mit Uni Regensburger Studenten im deutsch- tschechischen Koordinierungsrat 8 17. Ostbayerische Kulturtage in Amberg 9

Schubart, Christoph

39

Teilnehmer des deutsch-ukrainisch-polnischen Seminars in Tscherniwzi 2012  

E-Print Network [OSTI]

Teilnehmer des deutsch-ukrainisch-polnischen Seminars in Tscherniwzi 2012 BAYHOST & die Ukraine. Gefördert durch den DAAD veranstaltete BAYHOST zwei Deutsch - Ukrainische Seminare, die sich dem Thema

Schubart, Christoph

40

An Illustration of the Deutsch-Josza Algorithm Frank Rioux  

E-Print Network [OSTI]

An Illustration of the Deutsch-Josza Algorithm Frank Rioux Emeritus Professor of Chemistry CSB of this circuit (Deutsch-Josza algoritm) answers the question of whether the function is constant or balanced

Rioux, Frank

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux  

E-Print Network [OSTI]

An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux Emeritus Professor of Chemistry CSB of this circuit (Deutsch-Jozsa algoritm, p. 298 in The Quest for the Quantum Computer, by Julian Brown) answers

Rioux, Frank

42

Englische Titelbezeichnungen fr die Antragstellung Deutsch Englisch (USA) Englisch (GB)  

E-Print Network [OSTI]

Englische Titelbezeichnungen fĂŒr die Antragstellung Deutsch Englisch (USA) Englisch (GB/Professor auĂ?erplanmĂ€Ă?iger Professor (Privatdozent, Akademischer Rat) Adjunct Professor Adjunct Professor Deutsch Englisch

Rostock, UniversitÀt

43

Quantum Algorithm for Generalized Deutsch-Jozsa Problem  

E-Print Network [OSTI]

We generalize the Deutsch-Jozsa problem and present a quantum algorithm that can solve the generalized Deutsch-Jozsa problem by a single evaluation of a given function. We discuss the initialization of an auxiliary register and present a generalized Deutsch-Jozsa algorithm that requires no initialization of an auxiliary register.

Dong Pyo Chi; Jinsoo Kim; Soojoon Lee

2000-05-16T23:59:59.000Z

44

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Wissenschaftliche Mitarbeiterin (w/m) in Teilzeit (27,3 Std./W.) DESY Das Deutsche Elektronen-Synchrotron DESY ist E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung | Kennziffer: EM124/2014 NotkestraĂ?e

45

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Ingenieurin (w/m) der Elektrotechnik fĂŒr die Leitung der Elektronikfertigung DESY Das Deutsche Elektronen mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

46

Prfungsordnung fr die Deutsche Sprachprfung fr den Hochschulzugang  

E-Print Network [OSTI]

1 PrĂŒfungsordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang auslĂ€ndischer Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang auslĂ€ndischer Studienbewerber als Satzung hinreichende deutsche Sprachkenntnisse nachweisen. Dies gilt auch fĂŒr Bewerber mit deutscher

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

47

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Engineer (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂŒhrenden Zentren Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

48

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Produktdesignerin (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂŒhrenden uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen

49

Herausgeber: Deutsche Forschungsgemeinschaft http://www.dfg.de  

E-Print Network [OSTI]

#12;Herausgeber: Deutsche Forschungsgemeinschaft http://www.dfg.de Ă?berreicht durch: Den. Christopher H. Baum Forschungsdekan der MHH #12;http://www.mh-hannover.de/forschung.html Deutsche 'Selbstkontrolle in der Wissenschaft' (Deutsch) #12;Empfehlungen der Kommission "Selbstkontrolle in der

Manstein, Dietmar J.

50

Implementation of Deutsch's Algorithm Using Mathcad Frank Rioux  

E-Print Network [OSTI]

Implementation of Deutsch's Algorithm Using Mathcad Frank Rioux The following is a Mathcad implementation of David Deutsch's quantum computer prototype as presented on pages 10-11 in "Machines, Logic and Quantum Physics" by David Deutsch, Artur Ekert, and Rossella Lupacchini, which can be found at ar

Rioux, Frank

51

Fachprfungsordnung fr den Bachelor-Teilstudiengang Deutsch als Fremdsprache  

E-Print Network [OSTI]

FachprĂŒfungsordnung fĂŒr den Bachelor-Teilstudiengang Deutsch als Fremdsprache an der Ernst Bachelor-Teilstudiengang Deutsch als Fremd- sprache als Satzung: Inhaltsverzeichnis § 1 Geltungsbereich § 2- Teilstudiengang Deutsch als Fremdsprache. ErgĂ€nzend gilt die Gemeinsa- me PrĂŒfungsordnung fĂŒr Bachelor- und Master

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

52

Ordnung fr die Studienbegleitende Ausbildung Deutsch als Zweitsprache  

E-Print Network [OSTI]

Ordnung fĂŒr die Studienbegleitende Ausbildung Deutsch als Zweitsprache an der UniversitĂ€t Literaturwissenschaften der UniversitĂ€t Regensburg bietet die studienbegleitende Ausbildung Deutsch als Zweitsprache (im Fachbereichs Deutschs als Zweitsprache zu einer UnterrichtstĂ€tigkeit in diesem Bereich zu befĂ€higen. (3) 1 Die

Schubart, Christoph

53

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Studentische IT-HilfskrÀfte (w/m) 1st-Level-Support DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen

54

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Beamline Ingenieurin (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂŒhrenden mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

55

Jessen/Deutsch, "Optical Lattices" 1 OPTICAL LATTICES  

E-Print Network [OSTI]

Jessen/Deutsch, "Optical Lattices" 1 OPTICAL LATTICES P. S. JESSEN Optical Sciences Center@rhea.opt-sci.arizona.edu I. H. DEUTSCH Center for Advanced Studies University of New Mexico Albuquerque, NM, 87131 Phone, 1996). #12;Jessen/Deutsch, "Optical Lattices" 2 CONTENTS I. Introduction

Jessen, Poul S.

56

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Sachbearbeiterin Kreditoren (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂŒhrenden Kindergarten. Wir freuen uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches

57

A GENERALIZATION OF THE DEUTSCH-JOZSA QUANTUM ALGORITHM  

E-Print Network [OSTI]

A GENERALIZATION OF THE DEUTSCH-JOZSA QUANTUM ALGORITHM Randall R. Holmes and Frederic Texier of functions on a finite abelian group. The algorithm is patterned after and generalizes one due to Deutsch of the integers modulo two. The Deutsch-Jozsa algorithm is a quantum algorithm for distinguishing between two

Tam, Tin-Yau

58

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein/m) NanoLab (SEM/Mikroskopie) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

59

A Simple Solution to Deutsch's Problem Frank Rioux  

E-Print Network [OSTI]

A Simple Solution to Deutsch's Problem Frank Rioux Emeritus Professor of Chemistry CSB. From the classical perspective, if the question (as asked by Deutsch) is whether f(x) is constant or balanced then one must calculate both f(0) and f(1) to answer the question. Deutsch pointed out

Rioux, Frank

60

Deutsche Sommerschule am Pazifik Application Instructions --5-week program  

E-Print Network [OSTI]

Deutsche Sommerschule am Pazifik Application Instructions -- 5-week program Enclosed is your application for the 5-week program of the Deutsche Sommerschule am Pazifik, including a scholarship that these applications are considered in order of receipt, so early application is strongly recommended. The Deutsche

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Deutsch-Jozsa algorithm for continuous variables  

E-Print Network [OSTI]

We present an idealized quantum continuous variable analog of the Deutsch-Jozsa algorithm which can be implemented on a perfect continuous variable quantum computer. Using the Fourier transformation and XOR gate appropriate for continuous spectra we show that under ideal operation to infinite precision that there is an infinite reduction in number of query calls in this scheme.

Arun K. Pati; Samuel L. Braunstein

2002-07-18T23:59:59.000Z

62

DEE Deutsche Erneuerbare Energien GmbH | Open Energy Information  

Open Energy Info (EERE)

DEE Deutsche Erneuerbare Energien GmbH DEE Deutsche Erneuerbare Energien GmbH Jump to: navigation, search Name DEE - Deutsche Erneuerbare Energien GmbH Place DĂƒÂŒsseldorf, Germany Zip 40215 Sector Biomass, Wind energy Product DEE is investing globally in equity of small and medium sized projects. At the moment DEE mainly focus on wind and biomass projects. References DEE - Deutsche Erneuerbare Energien GmbH[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. DEE - Deutsche Erneuerbare Energien GmbH is a company located in DĂƒÂŒsseldorf, Germany . References ↑ "[ DEE - Deutsche Erneuerbare Energien GmbH]" Retrieved from "http://en.openei.org/w/index.php?title=DEE_Deutsche_Erneuerbare_Energien_GmbH&oldid=344

63

Deutsch's Universal Quantum Turing Machine (Revisited)  

E-Print Network [OSTI]

Deutsch, Feynman, and Manin viewed quantum computing as a kind of universal physical simulation procedure. Much of the writing about quantum Turing machines has shown how these machines can simulate an arbitrary unitary transformation on a finite number of qubits. This interesting problem has been addressed most famously in a paper by Deutsch, and later by Bernstein and Vazirani. Quantum Turing machines form a class closely related to deterministic and probabilistic Turing machines and one might hope to find a universal machine in this class. A universal machine is the basis of a notion of programmability. The extent to which universality has in fact been established by the pioneers in the field is examined and a key notion in theoretical computer science (universality) is scrutinised. In a forthcoming paper, the authors will also consider universality in the quantum gate model.

Willem Fouché; Johannes Heidema; Glyn Jones; Petrus H. Potgieter

2007-01-16T23:59:59.000Z

64

DGfI Deutsche Gesellschaft fr Immunologie e.V.  

E-Print Network [OSTI]

DGfI Deutsche Gesellschaft fĂŒr Immunologie e.V. Fritz-und-Ursula-Melchers-Preis Der Preis wird Meltzer Deutsche Gesellschaft fĂŒr Immunologie e.V. c/o DRFZ, CharitĂ©platz 1, 10117 Berlin mail@dgfi.org Weitere Informationen www.dgfi.org #12;DGfI Deutsche Gesellschaft fĂŒr Immunologie e.V. Hans

Groppe, Sven

65

Studien zur Baugeschichte des Karners in Bad Deutsch-Altenburg.  

E-Print Network [OSTI]

??Der Karner in Bad Deutsch-Altenburg ist ein zweigeschoßiger Rundbau mit reich geschmücktem Stufenportal. In dieser Diplomarbeit wurden die vorhandenen Quellen aufgearbeitet und versucht die Veränderungen… (more)

Eybl, Jutta

2012-01-01T23:59:59.000Z

66

Quantum Guessing via Deutsch-Jozsa  

E-Print Network [OSTI]

We examine the "Guessing Secrets" problem arising in internet routing, in which the goal is to discover two or more objects from a known finite set. We propose a quantum algorithm using O(1) calls to an O(logN) oracle. This improves upon the best known classical result, which uses O(logN) questions and requires an additional O(logN^3) steps to produce the answer. In showing the possibilities of this algorithm, we extend the types of questions and function oracles that the Deutsch-Jozsa algorithm can be used to solve.

Michael Nathanson

2003-01-07T23:59:59.000Z

67

Fourier analysis of light scattered by elongated scatterers Zeev Schiffer, Yosef Ashkenazy, Reuven Tirosh, and Mordechai Deutsch  

E-Print Network [OSTI]

Tirosh, and Mordechai Deutsch Biological stimulation of living cells is sometimes associated-Gan 52900, Israel. M. Deutsch's

Ashkenazy, Yossi "Yosef"

68

Understanding Deutsch's probability in a deterministic multiverse  

E-Print Network [OSTI]

Difficulties over probability have often been considered fatal to the Everett interpretation of quantum mechanics. Here I argue that the Everettian can have everything she needs from `probability' without recourse to indeterminism, ignorance, primitive identity over time or subjective uncertainty: all she needs is a particular *rationality principle*. The decision-theoretic approach recently developed by Deutsch and Wallace claims to provide just such a principle. But, according to Wallace, decision theory is itself applicable only if the correct attitude to a future Everettian measurement outcome is subjective uncertainty. I argue that subjective uncertainty is not to be had, but I offer an alternative interpretation that enables the Everettian to live without uncertainty: we can justify Everettian decision theory on the basis that an Everettian should *care about* all her future branches. The probabilities appearing in the decision-theoretic representation theorem can then be interpreted as the degrees to which the rational agent cares about each future branch. This reinterpretation, however, reduces the intuitive plausibility of one of the Deutsch-Wallace axioms (Measurement Neutrality).

Hilary Greaves

2003-12-15T23:59:59.000Z

69

Deutsche Telekom drives open approach to apps and content stores Feb 16, 2010  

E-Print Network [OSTI]

Deutsche Telekom drives open approach to apps and content stores Feb 16, 2010 · Deutsche Telekom, allowing Deutsche Telekom customers to charge apps and other content onto their mobile phone bill key stores is planned for 2010 Deutsche Telekom today announces plans to further integrate with mobile

Deutschmann, Rainer

70

Satzung zur Streichung des Schwerpunkts Niederdeutsch in den Lehramtsstudiengngen Deutsch Gymnasium und Regionale Schule  

E-Print Network [OSTI]

1 Satzung zur Streichung des Schwerpunkts Niederdeutsch in den LehramtsstudiengĂ€ngen Deutsch Deutsch im Lehramtsstudiengang Gymnasium Die PrĂŒfungs- und Studienordnung fĂŒr den Teilstudiengang Deutsch: 1. § 2 Absatz 2 wird wie folgt gefasst: ,,(2) FĂŒr Lehramtsstudierende des Teilstudiengangs Deutsch

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

71

DS Deutsche Solargesellschaft mbH | Open Energy Information  

Open Energy Info (EERE)

DS Deutsche Solargesellschaft mbH DS Deutsche Solargesellschaft mbH Jump to: navigation, search Name DS Deutsche Solargesellschaft mbH Place Heilbronn, Germany Zip 74074 Sector Solar Product DS Deutsche Solargesellschaft markets PV installations in Spain to mostly German private investors. Coordinates 49.143145°, 9.219295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":49.143145,"lon":9.219295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

72

Gruppe Zeit Ort Sprache 1 Montag, 14-16 Uhr SR Westbau UG Deutsch  

E-Print Network [OSTI]

Tabelle1 Seite 1 Gruppe Zeit Ort Sprache 1 Montag, 14-16 Uhr SR Westbau UG Deutsch 2 Montag, 14-16 Uhr SozR GMH Deutsch 3 Seminarraum A im FMF* Englisch 4 Seminarraum C im FMF* Deutsch 5 SR Westbau 2.OG Deutsch 6 Mittwoch, 14-16 Uhr HS I Englisch 7 Mittwoch, 16-18 Uhr SozR GMH Deutsch 8 SR Westbau 2

Timmer, Jens

73

Topos-theoretic Model of the Deutsch multiverse  

E-Print Network [OSTI]

The Deutsch multiverse is collection of parallel universes. In this article a formal theory and a topos-theoretic model of the Deutsch multiverse are given. For this the Lawvere-Kock Synthetic Differential Geometry and topos models for smooth infinitesimal analysis are used. Physical properties of multi-variant and many-dimensional parallel universes are discussed. Quantum fluctuations of universe geometry are considered. Photon ghosts in parallel universes are found.

Alexander K. Guts

2002-03-24T23:59:59.000Z

74

Deutsch-Jozsa algorithm as a test of quantum computation  

E-Print Network [OSTI]

A redundancy in the existing Deutsch-Jozsa quantum algorithm is removed and a refined algorithm, which reduces the size of the register and simplifies the function evaluation, is proposed. The refined version allows a simpler analysis of the use of entanglement between the qubits in the algorithm and provides criteria for deciding when the Deutsch-Jozsa algorithm constitutes a meaningful test of quantum computation.

David Collins; K. W. Kim; W. C. Holton

1998-07-03T23:59:59.000Z

75

Tau auf dem Bei Alzheimer-Forschung denkt man nicht unbedingt an Teilchenbeschleuniger. Das Deutsche  

E-Print Network [OSTI]

. Das Deutsche Elektronen-Synchrotron in Hamburg, kurz DESY, hat Eva-Maria und Eckhard Mandelkow von der aller Welt kommen jÀhrlich zu diesem Zweck an das Deutsche Elektronen-Synchrotron, kurz DESY, nach

Spang, Rainer

76

www.ianrowland.com > Items To Buy > Diana Deutsch CDs Home Items To Buy  

E-Print Network [OSTI]

www.ianrowland.com > Items To Buy > Diana Deutsch CDs Home Items To Buy Items To Buy > Auditory Illusions CDs by Diana Deutsch published by Philomel Records Actual titles: Musical Illusions and Paradoxes

77

Junior Event Deutsche Gesellschaft der JSPS-Stipendiaten e.V.  

E-Print Network [OSTI]

Junior Event Deutsche Gesellschaft der JSPS-Stipendiaten e.V. JSPS Bonn Office Seminarraum 4120. Matthias Hofmann / Prof. Dr. Keiichi Kodaira Deutsche Gesellschaft der JSPS-Stipendiaten e.V. / JSPS Bonn

Kemper, Gregor

78

Discrimination of unitary transformations in the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We describe a general framework for regarding oracle-assisted quantum algorithms as tools for discriminating between unitary transformations. We apply this to the Deutsch-Jozsa problem and derive all possible quantum algorithms which solve the problem with certainty using oracle unitaries in a particular form. We also use this to show that any quantum algorithm that solves the Deutsch-Jozsa problem starting with a quantum system in a particular class of initial, thermal equilibrium-based states of the type encountered in solution state NMR can only succeed with greater probability than a classical algorithm when the problem size exceeds $n \\sim 10^5.$

David Collins

2010-02-23T23:59:59.000Z

79

Mein Auslandssemester in England Nachdem die ganzen Formalitten erledigt waren, und ich dachte immer die Deutsche  

E-Print Network [OSTI]

dachte immer die Deutsche BĂŒrokratie sei schlimm..., gings Ende September auf nach Newcastle upon Tyne

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

80

Die deutsch-jdischen Beziehungen in Arnims Werk Eric Leroy du Cardonnoy (Universit de Caen)  

E-Print Network [OSTI]

1 Die deutsch-jĂŒdischen Beziehungen in Arnims Werk Eric Leroy du Cardonnoy (UniversitĂ© de Caen) In diesem Beitrag wird der Frage nachgegangen, wie Achim von Arnim die deutsch- jĂŒdischen Beziehungen ErzĂ€hlungen, TheaterstĂŒcke und Romane ein sehr differenziertes Bild der deutsch-jĂŒdischen Beziehungen. Darin

Boyer, Edmond

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium  

E-Print Network [OSTI]

1 PrĂŒfungs- und Studienordnung fĂŒr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium Teilstudiengang Deutsch im Lehramtsstudiengang an Gymnasien die folgende PrĂŒfungs- und Studienordnung als Satzung Deutsch im Lehramtsstudiengang an Gymnasien. Dieser Studiengang stellt einen Studiengang im Sinne von § 2

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

82

Honors, awards, and fellowships Kendall B. Davis Deutsch Award for Excellence in Experimental Physics at MIT  

E-Print Network [OSTI]

Honors, awards, and fellowships 1994 Kendall B. Davis Deutsch Award for Excellence in Experimental Pfau Humboldt postdoctoral fellowship Axel Görlitz DAAD postdoctoral fellowship Shin Inouye Deutsch of the Academy of Sciences, Göttingen, Germany #12;2 2000 Ananth Chikkatur Deutsch Award for Excellence

83

Seminar: Deutsche Entwicklungspolitik: Bilanz und Herausforderungen angesichts der Millenniumsziele Europische Tagungs-  

E-Print Network [OSTI]

Seminar: Deutsche Entwicklungspolitik: Bilanz und Herausforderungen angesichts der Millenniumsziele EuropÀische Tagungs- und BildungsstÀtte Bonn http://www.gsi-bonn.de Einladung zum Seminar Deutsche Montag, 4. Juli 2005 09.30-10.15 Uhr Sachbeitrag und Diskussion* 10.30-12.00 Uhr Deutsche

Franz, Sven Oliver

84

An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in  

E-Print Network [OSTI]

An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups and Optimization, University of Waterloo, Canada Abstract. We adapt the Deutsch-Jozsa algorithm to the context some consequences for the word problem in groups with a particular kind of presentation. 1 The Deutsch

Severini, Simone

85

Implementation of the Deutsch Jozsa algorithm on an ion-trap  

E-Print Network [OSTI]

.............................................................. Implementation of the Deutsch­ Jozsa on both sides) requires an examination of each side. However, the analogous quantum procedure (the Deutsch­Jozsa algorithm1,2 ) requires just one examination step. The Deutsch­Jozsa algorithm has been real- ized

Blatt, Rainer

86

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Regionale Schule  

E-Print Network [OSTI]

1 PrĂŒfungs- und Studienordnung fĂŒr den Teilstudiengang Deutsch im Lehramtsstudiengang Regionale), erlĂ€sst die Ernst-Moritz-Arndt-UniversitĂ€t Greifswald fĂŒr den Teilstudiengang Deutsch im Studienordnung regelt das Studium und das PrĂŒfungsverfahren im Teilstudiengang Deutsch im Lehramtsstudiengang

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

87

Deutsche Telekom and Cinterion Wireless Modules become M2M partners Dec 04, 2009  

E-Print Network [OSTI]

Deutsche Telekom and Cinterion Wireless Modules become M2M partners Dec 04, 2009 · Agreement signed governing cooperation, joint market development, activities and projects Deutsche Telekom AG and Cinterion in Deutsche Telekom's international M2M- strategy", says Rainer Deutschmann, Senior Vice President Mobile

Deutschmann, Rainer

88

Deutsche Telekom launches new integrated location-based services in selected markets across Europe  

E-Print Network [OSTI]

Deutsche Telekom launches new integrated location-based services in selected markets across Europe in Q4 last year, services will be available in 2010 in the Netherlands and other countries Deutsche and check the weather in the area. Deutsche Telekom's LBS service is truly for the mass market. From launch

Deutschmann, Rainer

89

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009  

E-Print Network [OSTI]

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009 · Customers able · Offer available first to T-Mobile Austria mobile broadband customers and Deutsche Telekom business customers in Germany from Q3 2009 · Deutsche Telekom is the first telecommunications provider to offer

Deutschmann, Rainer

90

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium  

E-Print Network [OSTI]

PrĂŒfungs- und Studienordnung fĂŒr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium Teilstudiengang Deutsch im Lehramtsstudiengang an Gymnasien die folgende PrĂŒfungs- und Studienordnung als Satzung Deutsch im Lehramtsstudiengang an Gymnasien. Dieser Studiengang stellt einen Studiengang im Sinne von § 2

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

91

Prfungsordnung der Universitt Heidelberg Deutsche Sprachprfung fr den Hochschulzugang auslndischer Studienbewerber (DSH)  

E-Print Network [OSTI]

PrĂŒfungsordnung der UniversitĂ€t Heidelberg fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang nicht an einer deutsch- sprachigen Einrichtung erworben haben, mĂŒssen vor Beginn des Studiums Hochschulgesetzen der LĂ€nder fĂŒr die Aufnahme des Studiums hinreichende deutsche Sprachkenntnisse nachweisen. Dieser

Heermann, Dieter W.

92

Studienordnung fr den Bachelor-Teilstudiengang Deutsch als Fremdsprache (DaF) an der  

E-Print Network [OSTI]

1 Studienordnung fĂŒr den Bachelor-Teilstudiengang Deutsch als Fremdsprache (DaF) an der Ernst-Teilstudiengang Deutsch als Fremdsprache als Satzung: Inhaltsverzeichnis § 1 Geltungsbereich § 2 Studium § 3-Teilstudiengang Deutsch als Fremdsprache. ErgĂ€nzend gelten die Gemeinsame PrĂŒfungsordnung fĂŒr Bachelor- und

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

93

Dynamics of Ising models with damping J. M. Deutsch  

E-Print Network [OSTI]

Dynamics of Ising models with damping J. M. Deutsch Department of Physics, University of California Donostia, Spain Received 30 August 2007; published 28 March 2008 We show for the Ising model, both from a theoretical standpoint and for numerical efficiency. Ising models are perhaps the best

Deutsch, Josh

94

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre of the Helmholtz Association ACCELERATOR RESEARCH· DESY, Hamburg location, is seeking: Senior Scientist (f/m) Accelerator Research DESY DESY is one of the world's leading research centres for photon science, particle

95

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre of the Helmholtz Association ACCELERATOR RESEARCH· DESY, Hamburg location, is seeking: Scientist (f/m) Tenure Track physics as well as accelerator physics. Accelerator research at DESY in Hamburg, Germany, is being

96

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre and astroparticle physics as well as accelerator physics. The Photo Injector Test Facility PITZ in Zeuthen (near XFEL. As part of the accelerator R&D program of the Helmholtz Association the focus of the research

97

Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables  

E-Print Network [OSTI]

We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter estimation protocol or the Deutsch-Jozsa algorithm. The parameter estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous variable eigenstates the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement.

Marcin Zwierz; Carlos A. Pérez-Delgado; Pieter Kok

2010-08-19T23:59:59.000Z

98

Studiengang Bachelor Studiengangsmoderator Zugangsinformationen Unterrichtssprache Fakultt Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4  

E-Print Network [OSTI]

A Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4 Angewandte Informatik B.A. Prof. D. Henrich Deutsch 1 Anglistik B.A. Prof. M. Steppat Deutsch 4 B Berufliche Bildung, Fachrichtung Metalltechnik B.A. Prof. U. Glatzel Deutsch Betriebswirtschaftslehre B.A. Prof. J. Sigloch Numerus Clausus

Schmidt, Matthias

99

Transactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007  

E-Print Network [OSTI]

Transactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007 " MCR " . Guideline of Cyber Security Policy for Digital I&C Systems in Nuclear Power Plant Zeen and Control Dept., Korea Institute of Nuclear Safety, {k407kyd,dikim}@kins.re.kr *** Reactor Engineering

Kim, Kwangjo

100

Nonlocality and information flow: The approach of Deutsch and Hayden  

E-Print Network [OSTI]

Deutsch and Hayden claim to have provided an account of quantum mechanics which is particularly local, and which clarifies the nature of information transmission in entangled quantum systems. In this paper, a perspicuous description of their formalism is offered and their claim assessed. It proves essential to distinguish, as Deutsch and Hayden do not, between two ways of interpreting the formalism. On the first, conservative, interpretation, no benefits with respect to locality accrue that are not already available on either an Everettian or a statistical interpretation; and the conclusions regarding information flow are equivocal. The second, ontological, interpretation, offers a framework with the novel feature that global properties of quantum systems are reduced to local ones; but no conclusions follow concerning information flow in more standard quantum mechanics.

C. G. Timpson

2003-12-18T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Ghost spinors, shadow electrons and the Deutsch Multiverse  

E-Print Network [OSTI]

In this article a new solution of the Einstein-Dirac's equations is presented. There are ghost spinors, i.e. the stress-energy tensor is equal to zero and the current of these fields is non-zero vector. Last the ghost neutrino was found. These ghost spinors and shadow particles of Deutsch are identified. And in result the ghost spinors have a physical interpretation and solutions of the field equations for shadow electrons as another shadow particles are found.

Elena V. Palesheva

2001-08-05T23:59:59.000Z

102

De-Quantising the Solution of Deutsch's Problem  

E-Print Network [OSTI]

Probably the simplest and most frequently used way to illustrate the power of quantum computing is to solve the so-called {\\it Deutsch's problem}. Consider a Boolean function $f: \\{0,1\\} \\to \\{0,1\\}$ and suppose that we have a (classical) black box to compute it. The problem asks whether $f$ is constant (that is, $f(0) = f(1)$) or balanced ($f(0) \

Cristian S. Calude

2006-10-26T23:59:59.000Z

103

Nr. 73 / 06 vom 31. Oktober 2006 fr die Deutsche Sprachprfung  

E-Print Network [OSTI]

Nr. 73 / 06 vom 31. Oktober 2006 Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang an der UniversitĂ€t Paderborn Vom 31. Oktober 2006 #12;2 Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den besitzen. Dieser Nachweis kann gemĂ€Ă? § 2 Nr. 1 in Verbindung mit § 6 der ,,Rahmenordnung ĂŒber deutsche

Hellebrand, Sybille

104

Ordnung fr die Deutsche Sprachprfung fr den Hochschulzugang auslndischer Studienbewerber (DSH)  

E-Print Network [OSTI]

Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang auslĂ€ndischer Studienbewerber (DSH mit der Rahmenordnung ĂŒber Deutsche SprachprĂŒfungen fĂŒr das Studium an deutschen Hochschulen (RO Senatsausschusses fĂŒr Studium und Lehre vom 15. Juni 2005 folgende Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den

Hanke-Bourgeois, Martin

105

Nr. 03 / 13 vom 31. Januar 2013 Ordnung fr die Deutsche Sprachprfung  

E-Print Network [OSTI]

Nr. 03 / 13 vom 31. Januar 2013 Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulzugang an der UniversitĂ€t Paderborn Vom 31. Januar 2013 #12;2 Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den Hochschulrahmengesetz (HRG) und in den Hochschulgesetzen der LĂ€nder fĂŒr die Aufnahme des Studiums hinreichende deutsche

Hellebrand, Sybille

106

Nr. 30 / 07 vom 27. Juni 2007 fr die deutsche Sprachprfung  

E-Print Network [OSTI]

1 Nr. 30 / 07 vom 27. Juni 2007 Ordnung fĂŒr die deutsche SprachprĂŒfung fĂŒr den Hochschulzugang an der UniversitĂ€t Paderborn Vom 27. Juni 2007 #12;2 Ordnung fĂŒr die Deutsche SprachprĂŒfung fĂŒr den besitzen. Dieser Nachweis kann gemĂ€Ă? § 2 Nr. 1 in Verbindung mit § 6 der ,,Rahmenordnung ĂŒber deutsche

Hellebrand, Sybille

107

An elementary derivation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

Quantum computing takes fully advantage of the superposition principle to increase greatly (even exponentially) the speed of calculations, relative to the classical approach. The Deutsch-Jozsa algorithm is the simplest quantum algorithm illustrating this power. Unfortunately, the standard derivation involves several ingenious steps which usually leave students feeling that they could never have figured out the algorithm by themselves. We present here a different formulation of the problem which allows students to derive the algorithm using only basic knowledge of quantum mechanics and linear algebra.

Neda Amin; Patrick Labelle

2008-10-13T23:59:59.000Z

108

Generalization of the Deutsch algorithm using two qudits  

E-Print Network [OSTI]

Deutsch's algorithm for two qubits (one control qubit plus one auxiliary qubit) is extended to two $d$-dimensional quantum systems or qudits for the case in which $d$ is equal to $2^n$, $n=1,2,...$ . This allows one to classify a certain oracle function by just one query, instead of the $2^{n-1}+1$ queries required by classical means. The given algorithm for two qudits also solves efficiently the Bernstein-Vazirani problem. Entanglement does not occur at any step of the computation.

Jose L. Cereceda

2004-07-29T23:59:59.000Z

109

Developing the Deutsch-Hayden approach to quantum mechanics  

E-Print Network [OSTI]

The formalism of Deutsch and Hayden is a useful tool for describing quantum mechanics explicitly as local and unitary, and therefore quantum information theory as concerning a "flow" of information between systems. In this paper we show that these physical descriptions of flow are unique, and develop the approach further to include the measurement interaction and mixed states. We then give an analysis of entanglement swapping in this approach, showing that it does not in fact contain non-local effects or some form of superluminal signalling.

Clare Hewitt-Horsman; Vlatko Vedral

2006-09-12T23:59:59.000Z

110

Zur Zweck(in)adäquanz einer Implementierung der Passivierungs- und Bewertungsnormen von ungewissen Verbindlichkeiten gemäß den IAS und US-GAAP in deutsches Handels- und Steuerbilanzrecht  

Science Journals Connector (OSTI)

Das deutsche Bilanzrecht gehorcht unstreitig dem obersten Leitprinzip des Gläubigerbzw. (Fremd-)Kapitalgeberschutzes;1027 das deutsche Rechnungslegungssystem ist unter dieser Primärzielsetzung gewachsen und gerei...

Marc Pisoke

2004-01-01T23:59:59.000Z

111

The Deutsch-Jozsa Problem: De-quantisation and Entanglement  

E-Print Network [OSTI]

The Deustch-Jozsa problem is one of the most basic ways to demonstrate the power of quantum computation. Consider a Boolean function f : {0,1}^n to {0,1} and suppose we have a black-box to compute f. The Deutsch-Jozsa problem is to determine if f is constant (i.e. f(x) = const forall x in {0,1}^n) or if f is balanced (i.e. f(x) = 0 for exactly half the possible input strings x in {0,1}^n) using as few calls to the black-box computing f as is possible, assuming f is guaranteed to be constant or balanced. Classically it appears that this requires at least 2^{n-1}+1 black-box calls in the worst case, but the well known quantum solution solves the problem with probability one in exactly one black-box call. It has been found that in some cases the algorithm can be de-quantised into an equivalent classical, deterministic solution. We explore the ability to extend this de-quantisation to further cases, and examine with more detail when de-quantisation is possible, both with respect to the Deutsch-Jozsa problem, as well as in more general cases.

Alastair A. Abbott

2009-10-11T23:59:59.000Z

112

Deutsche Rotor und Turm Service GmbH Co KG DRTS | Open Energy Information  

Open Energy Info (EERE)

Rotor und Turm Service GmbH Co KG DRTS Rotor und Turm Service GmbH Co KG DRTS Jump to: navigation, search Name Deutsche Rotor und Turm Service GmbH & Co KG (DRTS) Place Bremen, Germany Zip 28239 Sector Wind energy Product Service company for wind turbine blades and towers. References Deutsche Rotor und Turm Service GmbH & Co KG (DRTS)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Deutsche Rotor und Turm Service GmbH & Co KG (DRTS) is a company located in Bremen, Germany . References ↑ "Deutsche Rotor und Turm Service GmbH & Co KG (DRTS)" Retrieved from "http://en.openei.org/w/index.php?title=Deutsche_Rotor_und_Turm_Service_GmbH_Co_KG_DRTS&oldid=344202" Categories:

113

Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables  

SciTech Connect (OSTI)

We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous-variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter-estimation protocol or the Deutsch-Jozsa algorithm. The parameter-estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous-variable eigenstates, the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement.

Zwierz, Marcin; Perez-Delgado, Carlos A.; Kok, Pieter [Department of Physics and Astronomy, University of Sheffield, Hounsfield Road, Sheffield S3 7RH (United Kingdom)

2010-10-15T23:59:59.000Z

114

Studiengnge m w Gesamt Deutsche Auslnder Angewandte Sportwissenschaften B.A. 130 102 232 226 6 4  

E-Print Network [OSTI]

StudiengÀnge m w Gesamt Deutsche AuslÀnder davon Bildungs- auslÀnder Bachelor Angewandte, sowie Deutsche und AuslÀnder, davon BildungsauslÀnder (Quelle: Studierendenstatistik , ITD) Dez. 1.3. 23.07.2013 #12;StudiengÀnge m w Gesamt Deutsche AuslÀnder davon Bildungs- auslÀnder Studiengangsstatistik

Noé, Reinhold

115

Lehrkraft fr Deutsch in China gesucht Am Sprachlehrzentrum der ,,Hubei University of Technology" in Wuhan, an dem u.a.  

E-Print Network [OSTI]

Dringend Lehrkraft fĂŒr Deutsch in China gesucht Am Sprachlehrzentrum der ,,Hubei University Bergischen UniversitĂ€t Wuppertal und den UniversitĂ€ten in Wuhan teilnehmen, Deutsch lernen, wird der Fachstudium zwei Jahre Deutsch, um das dritte Studienjahr an der UniversitĂ€t Wuppertal absolvieren zu können

116

Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms with Three Qubits  

E-Print Network [OSTI]

Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms; published 16 April 2003) We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein will be interested in here is Deutsch's algorithm [3], the first quantum algorithm ever discovered, which was later

Cerf, Nicolas

117

Tftler im Bierkeller Richard von Schirach, Die Nacht der Physiker, Heisenberg, Hahn, Weizscker und die deutsche Bombe  

E-Print Network [OSTI]

und die deutsche Bombe 272 Seiten, Berenberg Verlag, Berlin 2012, 25 Euro Der Abwurf der ersten Reichsmark in die deutsche Forschung. Daneben war die Motivation der Wis- senschaftler ein zweiter SchlĂŒssel- senberg rĂŒckblickend feststellte, bleibt auch fĂŒr Schirach eine plausible ErklĂ€rung fĂŒr das deutsche

118

A bio-inspired location search algorithm for peer to peer Sachin Kulkarni, Niloy Ganguly, Geoffrey Canright, Andreas Deutsch . . . 1  

E-Print Network [OSTI]

Ganguly, Geoffrey Canright, Andreas Deutsch . . . 1 #12;List of Contributors Sachin Kulkarni Department.canright@telenor.com Andreas Deutsch Center for Information Services and High Performance Computing (ZIH), TU-Dresden, Dresden 01062 andreas.deutsch@tu-dresden.de #12;A bio-inspired location search algorithm for peer to peer

Ganguly, Niloy

119

Zweite Satzung zur nderung der Zulassungsordnung der Universitt Stuttgart fr den Deutsch-Franzsischen Masterstudiengang Empirische Politik-und Sozialforschung  

E-Print Network [OSTI]

1 Zweite Satzung zur Ă?nderung der Zulassungsordnung der UniversitĂ€t Stuttgart fĂŒr den Deutsch Zulassungsordnung fĂŒr den Deutsch-Französischen Mas- terstudiengang Empirische Politik- und Sozialforschung vom 27: ,,(2) Wurden im deutsch-französischen Bachelorstudiengang oder im gleichwertigen Stu- diengang nicht

Möbius, Bernd

120

Everettian Rationality: defending Deutsch's approach to probability in the Everett interpretation  

E-Print Network [OSTI]

An analysis is made of Deutsch's recent claim to have derived the Born rule from decision-theoretic assumptions. It is argued that Deutsch's proof must be understood in the explicit context of the Everett interpretation, and that in this context, it essentially succeeds. Some comments are made about the criticism of Deutsch's proof by Barnum, Caves, Finkelstein, Fuchs, and Schack; it is argued that the flaw which they point out in the proof does not apply if the Everett interpretation is assumed. A longer version of this paper, entitled "Quantum Probability and Decision Theory, Revisted", is also available online.

David Wallace

2003-03-10T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Solution of the Deutsch-Josza Problem by NMR Ensemble Computing without Sensitivity Scaling  

E-Print Network [OSTI]

Experimental NMR implementations of the Deutsch-Josza quantum algorithm based on pesudo-pure spin states exhibit an exponential sensitivity scaling with the number of qubits. By employing truly mixed spin states in spin Liouville space, where molecules with different nuclear spin configurations represent different input states, the Deutsch-Josza problem can be solved by single function evaluation without sensitivity loss concomitant with increase of the number of bits.

F. M. Woodward; R. Brüschweiler

2000-06-06T23:59:59.000Z

122

Implementing the Deutsch's algorithm with spin-orbital angular momentum of photon without interferometer  

E-Print Network [OSTI]

Deutsch's algorithm is the simplest quantum algorithm which shows the acceleration of quantum computer. In this paper, we theoretically advance a scheme to implement quantum Deutsch's algorithm in spin-orbital angular momentum space. Our scheme exploits a newly developed optical device called "q-plate", which can couple and manipulate the spin-orbital angular momentum simultaneously. This experimental setup is of high stability and efficiency theoretically for there is no interferometer in it.

Pei Zhang; Yan Jiang; Rui-Feng Liu; Hong Gao; Hong-Rong Li; Fu-Li Li

2012-07-24T23:59:59.000Z

123

Hybrid and optical implementation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A hybrid model of the Deutsch-Jozsa algorithm is presented, inspired by the proposals of hybrid computation by S. Lloyd and P. van Loock et. al. The model is based on two observations made about both the discrete and continuous algorithms already available. First, the Fourier transform is a single-step operation in a continuous-variable (CV) setting. Additionally, any implementation of the oracle is nontrivial in both schemes. The steps of the computation are very similar to those in the CV algorithm, with the main difference being the way in which the qunats, or quantum units of analogic information, and the qubits interact in the oracle. Using both discrete and continuous states of light, linear devices, and photo-detection, an optical implementation of the oracle is proposed. For simplicity, infinitely squeezed states are used in the continuous register, whereas the optical qubit is encoded in the dual-rail logic of the KLM protocol. The initial assumption of ideal states as qunats will be dropped to study the effects of finite squeezing in the quality of the computation.

Luis A. Garcia; Jagdish R. Luthra

2009-12-31T23:59:59.000Z

124

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

125

Master's Thesis A Study on a Secure Clustering Scheme in Wireless Sensor  

E-Print Network [OSTI]

with limited resources (i.e., computation, storage and battery), security prim- itives can be hard) Department of Information and Communications Engineering Korea Advanced Institute of Science and Technology of Information and Communications Engineering Korea Advanced Institute of Science and Technology A thesis

Kim, Kwangjo

126

Joint Statement between U.S. Department of Energy and Republic of Korea's  

Broader source: Energy.gov (indexed) [DOE]

Joint Statement between U.S. Department of Energy and Republic of Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy May 7, 2013 - 2:18pm Addthis NEWS MEDIA CONTACT (202) 586-4940 Acting Secretary of Energy Daniel B. Poneman and Mr. Yoon Sang-jick, Minister of Trade, Industry, and Energy (MOTIE) of the Republic of Korea, met on May 7, 2013, at the Department of Energy (DOE) headquarters in Washington, D.C., where they exchanged views on cooperation on a wide range of energy priorities. They noted the importance of clean energy technologies for energy security, economic competitiveness and sustainable growth while mitigating the effects of greenhouse gas emissions. Acting Secretary Poneman and

127

Joint Statement between U.S. Department of Energy and Republic of Korea's  

Broader source: Energy.gov (indexed) [DOE]

between U.S. Department of Energy and Republic of between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy May 7, 2013 - 2:18pm Addthis NEWS MEDIA CONTACT (202) 586-4940 Acting Secretary of Energy Daniel B. Poneman and Mr. Yoon Sang-jick, Minister of Trade, Industry, and Energy (MOTIE) of the Republic of Korea, met on May 7, 2013, at the Department of Energy (DOE) headquarters in Washington, D.C., where they exchanged views on cooperation on a wide range of energy priorities. They noted the importance of clean energy technologies for energy security, economic competitiveness and sustainable growth while mitigating the effects of greenhouse gas emissions. Acting Secretary Poneman and

128

Deutsch-Franzsisches Parlaments-Praktikum 2014/2015 Echange Franco-Allemand d'Assistants Parlementaires Stagiaires 2014/2015  

E-Print Network [OSTI]

Deutsch-Französisches Parlaments-Praktikum 2014/2015 Echange Franco-Allemand d verbinden. Bewerbungsbedingungen 1. Deutsche StaatsbĂŒrgerschaft 2. Nicht lĂ€nger als vier Jahre

Greifswald, Ernst-Moritz-Arndt-UniversitÀt

129

Deutsch-Franzsisches Parlaments-Praktikum 2013/2014 Echange Franco-Allemand d'Assistants Parlementaires Stagiaires 2013/2014  

E-Print Network [OSTI]

Deutsch-Französisches Parlaments-Praktikum 2013/2014 Echange Franco-Allemand d verbinden. Bewerbungsbedingungen 1. Deutsche StaatsbĂŒrgerschaft 2. Nicht lĂ€nger als vier Jahre

Schubart, Christoph

130

Fnfte Satzung zur nderung der Fachstudien-und Prfungsordnung fr das Fach Deutsch im Lehramtsstudiengang an der Friedrich-Alexander-  

E-Print Network [OSTI]

FĂŒnfte Satzung zur Ă?nderung der Fachstudien- und PrĂŒfungsordnung fĂŒr das Fach Deutsch im PrĂŒfungsordnung fĂŒr das Fach Deutsch im Lehramtsstudiengang an der Friedrich-Alexander-UniversitĂ€t Erlangen

Fiebig, Peter

131

Quantum entanglement in the NMR implementation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A scheme to execute an n-bit Deutsch-Jozsa (D-J) algorithm using n qubits has been implemented for up to three qubits on an NMR quantum computer. For the one and two bit Deutsch problem, the qubits do not get entangled, hence the NMR implementation is achieved without using spin-spin interactions. It is for the three bit case, that the manipulation of entangled states becomes essential. The interactions through scalar J-couplings in NMR spin systems have been exploited to implement entangling transformations required for the three bit D-J algorithm.

Arvind; Kavita Dorai; Anil Kumar

1999-09-22T23:59:59.000Z

132

Two-bit Deutsch-Jozsa algorithm using an atomic ensemble  

E-Print Network [OSTI]

The first optical proposal for the realization of the two-bit version of the Deutsch-Jozsa algorithm [D. Deutsch and R. Jozsa, Proc. R. Soc. London A {\\bf 493}, 553 (1992)] is presented. The proposal uses Stark shifts in an ensemble of atoms and degenerate sources of photons. The photons interact dispersively with an atomic ensemble, leading to an effective Hamiltonian in atom-field basis, which is useful for performing the required two-qubit operations. Combining these with a set of one-qubit operations, the algorithm can be implemented. A discussion of the experimental feasibility of the proposal is given.

Shubhrangshu Dasgupta; G. S. Agarwal

2006-01-16T23:59:59.000Z

133

Extending the Promise of the Deutsch--Jozsa--Hoyer Algorithm for Finite Groups  

E-Print Network [OSTI]

Hoyer has given a generalisation of the Deutsch--Jozsa algorithm which uses the Fourier transform on a group G which is (in general) non-Abelian. His algorithm distinguishes between functions which are either perfectly balanced (m-to-one) or constant, with certainty, and using a single quantum query. Here, we show that this algorithm (which we call the Deutsch--Jozsa--Hoyer algorithm) can in fact deal with a broader range of promises, which we define in terms of the irreducible representations of G.

Michael Batty; Samuel L. Braunstein; Andrew J. Duncan

2004-12-08T23:59:59.000Z

134

Simple scheme for implementing the Deutsch-Jozsa algorithm in thermal cavity  

E-Print Network [OSTI]

We present a simple scheme to implement the Deutsch-Jozsa algorithm based on two-atom interaction in a thermal cavity. The photon-number-dependent parts in the evolution operator are canceled with the strong resonant classical field added. As a result, our scheme is immune to thermal field, and does not require the cavity to remain in the vacuum state throughout the procedure. Besides, large detuning between the atoms and the cavity is not necessary neither, leading to potential speed up of quantum operation. Finally, we show by numerical simulation that the proposed scheme is equal to demonstrate the Deutsch-Jozsa algorithm with high fidelity.

Wen-Xing Yang; Zhe-Xuan Gong

2006-11-22T23:59:59.000Z

135

United States-Republic of Korea (ROK) International Nuclear Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

United States-Republic of Korea (ROK) International Nuclear Energy Research Initiative (INERI) Annual Steering Committee Meeting United States-Republic of Korea (ROK) International...

136

Translated from Deutsches rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 1 of 30  

E-Print Network [OSTI]

Translated from Deutsches Ă?rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 1 measurement accuracy in quantitative laboratory analyses for medical purposes. #12;Translated from Deutsches Deutsches Ă?rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 3 of 30 consists

Rodriguez, Carlos

137

Veranstalltungsform Titel Sprache SWS ECTS Prfung Seminar Aktuelle Probleme der Wirtschafts-und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zustzlich Hausarbeit (ECTS: 4)  

E-Print Network [OSTI]

Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zusÀtzlich Hausarbeit (ECTS: 4) Seminar Arbeits- und Lebenswelten in der Literatur Deutsch 2 2 bis 3 Referat/PrÀsentation (2 ECTS), zusÀtzlich Protokoll, Hausarbeit (3 ECTS) Workshop Decision Making in Complex Systems ­ Part II Deutsch 1 1 Essay and Mini

Cremers, Daniel

138

Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-Universitt Marburg, Fachbereich Physik, Hans-Meerwein-Str., MZG-C6, 35032 Marburg  

E-Print Network [OSTI]

Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-UniversitÀt Marburg, Fachbereich Physik, Hans Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-UniversitÀt Marburg, Fachbereich Physik, Hans.terahertzcenter.de E-Mail: info@terahertzcenter.de #12;Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps

Schubart, Christoph

139

Veranstalltungsform Titel Untertitel Sprache SWS ECTS Prfung Seminar Aktuelle Probleme der Wirtschafts-und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zustzlich Hausarbeit (ECTS: 4)  

E-Print Network [OSTI]

Wirtschafts- und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zusÀtzlich Hausarbeit (ECTS: 4) Seminar Arbeits- und Lebenswelten in der Literatur Deutsch 2 2 bis 3 Referat/PrÀsentation (2 ECTS), zusÀtzlich in modelling complex systems ­ Agents in NetworksDeutsch 1 1 Essay and Mini-Simulation Project Seminar Der

Cengarle, MarĂ­a Victoria

140

Korea Power Exchange (KPX) | Open Energy Information  

Open Energy Info (EERE)

Exchange (KPX) Exchange (KPX) Jump to: navigation, search Logo: Korea Power Exchange (KPX) Name Korea Power Exchange (KPX) Agency/Company /Organization Argonne National Laboratory Sector Energy Focus Area Energy Efficiency Topics Background analysis Website http://www.dis.anl.gov/news/Ko Country South Korea Eastern Asia References http://www.dis.anl.gov/news/KoreaKpxIit.html Abstract In an agreement signed on March 26, 2007, Argonne National Laboratory and the Illinois Institute of Technology are joining with the Korea Power Exchange to establish a joint training program combining training and research at Argonne with formal academic education at IIT. Argonne-IIT Joint Graduate Program in Electricity Markets: In an agreement signed on March 26, 2007, Argonne National Laboratory and the Illinois

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH (Redirected from GTZ) Jump to: navigation, search Logo: Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

142

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH (Redirected from German Society for International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+ Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

143

Scalable method for demonstrating the Deutsch-Jozsa and Bernstein-Vazirani algorithms using cluster states  

SciTech Connect (OSTI)

We show that fundamental versions of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms can be performed using a small entangled cluster state resource of only six qubits. We then investigate the minimal resource states needed to demonstrate general n-qubit versions and a scalable method to produce them. For this purpose, we propose a versatile photonic on-chip setup.

Tame, M. S.; Kim, M. S. [QOLS, Blackett Laboratory, Imperial College London, Prince Consort Road, SW7 2BW, United Kingdom and Institute for Mathematical Sciences, Imperial College London, SW7 2PG (United Kingdom)

2010-09-15T23:59:59.000Z

144

Non-locality and gauge freedom in Deutsch and Hayden's formulation of quantum mechanics  

E-Print Network [OSTI]

Deutsch and Hayden have proposed an alternative formulation of quantum mechanics which is completely local. We argue that their proposal must be understood as having a form of `gauge freedom' according to which mathematically distinct states are physically equivalent. Once this gauge freedom is taken into account, their formulation is no longer local.

David Wallace; Chris Timpson

2005-03-16T23:59:59.000Z

145

A modified quantum adiabatic evolution for the Deutsch-Jozsa problem  

E-Print Network [OSTI]

Deutsch-Jozsa algorithm has been implemented via a quantum adiabatic evolution by S. Das et al. [Phys. Rev. A 65, 062310 (2002)]. This adiabatic algorithm gives rise to a quadratic speed up over classical algorithms. We show that a modified version of the adiabatic evolution in that paper can improve the performance to constant time.

Zhaohui Wei; Mingsheng Ying

2005-12-01T23:59:59.000Z

146

Optical implementation of Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms in eight dimensions  

E-Print Network [OSTI]

We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms for 8-point functions. The measured visibility of the 8-path interferometer is about 97.5%. Potential applications of our setup to quantum communication or cryptographic protocols using several qubits are discussed.

E. Brainis; L. -P. Lamoureux; N. J. Cerf; Ph. Emplit; M. Haelterman; S. Massar

2002-12-24T23:59:59.000Z

147

Scheme for implementing the Deutsch-Jozsa algorithm via atomic ensembles  

E-Print Network [OSTI]

We propose a physical scheme for implementing the Deutsch-Jozsa algorithm using atomic ensembles and optical devices. The scheme has inherent fault tolerance to the realistic noise and efficient scaling with the number of ensembles for some entangled states within the reach of current technology. It would be an important step toward more complex quantum computation via atomic ensembles.

Ping Dong; Zheng-Yuan Xue; Ming Yang; Zhuo-Liang Cao

2005-10-18T23:59:59.000Z

148

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

149

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

150

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

151

18/11/08 11:48 AMReview of "The Psychology Of Music, 2nd Ed." Page 1 of 13http://ego.psych.mcgill.ca/levitin.html/pubspages/Deutsch.html  

E-Print Network [OSTI]

18/11/08 11:48 AMReview of "The Psychology Of Music, 2nd Ed." Page 1 of 13http://ego.psych.mcgill.ca/levitin.html/pubspages/Deutsch.html Diana Deutsch (Ed), The Psychology of Music, Second Edition, San Diego:Diana Deutsch (Ed was. At the time of its initial publication in 1982, Diana Deutsch's "The Psychology of Music

Levitin, Daniel

152

Die Rolle der Plurizentrik beim Erlernen von Deutsch als Fremdsprache in Polen, dargestellt anhand einer Befragung von Deutschlehrern.  

E-Print Network [OSTI]

??Die vorliegende Arbeit versucht, zum einen die Berücksichtigung der Plurizentrik durch Lehrkräfte im Deutsch-als-Fremdsprache-Unterricht in polnischen Lyzeen darzustellen, zum anderen zur Einbeziehung verschiedener Varietäten der… (more)

Onak, Monika

2013-01-01T23:59:59.000Z

153

Speakers: Adam Sieminski, Deutsche Bank Stephen P. A. Brown, Resources for the Future  

U.S. Energy Information Administration (EIA) Indexed Site

5: "Energy and the Economy" 5: "Energy and the Economy" Speakers: Adam Sieminski, Deutsche Bank Stephen P. A. Brown, Resources for the Future Donald L. Paul, University of Southern California Energy Institute David Sandalow, DOE Christof RĂŒhl, Group Chief Economist, BP [Note: Recorders did not pick up introduction of panel (see biographies for details on the panelists) or introduction of session.] Adam: Microphone. So, we've lost a little bit of time because of all of the sessions running a bit over, but here is how we're going to make that up. I had about 12 minutes worth of slides that we're going to abandon. Isn't that great? We get to hear from the panelists rather than me. Now, my name is Adam Sieminski. I'm the Chief Energy Economist for Deutsche Bank. Don't let that intimidate you. I'm really a civil

154

Experimental Realization of Deutsch's Algorithm in a One-way Quantum Computer  

E-Print Network [OSTI]

We report the first experimental demonstration of an all-optical one-way implementation of Deutsch's quantum algorithm on a four-qubit cluster state. All the possible configurations of a balanced or constant function acting on a two-qubit register are realized within the measurement-based model for quantum computation. The experimental results are in excellent agreement with the theoretical model, therefore demonstrating the successful performance of the algorithm.

M. S. Tame; R. Prevedel; M. Paternostro; P. Böhi; M. S. Kim; A. Zeilinger

2006-11-17T23:59:59.000Z

155

Orchestrating an NMR quantum computation: the N=3 Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A detailed description of the development of a three qubit NMR realization of the Deutsch-Jozsa algorithm [Collins et.al., Phys. Rev. A 62, 022304 (2000)] is provided. The theoretical and experimental techniques used for the reduction of the algorithm's evolution steps into a sequence of NMR pulses are discussed at length. This includes the description of general pulse sequence compilation techniques, various schemes for indirectly coupled gate realizations, experimental pulse parameterization techniques and bookkeeping methods for pulse phases.

David Collins; K. W. Kim; W. C. Holton; H. Sierzputowska-Gracz; E. O. Stejskal

2001-05-10T23:59:59.000Z

156

Scaling issues in ensemble implementations of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We discuss the ensemble version of the Deutsch-Jozsa (DJ) algorithm which attempts to provide a "scalable" implementation on an expectation-value NMR quantum computer. We show that this ensemble implementation of the DJ algorithm is at best as efficient as the classical random algorithm. As soon as any attempt is made to classify all possible functions with certainty, the implementation requires an exponentially large number of molecules. The discrepancies arise out of the interpretation of mixed state density matrices.

Arvind; David Collins

2003-07-21T23:59:59.000Z

157

Scheme for implementing the Deutsch-Jozsa algorithm in cavity QED  

SciTech Connect (OSTI)

We propose a scheme for realizing the Deutsch-Jozsa algorithm in cavity QED. The scheme is based on the resonant interaction of atoms with a cavity mode. The required experimental techniques are within the scope of what can be obtained in the microwave cavity QED setup. The experimental implementation of the scheme would be an important step toward more complex quantum computation in cavity QED.

Zheng Shibiao [Department of Electronic Science and Applied Physics, Fuzhou University, Fuzhou 350002 (China)

2004-09-01T23:59:59.000Z

158

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

159

South Korea Fossil-Fuel CO2 Emissions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Far East » South Korea Far East » South Korea South Korea Fossil-Fuel CO2 Emissions Graph graphic Graphics Data graphic Data Trends South Korea, or the Republic of Korea, is the world's tenth largest emitter of CO2 based on 2008 fossil-fuel consumption and cement production with 139 million metric tons of carbon. From 1946-1997 South Korea experienced phenomenal growth in fossil-fuel CO2 emissions with a growth rate that averaged 11.5%. Initial growth in emissions was due to coal consumption, which still accounts for 46.9% of South Korea's fossil-fuel CO2 emissions. Since the late 1960s oil consumption has been a major source of emissions. South Korea is the world's fifth largest importer of crude oil. Natural gas became a significant source of CO2 for the first time in 1987, as South

160

Crunch Time for North Korea's Revolutionary New University  

Science Journals Connector (OSTI)

...University of Science and Technology in South Korea. Splendid...Massachusetts Institute of Technology],” says PUST computer...avid interest in information technology. “North Korea has chosen IT as...Bright Light,” a national Intranet not connected to the outside...

Richard Stone

2011-12-23T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

162

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

163

Förderung von Deutsch als Zweitsprache durch generatives Schreiben auf Basis einer Sprachstandsdiagnose nach USB DaZ in Ö im morphologisch-syntaktischen Bereich.  

E-Print Network [OSTI]

??Diese Masterarbeit beschäftigt sich mit dem Zusammenspiel von Sprachstandsdiagnose und Sprachförderung. Praktisch umgesetzt wurde dies in der Erstellung von Übungen, die der Förderung von Deutsch… (more)

Scharinger, Ursula

2013-01-01T23:59:59.000Z

164

North Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

North Korea: Energy Resources North Korea: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40,"lon":127,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

165

South Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Korea: Energy Resources Korea: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37,"lon":127.5,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

166

SKARN GOLD MINERALIZATION AT THE GEODO MINE, SOUTH KOREA  

Science Journals Connector (OSTI)

...Communications SKARN GOLD MINERALIZATION AT THE GEODO MINE, SOUTH KOREA Eui-Jun Kim 1 Maeng-Eon Park 2 Noel C. White 3 Corresponding...Skarn gold mineralization at the Geodo Mine, South Korea Kim Eui-Jun Author Korea Institute of Geoscience and Mineral Resources...

Eui-Jun Kim; Maeng-Eon Park; Noel C. White

167

Experimental demonstration of the Deutsch-Jozsa algorithm in homonuclear multispin systems  

SciTech Connect (OSTI)

Despite early experimental tests of the Deutsch-Jozsa (DJ) algorithm, there have been only a very few nontrivial balanced functions tested for register number n>3. In this paper, we experimentally demonstrate the DJ algorithm in four- and five-qubit homonuclear spin systems by the nuclear-magnetic-resonance technique, by which we encode the one function evaluation into a long shaped pulse with the application of the gradient ascent algorithm. Our work, dramatically reducing the accumulated errors due to gate imperfections and relaxation, demonstrates a better implementation of the DJ algorithm.

Wu Zhen; Luo Jun; Feng Mang [State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Li Jun; Zheng Wenqiang; Peng Xinhua [Hefei National Laboratory for Physics Sciences at Microscale, Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China)

2011-10-15T23:59:59.000Z

168

Implementation of the refined Deutsch-Jozsa algorithn on a 3-bit NMR quantum computer  

E-Print Network [OSTI]

We implemented the refined Deutsch-Jozsa algorithm on a 3-bit nuclear magnetic resonance quantum computer, which is the meaningful test of quantum parallelism because qubits are entangled. All of the balanced and constant functions were realized exactly. The results agree well with theoretical predictions and clearly distinguish the balanced functions from constant functions. Efficient refocusing schemes were proposed for the soft z-pulse and J-coupling and it is proved that the thermal equilibrium state gives the same results as the pure state for this algorithm.

Jaehyun Kim; Jae-Seung Lee; Soonchil Lee; Chaejoon Cheong

1999-10-04T23:59:59.000Z

169

Cavity QED implementation of the multi-qubit refined Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We theoretically study the realization of a multi-qubit refined Deutsch-Jozsa (DJ) algorithm using resonant interaction of many Rydberg atoms with a single-mode microwave cavity, in which the multi-qubit controlled phase gates could be accomplished efficiently. We show how to achieve a multi-qubit refined DJ algorithm in high fidelity, even in the case of a weak cavity decay and some imperfection. We argue that the required operations in our scheme are almost within the present experimental possibilities.

Wan Li Yang; Chang Yong Chen; Zhen Yu Xu; Mang Feng

2010-02-25T23:59:59.000Z

170

The Dynamics of Entanglement in the Adiabatic Search and Deutsch Algorithms  

E-Print Network [OSTI]

The goal of this paper is to study the effect of entanglement on the running time of a quantum computation. Adiabatic quantum computation is suited to this kind of study, since it allows us to explicitly calculate the time evolution of the entanglement throughout the calculation. On the other hand however, the adiabatic formalism makes it impossible to study the roles of entanglement and fidelity separately, which means that results have to be interpreted carefully. We study two algorithms: the search algorithm and the Deutsch-Jozsa algorithm. We find some evidence that entanglement can be considered a resource in quantum computation.

K. Choy; G. Passante; D. Ahrensmeier; M. E. Carrington; T. Fugleberg; R. Kobes; G. Kunstatter

2006-05-03T23:59:59.000Z

171

Implementing Deutsch-Jozsa algorithm using light shifts and atomic ensembles  

SciTech Connect (OSTI)

We present an optical scheme to implement the Deutsch-Jozsa algorithm using ac Stark shifts. The scheme uses an atomic ensemble consisting of four-level atoms interacting dispersively with a field. This leads to a Hamiltonian in the atom-field basis which is quite suitable for quantum computation. We show how one can implement the algorithm by performing proper one- and two-qubit operations. We emphasize that in our model the decoherence is expected to be minimal due to our usage of atomic ground states and freely propagating photon.

Dasgupta, Shubhrangshu; Biswas, Asoka; Agarwal, G.S. [Physical Research Laboratory, Navrangpura, Ahmedabad 380 009 (India)

2005-01-01T23:59:59.000Z

172

Experimental Realization of the Deutsch-Jozsa Algorithm with a Six-Qubit Cluster State  

E-Print Network [OSTI]

We describe the first experimental realization of the Deutsch-Jozsa quantum algorithm to evaluate the properties of a 2-bit boolean function in the framework of one-way quantum computation. For this purpose a novel two-photon six-qubit cluster state was engineered. Its peculiar topological structure is the basis of the original measurement pattern allowing the algorithm realization. The good agreement of the experimental results with the theoretical predictions, obtained at $\\sim$1kHz success rate, demonstrate the correct implementation of the algorithm.

Giuseppe Vallone; Gaia Donati; Natalia Bruno; Andrea Chiuri; Paolo Mataloni

2010-03-24T23:59:59.000Z

173

Entangling capacity of global phases and implications for Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We investigate the creation of entanglement by the application of phases whose value depends on the state of a collection of qubits. First we give the necessary and sufficient conditions for a given set of phases to result in the creation of entanglement in a state comprising of an arbitrary number of qubits. Then we analyze the creation of entanglement between any two qubits in three qubit pure and mixed states. We use our result to prove that entanglement is necessary for Deutsch-Jozsa algorithm to have an exponential advantage over its classical counterpart.

H. Azuma; S. Bose; V. Vedral

2001-02-05T23:59:59.000Z

174

An implementation of the Deutsch-Jozsa algorithm on a three-qubit NMR quantum computer  

E-Print Network [OSTI]

A new approach to the implementation of a quantum computer by high-resolution nuclear magnetic resonance (NMR) is described. The key feature is that two or more line-selective radio-frequency pulses are applied simultaneously. A three-qubit quantum computer has been investigated using the 400 MHz NMR spectrum of the three coupled protons in 2,3-dibromopropanoic acid. It has been employed to implement the Deutsch-Jozsa algorithm for distinguishing between constant and balanced functions. The extension to systems containing more coupled spins is straightforward and does not require a more protracted experiment.

N Linden H Barjat R Freeman

1998-08-21T23:59:59.000Z

175

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

176

Transatlantic Tensions and European Security  

E-Print Network [OSTI]

2005) “Deutsche vertrauen Putin mehr als Bush,” 23 Februarymeeting with President Vladimir Putin of Russia, the Germanthey trusted more, Bush or Putin. The results showed 29%

Sarotte, Mary Elise

2006-01-01T23:59:59.000Z

177

Korea's Green Growth Strategy: Mitigating Climate Change and Developing New  

Open Energy Info (EERE)

Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Jump to: navigation, search Name Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Agency/Company /Organization Organisation for Economic Co-Operation and Development Topics Policies/deployment programs, Pathways analysis, Background analysis Resource Type Publications, Guide/manual Website http://www.oecd.org/officialdo Country South Korea UN Region Eastern Asia References Korea's Green Growth Strategy[1] Overview "Korea's greenhouse gas emissions almost doubled between 1990 and 2005, the highest growth rate in the OECD area. Korea recently set a target of reducing emissions by 30% by 2020 relative to a "business as usual"

178

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

179

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Agency for International Cooperation (GIZ)) Agency for International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

180

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH Jump to: navigation, search Logo: Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Deutsche Gesellschaft fĂŒr Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

International Cooperation (GIZ)) International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft fĂŒr Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

182

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

183

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

184

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

185

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

186

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

187

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

188

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

189

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

190

Korea Silicon Co Ltd | Open Energy Information  

Open Energy Info (EERE)

Silicon Co Ltd Silicon Co Ltd Jump to: navigation, search Name Korea Silicon Co Ltd Place Seongnam, Gyeonggi-do, Korea (Republic) Sector Solar Product Korean manufacturer planning to output polysilicon, ingots and wafers for the solar industry. Coordinates 37.397652°, 127.115189° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.397652,"lon":127.115189,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

191

Korea Solar Inc | Open Energy Information  

Open Energy Info (EERE)

Solar Inc Solar Inc Jump to: navigation, search Name Korea Solar Inc Place Seoul, Korea (Republic) Sector Solar Product Manufacturer of solar collectors, modules, and water heaters. Coordinates 37.557121°, 126.977379° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.557121,"lon":126.977379,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

192

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

193

Development of an Integrated Natural Barrier Database System for Site Evaluation of a Deep Geologic Repository in Korea - 13527  

SciTech Connect (OSTI)

Korea Radioactive-waste Management Corporation (KRMC) established in 2009 has started a new project to collect information on long-term stability of deep geological environments on the Korean Peninsula. The information has been built up in the integrated natural barrier database system available on web (www.deepgeodisposal.kr). The database system also includes socially and economically important information, such as land use, mining area, natural conservation area, population density, and industrial complex, because some of this information is used as exclusionary criteria during the site selection process for a deep geological repository for safe and secure containment and isolation of spent nuclear fuel and other long-lived radioactive waste in Korea. Although the official site selection process has not been started yet in Korea, current integrated natural barrier database system and socio-economic database is believed that the database system will be effectively utilized to narrow down the number of sites where future investigation is most promising in the site selection process for a deep geological repository and to enhance public acceptance by providing readily-available relevant scientific information on deep geological environments in Korea. (authors)

Jung, Haeryong; Lee, Eunyong; Jeong, YiYeong; Lee, Jeong-Hwan [Korea Radioactive-waste Management Corportation - KRMC, 1045 Daedeokdaero, Yuseong-gu, Daejeon 305-353 (Korea, Republic of)] [Korea Radioactive-waste Management Corportation - KRMC, 1045 Daedeokdaero, Yuseong-gu, Daejeon 305-353 (Korea, Republic of)

2013-07-01T23:59:59.000Z

194

North Korea Fossil-Fuel CO2 Emissions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Far East » North Korea Far East » North Korea North Korea Fossil-Fuel CO2 Emissions Graph graphic Graphics Data graphic Data Trends The total fossil-fuel CO2 emissions for North Korea, or the Democratic People's Republic of Korea, averaged 11.2% growth from 1950-93, reaching 71 million metric tons of carbon. Since 1993 according to published UN energy statistics, fossil-fuel CO2 emissions have declined 70% to 21.4 million metric tons of carbon. As the world's 14th largest producer of coal, it is no surprise North Korea's fossil-fuel CO2 emissions record is dominated by emissions from coal burning. Coal consumption accounted for 93% of the 2008 CO2 emission total. With no natural gas usage, another 3.4% currently comes from liquid petroleum consumption, and the remainder is from cement

195

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

196

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

197

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

198

Deutsche Solar AG formerly Bayer Solar GmbH | Open Energy Information  

Open Energy Info (EERE)

AG formerly Bayer Solar GmbH AG formerly Bayer Solar GmbH Jump to: navigation, search Name Deutsche Solar AG (formerly Bayer Solar GmbH) Place Freiberg/Sachsen, Germany Zip 9599 Sector Solar Product Producers of mono- and multicrystalline silicon wafers for solar cells. Coordinates 50.916956°, 13.339619° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.916956,"lon":13.339619,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

199

NMR tomography of the three-qubit Deutsch-Jozsa algorithm  

SciTech Connect (OSTI)

The optimized version of the Deutsch-Jozsa algorithm proposed by Collins et al. was implemented using the three {sup 19}F nuclear spins of 2,3,4-trifluoroaniline as qubits. To emulate the behavior of pure quantum-mechanical states pseudopure states of the ensemble were prepared prior to execution of the algorithm. Full tomography of the density matrix was employed to obtain detailed information about initial, intermediate, and final states. Information, thus obtained, was applied to optimize the pulse sequences used. It is shown that substantial improvement of the fidelity of the preparation may be achieved by compensating the effects caused by the different relaxation behavior of the different substates of the density matrix. All manipulations of the quantum states were performed under the conditions of unresolved spin-spin interactions.

Mangold, Oliver; Heidebrecht, Andreas; Mehring, Michael [2. Physikalisches Institut, University of Stuttgart, Stuttgart (Germany)

2004-10-01T23:59:59.000Z

200

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

202

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

203

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

204

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

205

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

206

Sehun Jeong1, JunbeomYoo2, Sungdeok Cha1 1Korea University, Republic of Korea  

E-Print Network [OSTI]

, Republic of Korea VIS Analyzer: Visual Assistant forVISVerification and Analysis *Photo was taken at Real #12;KNICS Project · Development of software for nuclear power plant reactor protection system (2000 techniques when feasible to demonstrate high reliability · Domain experts should NOT be left alone

207

Study Abroad in South Korea Construction Management & Civil Engineering  

E-Print Network [OSTI]

Korea and North Korea. After having become more acclimated to culture the students separated from Institute for Defense Analysis, to speakers from the private sector working in oil refining plants, they went up to the ski slopes where 2018 Olympic ski events will be held. One of the main features

Hutcheon, James M.

208

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

209

Nuclear Security Summit | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Uranium Fuel Development The White HouseOffice of the Press SecretaryBelgium, France, Germany, the Republic of Korea and the United States, the parties to this joint statement...

210

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

211

North Korea: The next nuclear nightmare  

SciTech Connect (OSTI)

The crisis in the Persian Gulf has reawakened concerns over the spread of nuclear arms. Even before its invasion of Kuwait, Iraq's history of aggression and support for international terrorism triggered fears in Washington that its acquisition of nuclear weapons might damage international stability and US interests far more than the emergence of India, Israel, Pakistan, and South Africa as de facto nuclear powers. Thus, when the Gulf War began on January 16, Iraq's nuclear sites were among the first attacked by allied air strikes. Unfortunately, Iraq has not been the only hostile proliferator looming on the horizon. North Korea, which has been no less dedicated than Iraq to the use of violence to advance its expansionist goals, has also tenaciously pursued a nuclear-weapons capability. Moreover, the North Korean program is considerably closer to bearing fruit than the Iraqi effort. And although North Korea, like Iraq, has signed the Nuclear Nonproliferation Treaty, unlike Iraq it has refused to conclude the safeguards agreement with the International Atomic Energy Agency that the treaty requires.

Spector, L.S.; Smith, J.R.

1991-03-01T23:59:59.000Z

212

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

213

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

214

Implementation of a Deutsch-like quantum algorithm utilizing entanglement at the two-qubit level, on an NMR quantum information processor  

E-Print Network [OSTI]

We describe the experimental implementation of a recently proposed quantum algorithm involving quantum entanglement at the level of two qubits using NMR. The algorithm solves a generalisation of the Deutsch problem and distinguishes between even and odd functions using fewer function calls than is possible classically. The manipulation of entangled states of the two qubits is essential here, unlike the Deutsch-Jozsa algorithm and the Grover's search algorithm for two bits.

Kavita Dorai; Arvind; Anil Kumar

2000-06-22T23:59:59.000Z

215

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

216

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

217

Proper and improper density matrices and the consistency of the Deutsch model for Local Closed Timelike Curves  

E-Print Network [OSTI]

We discuss the concept of proper and improper density matrixes and we argue that this issue is of fundamental importance for the understanding of the quantum-mechanical CTC model proposed by Deutsch. We arrive at the conclusion that under a realistic interpretation, the distinction between proper and improper density operators is not a relativistically covariant notion and this fact leads to the conclusion that the D-CTC model is physically inconsistent.

A. C. Lobo; I. L. Paiva; P. R. Dieguez

2011-10-28T23:59:59.000Z

218

A scalable method for demonstrating the Deutsch-Jozsa and Bernstein-Vazirani algorithms using cluster states  

E-Print Network [OSTI]

We show that fundamental versions of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms can be performed using a small entangled cluster state resource of only six qubits. We then investigate the minimal resource states needed to demonstrate arbitrary n-qubit versions and a scalable method to produce them. For this purpose we propose a versatile on-chip photonic waveguide setup.

M. S. Tame; M. S. Kim

2010-03-25T23:59:59.000Z

219

Experimental Implementation of the Deutsch-Jozsa Algorithm for Three-Qubit Functions using Pure Coherent Molecular Superpositions  

E-Print Network [OSTI]

The Deutsch-Jozsa algorithm is experimentally demonstrated for three-qubit functions using pure coherent superpositions of Li$_{2}$ rovibrational eigenstates. The function's character, either constant or balanced, is evaluated by first imprinting the function, using a phase-shaped femtosecond pulse, on a coherent superposition of the molecular states, and then projecting the superposition onto an ionic final state, using a second femtosecond pulse at a specific time delay.

Jiri Vala; Zohar Amitay; Bo Zhang; Stephen R. Leone; Ronnie Kosloff

2001-07-10T23:59:59.000Z

220

Implementation schemes in NMR of quantum processors and the Deutsch-Jozsa algorithm by using virtual spin representation  

SciTech Connect (OSTI)

Schemes of experimental realization of the main two-qubit processors for quantum computers and the Deutsch-Jozsa algorithm are derived in virtual spin representation. The results are applicable for every four quantum states allowing the required properties for quantum processor implementation if for qubit encoding, virtual spin representation is used. A four-dimensional Hilbert space of nuclear spin 3/2 is considered in detail for this aim.

Kessel, Alexander R.; Yakovleva, Natalia M. [Kazan Physical-Technical Institute, Russian Academy of Science, Sibirsky trakt 10/7, Kazan 420029 (Russian Federation)

2002-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

222

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

223

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

224

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

225

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

226

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

227

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

228

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

229

Korea's Thyroid-Cancer “Epidemic” — Screening and Overdiagnosis  

Science Journals Connector (OSTI)

The Republic of Korea has provided national health insurance to its 50 million citizens since the 1980s. Although health care expenditures in South Korea's single-payer system are relatively low — accounting for 7.6% of the country's gross domestic product — the system is technologically intensive... In 2011, the rate of thyroid-cancer diagnoses in the Republic of Korea was 15 times that observed in 1993, yet thyroid-cancer mortality remains stable — a combination that suggests that the problem is overdiagnosis attributable to widespread thyroid-cancer screening.

Ahn H.S.Kim H.J.Welch H.G.

2014-11-06T23:59:59.000Z

230

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

231

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

232

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

233

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

234

South Korea-Green Growth Strategy Support | Open Energy Information  

Open Energy Info (EERE)

South Korea-Green Growth Strategy Support South Korea-Green Growth Strategy Support Jump to: navigation, search Name South Korea-Green Growth Strategy Support Agency/Company /Organization Global Green Growth Institute (GGGI) Partner Brazilian Finance Ministry, EMBRAPA, FGV, Danish Energy Agency Sector Energy, Land Topics Low emission development planning Resource Type Publications Website http://www.gggi.org/ Program Start 2010 Country South Korea Eastern Asia References Global Green Growth Institute[1] Contents 1 Overview 2 Brazil 3 Indonesia 4 References Overview The Global Green Growth Institute (GGGI) was founded on the belief that economic growth and environmental sustainability are not merely compatible objectives; their integration is essential for the future of humankind. GGGI is dedicated to pioneering and diffusing a new model of economic

235

The Political Economies of Broadband Development in Korea and Japan  

E-Print Network [OSTI]

the game is nothing new to Japan and Korea. Both saw rapid17,000 to 1.6 million. 7 Japan followed suit in the earlyDSL was ?rst introduced, Japan was among the most expensive

Kushida, Kenji; Oh, Seung-Youn

2007-01-01T23:59:59.000Z

236

Joint design and technology transfer for CANDU projects in Korea  

SciTech Connect (OSTI)

Since the first commercial operation of Kori Unit 1 in April 1978, nine nuclear units are operating and seven, including three CANDU 6 reactors (Wolsong 2, 3 & 4), are currently under construction in Korea. One of the cornerstones of Korea`s nuclear energy policy is the drive for technological self-reliance. Thus, as part of the Wolsong Project scope, a Technology Transfer Agreement for CANDU NSSS System Design was concluded. Under tills agreement Atomic Energy of Canada Limited (AECL) is transferring technologies relating to CANDU 6 NSSS design to Korea Atomic Energy Research Institute (KAERI). As a result KAERI is now performing joint design with AECL for the NSSS of the Wolsong Projects. The current NSSS engineering and design progress for Wolsong 2, 3 & 4 is 58 percent as of December 1993. AECL and KAERI will also pursue the development of advanced technology including a large CANDU system on the basis of CANDU 6 technology.

Harris, D.; Lee, I.H.

1994-12-31T23:59:59.000Z

237

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

238

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

239

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

240

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

242

NMR experimental realization of seventh-order coupling transformations and the seven-qubit modified Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We propose a scalable method on the basis of nth-order coupling operators to construct f-dependent phase transformations in the n-qubit modified Deutsch-Jozsa (D-J) quantum algorithm. The novel n-qubit entangling transformations are easily implemented via J-couplings between neighboring spins. The seven-qubit modified D-J quantum algorithm and seventh-order coupling transformations are then experimentally demonstrated with liquid state nuclear magnetic resonance (NMR) techniques. The method may offer the possibility of creating generally entangled states of n qubits and simulating n-body interactions on n-qubit NMR quantum computers.

Daxiu Wei; Jun Luo; Xiaodong Yang; Xianping Sun; Xizhi Zeng; Maili Liu; Shangwu Ding; Mingsheng Zhan

2003-01-10T23:59:59.000Z

243

Room-temperature implementation of the Deutsch-Jozsa algorithm with a single electronic spin in diamond  

E-Print Network [OSTI]

The nitrogen-vacancy defect center (NV center) is a promising candidate for quantum information processing due to the possibility of coherent manipulation of individual spins in the absence of the cryogenic requirement. We report a room-temperature implementation of the Deutsch-Jozsa algorithm by encoding both a qubit and an auxiliary state in the electron spin of a single NV center. By thus exploiting the specific S=1 character of the spin system, we demonstrate how even scarce quantum resources can be used for test-bed experiments on the way towards a large-scale quantum computing architecture.

Fazhan Shi; Xing Rong; Nanyang Xu; Ya Wang; Jie Wu; Bo Chong; Xinhua Peng; Juliane Kniepert; Rolf-Simon Schoenfeld; Wolfgang Harneit; Mang Feng; Jiangfeng Du

2010-02-12T23:59:59.000Z

244

An application of the Deutsch-Josza algorithm to formal languages and the word problem in groups  

E-Print Network [OSTI]

We adapt the Deutsch-Josza algorithm to the context of formal language theory. Specifically, we use the algorithm to distinguish between trivial and nontrivial words in groups given by finite presentations, under the promise that a word is of a certain type. This is done by extending the original algorithm to functions of arbitrary length binary output, with the introduction of a more general concept of parity. We provide examples in which properties of the algorithm allow to reduce the number of oracle queries with respect to the deterministic classical case. This has some consequences for the word problem in groups with a particular kind of presentation.

Michael Batty; Andrea Casaccino; Andrew J. Duncan; Sarah Rees; Simone Severini

2008-01-18T23:59:59.000Z

245

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

246

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

247

Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement  

SciTech Connect (OSTI)

Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

Chung, W. S.; Yun, S. W.; Lee, D. S. [Korea Atomic Energy Research Inst., Dukjin-dong 150, Yusung-gu, Daejon, R.O., 305-353 (Korea, Republic of); Go, D. Y. [Kyung Hee Univ., Kyung Hee daero 26, Dongdaemoon-gu, Seoul, R.O., 130-701 (Korea, Republic of)

2012-07-01T23:59:59.000Z

248

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

249

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

250

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

251

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

252

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices â€ș Security Policy â€ș Security Assistance â€ș Departmental Personnel Security Mission & Functions â€ș Security Policy â€ș Security Assistance â€ș Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links â€ș DOE â€ș DOE CIO â€ș NNSA â€ș DOE CFO â€ș NTC â€ș S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

253

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

254

Economic Considerations of Nuclear Desalination in Korea  

SciTech Connect (OSTI)

The objective of this study is to assess the economics of SMART (System-integrated Modular Advanced Reactor) desalination plant in Korea through DEEP (Devaluation Economic Evaluation Program). SMART is mainly designed for the dual purpose of producing water and electricity with the total capacity of 100 MWe which 10 MWe is used for water production and the remains for the electric generation. SMART desalination plant using MED (Multi-Effect Distillation) process is in the stage of the commercial development and its cost information is also being accumulated. In this circumstances, the economic assessment of nuclear desalination by SMART and the effect of water(or electric) supply price to the regional economy is meaningful to the policy maker. This study is focused on the case study analysis about the economics of SMART desalination plant and the meanings of the case study result. This study is composed of two parts. One is prepared to survey the methodology regarding cost allocation between electricity and water in DEEP and the other is for the economic assessment of SMART. The cost allocation methods that have been proposed or used can be classified into two main groups, one is the cost prorating method and the other is the credit method. The cost of an product item in the dual-purpose plant can be determined differently depending on the costing methods adopted. When it comes to applying credit method adopted in this thesis, the production cost of water depends on what kind of the power cost will be chosen in calculating the power credit. This study also analyses the changes of nuclear desalination economics according to the changes of the important factors such as fossil fuel price. I wish that this study can afford to give an insight to the policy maker about SMART desalination plant. (authors)

Man-Ki, Lee; Seung-Su, Kim [Korea Atomic Energy Research Institute, 150, Deok-jin dong, Yu-seong gu, Dae-jeon city (Korea, Republic of)

2006-07-01T23:59:59.000Z

255

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

256

Holy Mother of Chiri Mountain: A Female Mountain Spirit in Korea  

E-Print Network [OSTI]

Spirit in Korea by Maya Stiller UCLA Center for the Study ofSpirit in Korea by Maya Stiller I n his case study of femaleand commoners alike. Maya Stiller is a graduate student in

Stiller, Maya

2011-01-01T23:59:59.000Z

257

Electricity privatization : should South Korea privatize its state-owned electric utility?  

E-Print Network [OSTI]

The state-owned electric utility, Korea Electricity Power Cooperation (KEPCO), privatization has been a key word in South Korea since 1997, when the government received $55 billion from the International Monetary Fund in ...

Lim, Sungmin

2011-01-01T23:59:59.000Z

258

A study on carbon dioxide emissions from bituminous coal in Korea  

Science Journals Connector (OSTI)

Consumption of primary energy in Korea increased 5.25 % per year over a 10 years span starting in 1990. Korea ranked 8th in primary energy consumption in 2011; coal consumption increased 35 % from 87,827 milli...

Jeongwoo Lee; Chang-Sang Cho; Ki-hyup Hong; Jae-Hak Jeong…

2013-10-01T23:59:59.000Z

259

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

260

Seoul, South Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Seoul, South Korea: Energy Resources Seoul, South Korea: Energy Resources Jump to: navigation, search Name Seoul, South Korea Equivalent URI DBpedia GeoNames ID 1835848 Coordinates 37.5985°, 126.9783° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.5985,"lon":126.9783,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

262

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

263

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

264

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

265

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

266

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

267

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

268

Seoul, South Korea -classification deteriorating slope stability -Robert Hack 1 SLOPE STABILITY CLASSIFICATION  

E-Print Network [OSTI]

Seoul, South Korea - classification deteriorating slope stability - Robert Hack 1 SLOPE STABILITY CLASSIFICATION OF TIME DEPENDENT DETERIORATING SLOPES Seoul, Korea, 29 February 2008 Robert Hack Engineering) The Netherlands #12;Seoul, South Korea - classification deteriorating slope stability - Robert Hack 2 Jan van

Hack, Robert

269

THREE WORDS ABOUT MOBILE PHONES: FINDINGS FROM SWEDEN, THE US, ITALY, JAPAN, AND KOREA  

E-Print Network [OSTI]

THREE WORDS ABOUT MOBILE PHONES: FINDINGS FROM SWEDEN, THE US, ITALY, JAPAN, AND KOREA Naomi S phones: findings from Sweden, the US, Italy, Japan, and Korea While roughly half of the world students in Sweden, the US, Italy, Japan, and Korea, between the ages of 18 and 24. One of our open

Carlini, David

270

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

271

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices â€ș Security Policy â€ș Security Assistance â€ș Departmental Personnel Security Mission & Functions â€ș Security Policy â€ș Security Assistance â€ș Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links â€ș DOE â€ș DOE CIO â€ș NNSA â€ș DOE CFO â€ș NTC â€ș S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

272

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

273

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

274

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

275

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

276

Green Growth in Motion: Sharing Korea's Experience | Open Energy  

Open Energy Info (EERE)

Green Growth in Motion: Sharing Korea's Experience Green Growth in Motion: Sharing Korea's Experience Jump to: navigation, search Tool Summary Name: Green Growth in Motion: Sharing Korea's Experience Agency/Company /Organization: Global Green Growth Institute (GGGI) Sector: Climate Focus Area: Renewable Energy, Economic Development, People and Policy Topics: Finance, Implementation, Low emission development planning, -LEDS, Market analysis, Pathways analysis, Policies/deployment programs, Resource assessment Resource Type: Case studies/examples Website: www.gggi.org/sites/www.gggi.org/files/research/GreenGrowthInMotion.pdf Country: South Korea Cost: Free Eastern Asia Coordinates: 35.907757°, 127.766922° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.907757,"lon":127.766922,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

277

Shock: South Korea wins Battle of nuclear titans  

SciTech Connect (OSTI)

A South Korean consortium won the contract to build and operate four nuclear power plants in Abu Dhabi valued at $20.4 billion. The deal was significant since it is the first major nuclear contract of its kind awarded in the rapidly growing Persian Gulf region, and signals the rise of Korea as an exporter of nuclear know-how.

NONE

2010-03-15T23:59:59.000Z

278

South Korea-Economics of Climate Change and Low Carbon Growth Strategies in  

Open Energy Info (EERE)

South Korea-Economics of Climate Change and Low Carbon Growth Strategies in South Korea-Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia Jump to: navigation, search Name South Korea-Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia Agency/Company /Organization Asian Development Bank Partner Government of Republic of Korea Topics Background analysis, Low emission development planning Program Start 2009 Country South Korea Eastern Asia References Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia[1] Overview The Asian Development Bank (ADB) is planning a study entitled the Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia, covering the People's Republic of China (PRC), Japan, the Republic of Korea, and Mongolia. The Government of the Republic of Korea will cofinance

279

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

280

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy’s corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

282

Evaluation of the long-term power generation mix: The case study of South Korea's energy policy  

Science Journals Connector (OSTI)

Abstract This paper presents a practical portfolio model for the long-term power generation mix problem. The proposed model optimizes the power generation mix by striking a trade-off between the expected cost of power generation and its variability. We use Monte Carlo simulation techniques to consider the uncertainty associated with future electricity demand, fuel prices and their correlations, and the capital costs of power plants. Unlike in the case of conventional power generation mix models, we employ \\{CVaR\\} (Conditional Value-at-Risk) in designing variability to consider events that are rare but enormously expensive. A comprehensive analysis on South Korea's generation policy using the portfolio model shows that a large annual cost is additionally charged to substitute a portion of nuclear energy with other alternatives. Nonetheless, if Korea has to reduce its dependency on nuclear energy because of undermined social receptivity from the Fukushima disaster, it turns out that LNG or coal could be a secure candidate from an economic perspective.

Daiki Min; Jaewoo Chung

2013-01-01T23:59:59.000Z

283

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

284

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

285

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

286

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

287

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

288

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

289

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

290

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

291

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

292

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

293

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

294

MHK Projects/South Korea | Open Energy Information  

Open Energy Info (EERE)

Korea Korea < MHK Projects Jump to: navigation, search << Return to the MHK database homepage Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"500px","height":"350px","centre":false,"title":"","label":"","icon":"File:Aquamarine-marker.png","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.9078,"lon":127.767,"alt":0,"address":"","icon":"http:\/\/prod-http-80-800498448.us-east-1.elb.amazonaws.com\/w\/images\/7\/74\/Aquamarine-marker.png","group":"","inlineLabel":"","visitedicon":""}]}

295

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

296

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

297

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

298

The status of coal briquetting technology in Korea  

SciTech Connect (OSTI)

Anthracite is the only indigenous fossil fuel resource produced in Korea and is an important main source of residential fuel. Due to its particular characteristics, the best way to use Korean coal is in the form of briquettes, called {open_quotes}Yontan.{close_quotes} The ability to use this coal as briquettes was a great discovery made nearly 50 years ago and since then, has made a great contribution to the energy consumption of low and middle income households. Korean anthracite in coal briquette form has been used widely for household heating purposes. Collieries in Korea produced no more than one million tons of anthracite annually in the 1960s. Production, however, increased substantially up to about 17 million tons per year in the mid-1970s. In 1986, Korea succeeded in raising its coal production to 24.2 million tons, which was the maximum production level achieved by the Korean coal industrial sector. Since then, anthracite production has fallen. In 1991, coal output dropped to 15.1 million tons, a decrease of 12.2 percent from the 17.2 million tons produced in 1990, due to falling coal demand and rising labor costs. The role of coal as an energy source will be more important in the future to meet projected economic growth in Korea. While the production of indigenous Korean anthracite is expected to decrease under a coal mining rationalization policy, imports of bituminous coal will increase rapidly and will be used as an oil substitute in industry and power generation. In this chapter, general aspects of the Korean coal industry and coal utilization for residential uses, especially the Yontan coal briquetting techniques, are discussed. In addition, coal briquetting technology applications suitable for the APEC region will be presented.

Choi, Woo-Zin

1993-12-31T23:59:59.000Z

299

Implementation of controlled phase shift gates and Collins version of Deutsch-Jozsa algorithm on a quadrupolar spin-7/2 nucleus using non-adiabatic geometric phases  

E-Print Network [OSTI]

In this work Controlled phase shift gates are implemented on a qaudrupolar system, by using non-adiabatic geometric phases. A general procedure is given, for implementing controlled phase shift gates in an 'N' level system. The utility of such controlled phase shift gates, is demonstrated here by implementing 3-qubit Deutsch-Jozsa algorithm on a 7/2 quadrupolar nucleus oriented in a liquid crystal matrix.

T. Gopinath; Anil Kumar

2009-09-22T23:59:59.000Z

300

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U.S. and South Korea Sign Agreement on FutureGen Project | Department of  

Broader source: Energy.gov (indexed) [DOE]

South Korea Sign Agreement on FutureGen Project South Korea Sign Agreement on FutureGen Project U.S. and South Korea Sign Agreement on FutureGen Project June 26, 2006 - 2:34pm Addthis Korea to Participate in World's First Integrated Carbon Sequestration and Hydrogen Production Research Power Plant WASHINGTON, DC - U.S. Energy Secretary Samuel W. Bodman and South Korean Minister of Commerce, Industry & Energy, Chung Sye Kyun, today signed an agreement making South Korea the second country, after India, to join the United States in the FutureGen International Partnership. Korea has pledged $10 million to help build and operate the world's first zero-emissions coal-fired power plant and will sit on a government steering committee to oversee this initiative. Once operational, this plant will remove and sequester carbon dioxide while producing electricity and

302

Using the Deutsch-Jozsa algorithm to determine parts of an array and apply a specified function to each independent part  

E-Print Network [OSTI]

Using the Deutsch-Jozsa algorithm, we will develop a method for solving a class of problems in which we need to determine parts of an array and then apply a specified function to each independent part. Since present quantum computers are not robust enough for code writing and execution, we will build a model of a vector quantum computer that implements the Deutsch-Jozsa algorithm from a machine language view using the APL2 programming language. The core of the method is an operator (DJBOX) which allows evaluation of an arbitrary function f by the Deutsch-Jozsa algorithm. Two key functions of the method are GET_PARTITION and CALC_WITH_PARTITIONS. The GET_PARTITION function determines parts of an array based on the function f. The CALC_WITH_PARTITIONS function determines parts of an array based on the function f and then applies another function to each independent part. We will imagine the method is implemented on the above vector quantum computer. We will show that the method can be successfully executed.

Samir Lipovaca

2009-08-10T23:59:59.000Z

303

Existing and anticipated technology strategies for reducing greenhouse gas emissions in Korea’s petrochemical and steel industries  

Science Journals Connector (OSTI)

This study examines the existing and anticipated technology strategies for reducing greenhouse gas (GHG) emissions in Korea’s petrochemical and steel industries. The results of the cluster analysis identify three types of technology strategies employed by firms for reducing GHG emissions: “wait-and-see” “in-process-focused”, and “all-round” strategies. The “in-process-focused” strategy was the most widely used strategy, followed by the “all-round” strategy. However, firms in these industries are expected to change their technology strategies to “treatment-reliance”, “inbound-substitution”, and “all-round” strategies in 5–10 years by employing a wider range of technology options to respond more effectively to the issue of GHG emissions. The demand for new energy sources and raw material substitutes is expected to strengthen in the near future as related technologies advance rapidly and become more widely available.

Su-Yol Lee

2013-01-01T23:59:59.000Z

304

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

305

Bangladesh-Korea Information Access Center (IAC) Department of CSE, BUET, Dhaka 1000  

E-Print Network [OSTI]

Notice As per MOU signed by BUET and KADO, Korea, IAC is a self sustainable center and BUET will not pay

Rahman, A.K.M. Ashikur

306

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

307

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

308

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

309

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

310

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

311

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

312

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

313

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

314

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

315

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

316

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

317

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

318

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

319

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

320

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

322

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

323

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

324

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

325

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

326

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

327

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

328

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

329

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

330

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

331

Avian survey and field guide for Osan Air Base, Korea.  

SciTech Connect (OSTI)

This report summarizes the results of the avian surveys conducted at Osan Air Base (AB). This ongoing survey is conducted to comply with requirements of the Environmental Governing Standards (EGS) for the Republic of Korea, the Integrated Natural Resources Management Plan (INRMP) for Osan AB, and the 51st Fighter Wing's Bird Aircraft Strike Hazard (BASH) Plan. One hundred ten bird species representing 35 families were identified and recorded. Seven species are designated as Natural Monuments, and their protection is accorded by the Korean Ministry of Culture and Tourism. Three species appear on the Korean Association for Conservation of Nature's (KACN's) list of Reserved Wild Species and are protected by the Korean Ministry of Environment. Combined, ten different species are Republic of Korea (ROK)-protected. The primary objective of the avian survey at Osan AB was to determine what species of birds are present on the airfield and their respective habitat requirements during the critical seasons of the year. This requirement is specified in Annex J.14.c of the 51st Fighter BASH Plan 91-212 (51 FW OPLAN 91-212). The second objective was to initiate surveys to determine what bird species are present on Osan AB throughout the year and from the survey results, determine if threatened, endangered, or other Korean-listed bird species are present on Osan AB. This overall census satisfies Criterion 13-3.e of the EGS for Korea. The final objective was to formulate management strategies within Osan AB's operational requirements to protect and enhance habitats of known threatened, endangered, and ROK-protected species in accordance with EGS Criterion 13-3.a that are also favorable for the reproduction of indigenous species in accordance with the EGS Criterion 13-3.h.

Levenson, J.

2006-12-05T23:59:59.000Z

332

The divergence of the U.S. alliance solidarity: new relationships with South Korea and Japan after the Cold War.  

E-Print Network [OSTI]

??The United States alliance with South Korea and Japan faced new challenges in the post-Cold War period. The recent tendency shows that U.S.-South Korea alliance… (more)

Seo, Mooyoul

2009-01-01T23:59:59.000Z

333

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

334

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

335

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

336

Source contributions to carbonaceous aerosol concentrations in Korea Jaein I. Jeong a  

E-Print Network [OSTI]

fossil fuels and 65% from biofuels) and 78% (42% from fossil fuels and 36% from biofuels) to the OC Science, Kangwon National University, Kangwondo, Republic of Korea d Department of Environmental Health, School of Public Health, Seoul National University, Seoul, Republic of Korea a r t i c l e i n f o

Park, Rokjin

337

Public Approval of Plant and Animal Biotechnology in Korea: An Ordered Probit Analysis  

E-Print Network [OSTI]

Public Approval of Plant and Animal Biotechnology in Korea: An Ordered Probit Analysis Ramu Director Food policy Institute, Ho-Min Jang is Director Korean Institute of Bioscience and Biotechnology Economics. #12;2 Public Approval of Plant and Animal Biotechnology in Korea: An Ordered Probit Analysis

Neimark, Alexander V.

338

The current status of NORM/TENORM industries and establishment of regulatory framework in Korea  

Science Journals Connector (OSTI)

......Because of the rapid economic growth in Korea, the...dollars and import of coal has reached 12.4 billion...Natural radioactivity of coal and fly ash in several coal-fired power plants...Because of the rapid economic growth in Korea, the......

Byung-Uck Chang; Yongjae Kim; Jang-Jin Oh

2011-07-01T23:59:59.000Z

339

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

340

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

342

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

343

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

344

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

345

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

346

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

347

South Korea-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

South Korea-UNEP Green Economy Advisory Services South Korea-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Korea-UNEP Green Economy Advisory Services Name Korea-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country South Korea Eastern Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

348

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

349

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

350

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

351

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

352

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

353

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

354

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

355

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

356

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

357

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

358

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

359

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

360

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

362

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

363

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

364

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

365

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

366

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

367

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

368

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

369

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

370

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

371

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

372

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

373

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis…

2003-01-01T23:59:59.000Z

374

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

375

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

376

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

377

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

378

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

379

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

380

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

382

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

383

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

384

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

385

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

386

Economic Contribution of Ports to the Local Economies in Korea  

Science Journals Connector (OSTI)

Ports function as important gateways of international trade and, accordingly, they tend to be regarded as major accelerators of local economic development in the age of globalization. However, due to advancement of logistic technology, change of economic structure and so on, local benefits derived from ports show decreasing trend. In this paper, major literatures regarding port-city interface are reviewed and input-output linkage effects of ports are examined. And then, the relationship between ports and economic performances of major port cities in Korea are discussed based on empirical data of port throughput and economic indicators. According to the analyses, typical port cities of Busan and Incheon failed to get out of poor state of economic performances until lately. It seems the convenience of readily available port services cannot guarantee economic success of the cities where ports are located. Local economies may no longer benefit much from nearby ports.

Bong-min Jung

2011-01-01T23:59:59.000Z

387

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

388

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

389

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Sánchez; Eduardo Fernández-Medina

2010-06-01T23:59:59.000Z

390

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

391

PPPL teams with South Korea on the forerunner of a commercial fusion power  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PPPL teams with South Korea on the forerunner of a commercial fusion power PPPL teams with South Korea on the forerunner of a commercial fusion power station By John Greenwald December 21, 2012 Tweet Widget Facebook Like Google Plus One Schematic sketch of the proposed K-DEMO fusion facility. (Photo by Courtesy of South Korea's National Fusion Research Institute.) Schematic sketch of the proposed K-DEMO fusion facility. The U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) has joined forces with researchers in South Korea to develop a pre-conceptual design for a pioneering fusion facility in that Asian nation. The proposed device, called K-DEMO, could be completed in the mid-to-late 2030s as the final step before construction of a commercial fusion power plant that would produce clean and abundant energy for

392

Curriculum Reform in Korea: Issues and Challenges for Twenty-first Century Learning  

Science Journals Connector (OSTI)

Since the introduction of international achievement assessments, Korea has received a great deal of global attention because of its strong academic performance achieved at primary and secondary education levels. ...

Kyunghee So; Jiyoung Kang

2014-12-01T23:59:59.000Z

393

Stability and Nukes: China's Domestic Concerns over North Korea's Nuclear Program  

E-Print Network [OSTI]

While the bilateral friendship between China and North Korea was solidified and endured during the Korean war, Beijing's ties to Pyongyang have weakened considerably during the nuclear crisis on the Korean Peninsula, which emerged in October 2002...

Xu, Jun

2014-05-31T23:59:59.000Z

394

Economic feasibility of a PV system for grid-connected semiconductor facilities in South Korea  

Science Journals Connector (OSTI)

In this study, a cost optimization and sensitivity analysis were carried out for the deployment of a photovoltaic (PV) system in a semiconductor facility in South Korea. The Microgrid software (HOMER) was used...

Hyung Jong Choi; Gwon Deok Han…

2013-11-01T23:59:59.000Z

395

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

396

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

397

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

398

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

399

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv • Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

400

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

ProdiĂŠ, Aleksandar

402

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

403

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

404

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

405

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

406

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

407

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

408

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

409

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

410

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

411

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

412

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

413

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

414

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

415

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

416

[Review of] Stefan Michael Newerkla. Sprachkontakte deutsch – tschechisch – slowakisch. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische Entwicklung, Beleglage, bisherige und neue Deutungen. Zweite, durchgehend überarbeitete und aktualisierte Auflage (= Schriften über Sprachen und Texte 7)  

E-Print Network [OSTI]

— 112 — Slavia Centralis 1/2013 Ocene, zapiski, poro?ila – Reviews, Notes, Reports SteFan MiCHael neWerkla. SPracHKontaKte deutScH – tScHecHiScH – SLoWaKiScH. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische...

Greenberg, Marc L.

2013-01-01T23:59:59.000Z

417

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

418

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

419

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

420

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magańa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

422

Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.  

SciTech Connect (OSTI)

We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

2008-01-01T23:59:59.000Z

423

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

424

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

425

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

426

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

427

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

428

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

429

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

430

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

431

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

432

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

433

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

434

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

435

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

436

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

437

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

438

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

439

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

440

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a “cutoff” theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

442

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

443

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

444

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

445

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

446

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

447

Diamagnetic loop measurement in Korea Superconducting Tokamak Advanced Research machine  

SciTech Connect (OSTI)

Diamagnetic loop (DL), which consists of two poloidal loops inside the vacuum vessel, is used to measure the diamagnetic flux during a plasma discharge in the Korea Superconducting Tokamak Advanced Research (KSTAR) machine. The vacuum fluxes in the DL signal can be compensated up to 0.1 mWb by using the coefficients, which are obtained from experimental investigations, in the vacuum flux measurements during vacuum shots under same operational conditions of magnetic coils for plasma experiment in the KSTAR machine. The maximum error in the diamagnetic flux measurement due to the errors of the coefficients was estimated as {approx}0.22 mWb. From the diamagnetic flux measurements for the ohmically heated circular plasmas in the KSTAR machine, the stored energy agrees well with the estimated kinetic energy within the discrepancy of 25%. When the electron cyclotron heating, the neutral beam injection, and the ion cyclotron resonance heating are added to the ohmically heated limiter plasmas, the additional heating effects can be clearly observed from the increase of the stored energy evaluated in the DL measurement.

Bak, J. G.; Lee, S. G.; Kim, H. S. [National Fusion Research Institute, Gwahangno 113, Yuseong-Gu, Daejeon 305-333 (Korea, Republic of)

2011-06-15T23:59:59.000Z

448

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

449

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

450

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

451

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

452

Has globalization strengthened South Korea's national research system? National and international dynamics of the Triple Helix of scientific co-authorship relationships in South Korea  

Science Journals Connector (OSTI)

We trace the structural patterns of co-authorship between Korean researchers at three institutional types (university, government, and industry) and their international partners in terms of the mutual information generated in these relations. Data were ... Keywords: Co-authorship, Globalization, Innovation, International collaboration, National research system, R&D internationalization, South Korea, Triple Helix, University---industry---government relationship

Ki-Seok Kwon; Han Woo Park; Minho So; Loet Leydesdorff

2012-01-01T23:59:59.000Z

453

Business Case for Energy Efficiency in Support of Climate Change Mitigation, Economic and Societal Benefits in the Republic of Korea  

E-Print Network [OSTI]

KEMCO, 2012c. Korea's Energy Standards and Labeling: MarketBaseline Unit Energy Consumption Adjustment Market Sharesof Conserved Energy Table for Freezers Market Share Lifetime

McNeil, Michael A.

2014-01-01T23:59:59.000Z

454

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

455

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

456

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

457

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

458

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

459

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

460

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

462

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

463

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

464

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

465

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

466

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

467

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

468

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

469

HEADQUARTERS SECURITY OFFICERS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

470

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

471

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

472

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

473

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

474

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

475

South Korea-Joint Programme on Resource Efficient and Cleaner Production  

Open Energy Info (EERE)

South Korea-Joint Programme on Resource Efficient and Cleaner Production South Korea-Joint Programme on Resource Efficient and Cleaner Production (RECP) in Developing and Transition Countries Jump to: navigation, search Name South Korea-Joint Programme on Resource Efficient and Cleaner Production (RECP) in Developing and Transition Countries Agency/Company /Organization United Nations Industrial Development Organization (UNIDO), United Nations Environment Programme (UNEP) Partner Ministry of Energy, Ministry of Planning, Ministry of Finance, Ministry of Environment, Ministry of Industry Sector Climate, Energy, Water Focus Area Renewable Energy, Non-renewable Energy, Agriculture, Economic Development, Goods and Materials, Industry, People and Policy, Water Conservation Topics Background analysis, Co-benefits assessment, - Environmental and Biodiversity, - Health, - Macroeconomic, Finance, GHG inventory, Implementation, Low emission development planning, -LEDS, -NAMA, -Roadmap, -TNA, Market analysis, Pathways analysis, Policies/deployment programs, Resource assessment, Technology characterizations

476

Shallow hydraulic fracturing measurements in Korea support tectonic and seismic indicators of regional stress.  

SciTech Connect (OSTI)

We have conducted five hydraulic fracturing stress measurement campaigns in Korea, involving 13 test holes ranging in depth from 30 to 250 m, at locations from North Seoul to the southern coast of the peninsula. The measurements reveal consistent crustal stress magnitudes and directions that suggest persistence throughout western and southern Korea. The maximum horizontal stress {sigma}{sub H} is oriented between ENE-WSW and E-W, in accord with plate movement and deformation, and with directions indicated by both focal mechanism solutions from earthquakes inland and offshore as well as borehole breakouts in mainland China close to its eastern coast. With respect to magnitudes, the vertical stress is the overall minimum stress at all tested locations, suggesting a thrust faulting regime within the relatively shallow depths reached by our tests. Typically, such a stress regime becomes one favoring strike-slip at greater depths, as is also indicated by the focal mechanism solutions around Korea.

Haimson, Bezalel Cecil (University of Wisconsin, Madison, WI); Lee, Moo Yul; Song, I. (Ruhr-University Bochum, Bochum, Germany)

2003-07-01T23:59:59.000Z

477

Optimal green energy management in Jeju, South Korea – On-grid and off-grid electrification  

Science Journals Connector (OSTI)

Abstract “Green Growth” and “Sustainability” are now keywords for industrial growth engines. This research examines the economic, environmental, and technological feasibility of hybrid systems by simulating a system composed of renewable energy, an existing grid system, and a diesel generator on Jeju Island in South Korea. Korea depends heavily on oil imports. Thus, in Korea, efficient energy management is imperative. For this reason, the current Korean administration is striving to improve its energy infrastructure with the construction of stable energy supplies and reliable systems the implementation of energy policies, such as smart grids, and the diffusion of renewable energy generation sources. This study finds that the most economically feasible hybrid system is a grid-connected wind turbine–photovoltaic–battery–converter hybrid system. Given the economic feasibility of this hybrid system, implementing it would decrease the price of electricity in Jeju. Both the implications and limitations of this study will be discussed in the last section of this paper.

Heetae Kim; Seoin Baek; Eunil Park; Hyun Joon Chang

2014-01-01T23:59:59.000Z

478

The role of technology readiness in consumers' adoption of mobile internet services between South Korea and China  

Science Journals Connector (OSTI)

This study built a causal model using the technology readiness and acceptance model TRAM to identify the factors influencing the adoption of mobile internet services in South Korea and China. In order to compare South Korea and China, a survey was conducted ...

Jong Chul Oh; Sung Joon Yoon; Namho Chung

2014-05-01T23:59:59.000Z

479

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

480

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

482

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

483

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

484

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

485

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

486

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

487

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

488

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers [EERE]

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

489

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Broader source: Energy.gov (indexed) [DOE]

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

490

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Broader source: Energy.gov (indexed) [DOE]

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

491

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Broader source: Energy.gov (indexed) [DOE]

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

492

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers [EERE]

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

493

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

494

Security Enforcement Reporting Criteria | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

495

Newsletters | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

496

Speeches | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

497

Safety and Security Enforcement Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

498

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

499

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

500

Hardware Security through Design Obfuscation.  

E-Print Network [OSTI]

??Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs… (more)

Chakraborty, Rajat Subhra

2010-01-01T23:59:59.000Z