Powered by Deep Web Technologies
Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Deutsche Hochschulen Eine Erfolgsgeschichte  

E-Print Network [OSTI]

Deutsche Hochschulen Eine Erfolgsgeschichte mit Tradition Die deutschen Hochschulen genieĂ?en welt innovativ Deutsche Hochschulen geben bedeutende Impulse fĂĽr Inno vation und Fortschritt. Ă?ber 80 deutsche gleichberechtigte Partnerschaften auf. Wer sind wir? Der Deutsche Akademische Austauschdienst (DAAD) ist die

Steinhoff, Heinz-JĂĽrgen

2

LTERE DEUTSCHE LITERATUR ...............S. 1 FACHDIDAKTIK DEUTSCH ...............S. 8  

E-Print Network [OSTI]

Inhalt: �LTERE DEUTSCHE LITERATUR ...............S. 1 FACHDIDAKTIK DEUTSCH ...............S. 8 NEUERE DEUTSCHE LITERATUR ...............S. 13 �LTERE DEUTSCHE LITERATUR �DL I �ltere deutsche Literatur Mo, 10:15 ­ 11:45 Uhr HS OpWsches Museum, CZ 12 J

Rossak, Wilhelm R.

3

Zeitunglesen in der Zweitsprache Deutsch.  

E-Print Network [OSTI]

??Die Masterarbeit „Zeitunglesen in der Zweitsprache Deutsch“ stellt die lösungsorientierte Frage, inwieweit SchülerInnen mit Deutsch als Zweitsprache, die eine Haupt- oder Neue Mittelschule besuchen, mithilfe… (more)

Harter, Sonja

2013-01-01T23:59:59.000Z

4

Assicurativo | Bancario | Finanziario DEUTSCHE BANK  

E-Print Network [OSTI]

Assicurativo | Bancario | Finanziario DEUTSCHE BANK CHI SIAMO Deutsche Bank, fondata nel 1870 clientela di standing elevato e crea valore con le sue attività per gli azionisti e il personale. Deutsche Finanza & Futuro Banca. Deutsche Bank è inoltre presente sul mercato italiano con le attività di

Schettini, Raimondo

5

Deutsche Forschungsgemeinschaft Informationen fr die Wissenschaft  

E-Print Network [OSTI]

Deutsche Forschungsgemeinschaft Informationen fĂĽr die Wissenschaft Deutsche Forschungsgemeinschaft "Homotopy Theory and Algebraic Geometry" (SPP 1786) In March 2014 the Senate of Deutsche

Richter, Birgit

6

Nonlocality improves Deutsch algorithm  

E-Print Network [OSTI]

Recently, [{arXiv:0810.3134}] is accepted and published. We show that the Bell inequalities lead to a new type of linear-optical Deutsch algorithms. We have considered a use of entangled photon pairs to determine simultaneously and probabilistically two unknown functions. The usual Deutsch algorithm determines one unknown function and exhibits a two to one speed up in a certain computation on a quantum computer rather than on a classical computer. We found that the violation of Bell locality in the Hilbert space formalism of quantum theory predicts that the proposed {\\it probabilistic} Deutsch algorithm for computing two unknown functions exhibits at least a $2\\sqrt{2}(\\simeq 2.83)$ to one speed up.

Koji Nagata; Sangkyung Lee; Jaewook Ahn

2007-03-15T23:59:59.000Z

7

Deutsch and Jozsa's Algorithm Revisited  

E-Print Network [OSTI]

A classical analogue of Deutsch and Jozsa's algorithm is given and its implications on quantum computing is discussed

John W. Cooper

2006-03-27T23:59:59.000Z

8

Deutsches Forschungszentrum fr Knstliche Intelligenz  

E-Print Network [OSTI]

Deutsches Forschungszentrum für Künstliche Intelligenz 10-jähriges Dienstjubiläum PD Dr. Erica Melis / Tell DFKI Saarbrücken 01. September 2010 #12;Deutsches Forschungszentrum für, die DFG und die Europäische Union. PD Dr. Erica Melis / Tell #12;Deutsches

Melis, Erica

9

Die deutsche EntwicklungspolitikDie deutsche Entwicklungspolitik Prof. Dr. Hartmut Ihne  

E-Print Network [OSTI]

Die deutsche EntwicklungspolitikDie deutsche Entwicklungspolitik Prof. Dr. Hartmut Ihne 16 Soziologie Quelle: BMZ #12;Deutsche Akteuredimension Staatliche Akteure Parlament: AWZ + andere Ressorts Institut fĂĽr Politische Wissenschaft und Soziologie #12;Struktur deutsche EZ 1 Vorlesung ,,Aktuelle

Franz, Sven Oliver

10

Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS  

E-Print Network [OSTI]

PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

Kim, Kwangjo

11

Kinderzahnheilkunde Terminologievergleich Deutsch-Serbisch.  

E-Print Network [OSTI]

??Das Thema meiner Diplomarbeit lautet „Kinderzahnheilkunde Terminologievergleich Deutsch-Serbisch“. Die Arbeit ist in drei Teile aufgeteilt: in einen soziologischen, einen medizinischen und einen Terminologieteil. Der Schwerpunkt… (more)

Dobric, Sandra

2009-01-01T23:59:59.000Z

12

Beispielprfung Fach: Deutsch: Textwiedergabe/produktive Aufgabe  

E-Print Network [OSTI]

BeispielprĂĽfung Fach: Deutsch: Textwiedergabe/produktive Aufgabe Kurs: T Hilfsmittel: einsprachiges Hybridantrieb. Gerade geht das erste deutsche Hybridauto mit der Verbindung von Elektro- und Benzinmotor

Greifswald, Ernst-Moritz-Arndt-Universität

13

Deutsche Bank Deutsche Bank S.p.A. la consociata italiana di Deutsche Bank AG che, con oltre  

E-Print Network [OSTI]

Deutsche Bank Deutsche Bank S.p.A. è la consociata italiana di Deutsche Bank AG che, con oltre 100.000 collaboratori in più di 72 Paesi nel mondo, vanta più di 24 milioni di clienti. Deutsche Bank ricerca brillanti

Robbiano, Lorenzo

14

N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Sprachzeugnis fr deutsche Bewerber  

E-Print Network [OSTI]

N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Sprachzeugnis fĂĽr deutsche Bewerber Name Internationales Outgoings #12;N:\\int\\alle\\BERATUNG\\Sprachtests\\Sprachzeugnis deutsch.doc Common Reference Levels

Kaus, Boris

15

Erstes deutsch-israelisches Masterprogramm Das erste deutsch-israelische Studienprogramm mit einem einheitlichen  

E-Print Network [OSTI]

Erstes deutsch-israelisches Masterprogramm Das erste deutsch-israelische Studienprogramm mit einem einheitlichen Masterabschluss wird im akademischen Jahr 2014/2015 eingefĂĽhrt. Deutsche und israelische

Heermann, Dieter W.

16

A Cavity QED Implementation of Deutsch-Jozsa Algorithm  

E-Print Network [OSTI]

The Deutsch-Jozsa algorithm is a generalization of the Deutsch algorithm which was the first algorithm written. We present schemes to implement the Deutsch algorithm and the Deutsch-Jozsa algorithm via cavity QED.

E. S. Guerra

2004-10-23T23:59:59.000Z

17

DECAN Deutsche CanSat Hhenrakete  

E-Print Network [OSTI]

DECAN ­ Deutsche CanSat Höhenrakete Department of Aeronautics and Astronautics Chair of Space Sheet Technische Universität Berlin Department of Aeronautics and Astronautics #12;The "DECAN ­ Deutsche

Berlin,Technische Universität

18

Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002  

E-Print Network [OSTI]

1 Seite 1 Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 Martin Dohlus Deutsches.1 W monopole single passage losses #12;2 Seite 2 Martin Dohlus Deutsches Elektronen Synchrotron rissen T > 70K >70K Martin Dohlus Deutsches Elektronen Synchrotron rissen dec 2002 3.3.2 foreseen in tdr #12

19

Ivan H. Deutsch Professor, Regents Lecturer  

E-Print Network [OSTI]

Ivan H. Deutsch Professor, Regents Lecturer CURRICULUM VITAE, October 2013 Dept. of Physics journals: 1. G. Bekefi, J. S. Wurtele, and I. H. Deutsch, "Free-electron laser radiation induced by a periodic dielectric medium", Physical Review A 34, 1228 (1986). 2. I. H. Deutsch and J. C. Garrison

Deutsch, Ivan H.

20

Deutsche Priorittsanmeldung; Internationale Patentanmeldung (PCT), EP Kondensator  

E-Print Network [OSTI]

Deutsche Prioritätsanmeldung; Internationale Patentanmeldung (PCT), EP TM 420 Kondensator mit Technology Access offered by Hessische Intellectual Property Organisation #12; Deutsche Prioritätsanmeldung als Sensor für chemische Substanzen Patentstatus Deutsche Prioritätsanmeldung wurde im Nov. 2009

Haller-Dintelmann, Robert

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Deutsch als Zweitsprache in der Lehrerausbildung  

E-Print Network [OSTI]

Deutsch als Zweitsprache in der Lehrerausbildung Bedarf ­ Umsetzung ­ Perspektiven Dokumentation. Jörg Roche, Ludwig-Maximilians-Universität München Deutsch als Zweitsprache in der Lehrerausbildung Deutsch als Fremdsprache, Ludwig- Maximilians-Universität München Wie wird die Qualität der Da

Prediger, Susanne

22

Deutsches Elektronen-Synchrotron DESY Interne Verffentlichung  

E-Print Network [OSTI]

Deutsches Elektronen-Synchrotron DESY Interne Veröffentlichung DESY-Rundschreiben Nr.: 45/2006 DESY- Gemeinschaft, unterzeichnet wurde, unterstützt das Deutsche Elektronen-Synchrotron die Open- Access research organizations, the Helmholtz Association among them, the Deutsches Elektronen-Synchrotron supports

23

Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)  

E-Print Network [OSTI]

Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro�en Einfluss auf eine Vielzahl zellulä- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte Spermienmotilität. #12; Deutsches

Haller-Dintelmann, Robert

24

Deutsch Algorithm on Classical Circuits  

E-Print Network [OSTI]

The well-known Deutsch Algorithm (DA) and Deutsch-Jozsha Algorithm (DJA) both are used as an evidence to the power of quantum computers over classical computation mediums. In these theoretical experiments, it has been shown that a quantum computer can find the answer with certainty within a few steps although classical electronic systems must evaluate more iterations than quantum computer. In this paper, it is shown that a classical computation system formed by using ordinary electronic parts may perform the same task with equal performance than quantum computers. DA and DJA quantum circuits act like an analog computer, so it is unfair to compare the bit of classical digital computers with the qubit of quantum computers. An analog signal carrying wire will of course carry more information that a bit carrying wire without serial communication protocols.

Osman Kaan Erol

2008-03-21T23:59:59.000Z

25

A Generalization of Deutsch's Example  

E-Print Network [OSTI]

Quantum parallelism is the main feature of quantum computation. In 1985 D. Deutsch showed that a single quantum computation may be sufficient to state whether a two-valued function of a two-valued variable is constant or not. Though the generalized problem with unconstrained domain and range size admits no deterministic quantum solution, a fully probabilistic quantum algorithm is presented in which quantum parallelism is harnessed to achieve a quicker exploration of the domain with respect to the classical ``sampling'' strategy.

Giovanni Costantini; Fabrizio Smeraldi

1997-02-07T23:59:59.000Z

26

Soziale Beziehungen und Unterrichtsklima im Deutsch als Fremdsprache–/Deutsch als Zweitsprache–Unterricht.  

E-Print Network [OSTI]

??In der vorliegenden Arbeit wird das Konzept „Klima“ in Bezug auf den Deutsch als Fremdsprache–/Deutsch als Zweitsprache–Unterricht untersucht. Es wird dargestellt, welchen Stellenwert ein positives… (more)

Tischler, Christina

2013-01-01T23:59:59.000Z

27

Märchenfilme im Unterricht Deutsch als Fremdsprache.  

E-Print Network [OSTI]

??Diese Masterarbeit befasst sich mit dem Einsatz von Märchenfilmen im Unterricht Deutsch als Fremdsprache und versucht folgende Fragen zu beantworten: Welches Potential stellen Märchenfilme für… (more)

Serdinsky, Andrea

2014-01-01T23:59:59.000Z

28

Adiabatic Quantum Computation and Deutsch's Algorithm  

E-Print Network [OSTI]

We show that by a suitable choice of a time dependent Hamiltonian, Deutsch's algorithm can be implemented by an adiabatic quantum computer. We extend our analysis to the Deutsch-Jozsa problem and estimate the required running time for both global and local adiabatic evolutions.

Saurya Das; Randy Kobes; Gabor Kunstatter

2001-11-06T23:59:59.000Z

29

Optical Antennas Palash Bharadwaj, Bradley Deutsch, and Lukas Novotny*  

E-Print Network [OSTI]

Optical Antennas Palash Bharadwaj, Bradley Deutsch, and Lukas Novotny* Institute of Optics Antennas Palash Bharadwaj, Bradley Deutsch, and Lukas Novotny 1. Introduction In optical science

Novotny, Lukas

30

Deutsch-Amerikanische Gesellschaft Siegerland-Wittgenstein e.V.  

E-Print Network [OSTI]

Deutsch-Amerikanische Gesellschaft Siegerland-Wittgenstein e.V. Vorstand: Jeane Freifrau von. 116 576 0 BLZ 370 700 24 Deutsche Bank Der Amerika Haus e.V. NRW lädt in Kooperation mit der Deutsch Frankfurter Rundschau. Der Vortrag findet auf Deutsch statt. Der Eintritt ist frei. Wir danken der DAG

Siegen, Universität

31

Österreichisches Deutsch in Lehrbüchern der Sekundarstufe I für Deutsch als Muttersprache.  

E-Print Network [OSTI]

??Bei der vorliegenden Diplomarbeit handelt es sich um eine exemplarische Studie, welche sich mit dem österreichischen Deutsch und der Einbeziehung desselben als nationale Varietät der… (more)

Heinrich, Ilona Elisabeth

2010-01-01T23:59:59.000Z

32

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

33

28. Jahrgang Juli Juristen lehren deutsches Recht in Moskau 3  

E-Print Network [OSTI]

28. Jahrgang Juli 2003 Juristen lehren deutsches Recht in Moskau 3 Zehn Jahre Partnerschaft mit Uni Regensburger Studenten im deutsch- tschechischen Koordinierungsrat 8 17. Ostbayerische Kulturtage in Amberg 9

Schubart, Christoph

34

Teilnehmer des deutsch-ukrainisch-polnischen Seminars in Tscherniwzi 2012  

E-Print Network [OSTI]

Teilnehmer des deutsch-ukrainisch-polnischen Seminars in Tscherniwzi 2012 BAYHOST & die Ukraine. Gefördert durch den DAAD veranstaltete BAYHOST zwei Deutsch - Ukrainische Seminare, die sich dem Thema

Schubart, Christoph

35

An Illustration of the Deutsch-Josza Algorithm Frank Rioux  

E-Print Network [OSTI]

An Illustration of the Deutsch-Josza Algorithm Frank Rioux Emeritus Professor of Chemistry CSB of this circuit (Deutsch-Josza algoritm) answers the question of whether the function is constant or balanced

Rioux, Frank

36

An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux  

E-Print Network [OSTI]

An Illustration of the Deutsch-Jozsa Algorithm Frank Rioux Emeritus Professor of Chemistry CSB of this circuit (Deutsch-Jozsa algoritm, p. 298 in The Quest for the Quantum Computer, by Julian Brown) answers

Rioux, Frank

37

Englische Titelbezeichnungen fr die Antragstellung Deutsch Englisch (USA) Englisch (GB)  

E-Print Network [OSTI]

Englische Titelbezeichnungen für die Antragstellung Deutsch Englisch (USA) Englisch (GB/Professor au�erplanmä�iger Professor (Privatdozent, Akademischer Rat) Adjunct Professor Adjunct Professor Deutsch Englisch

Rostock, Universität

38

Quantum Algorithm for Generalized Deutsch-Jozsa Problem  

E-Print Network [OSTI]

We generalize the Deutsch-Jozsa problem and present a quantum algorithm that can solve the generalized Deutsch-Jozsa problem by a single evaluation of a given function. We discuss the initialization of an auxiliary register and present a generalized Deutsch-Jozsa algorithm that requires no initialization of an auxiliary register.

Dong Pyo Chi; Jinsoo Kim; Soojoon Lee

2000-05-16T23:59:59.000Z

39

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Wissenschaftliche Mitarbeiterin (w/m) in Teilzeit (27,3 Std./W.) DESY Das Deutsche Elektronen-Synchrotron DESY ist E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung | Kennziffer: EM124/2014 NotkestraĂ?e

40

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Ingenieurin (w/m) der Elektrotechnik fĂĽr die Leitung der Elektronikfertigung DESY Das Deutsche Elektronen mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Prfungsordnung fr die Deutsche Sprachprfung fr den Hochschulzugang  

E-Print Network [OSTI]

1 Prüfungsordnung für die Deutsche Sprachprüfung für den Hochschulzugang ausländischer Deutsche Sprachprüfung für den Hochschulzugang ausländischer Studienbewerber als Satzung hinreichende deutsche Sprachkenntnisse nachweisen. Dies gilt auch für Bewerber mit deutscher

Greifswald, Ernst-Moritz-Arndt-Universität

42

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Engineer (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂĽhrenden Zentren Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

43

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Produktdesignerin (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂĽhrenden uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen

44

Herausgeber: Deutsche Forschungsgemeinschaft http://www.dfg.de  

E-Print Network [OSTI]

#12;Herausgeber: Deutsche Forschungsgemeinschaft http://www.dfg.de Ă?berreicht durch: Den. Christopher H. Baum Forschungsdekan der MHH #12;http://www.mh-hannover.de/forschung.html Deutsche 'Selbstkontrolle in der Wissenschaft' (Deutsch) #12;Empfehlungen der Kommission "Selbstkontrolle in der

Manstein, Dietmar J.

45

Implementation of Deutsch's Algorithm Using Mathcad Frank Rioux  

E-Print Network [OSTI]

Implementation of Deutsch's Algorithm Using Mathcad Frank Rioux The following is a Mathcad implementation of David Deutsch's quantum computer prototype as presented on pages 10-11 in "Machines, Logic and Quantum Physics" by David Deutsch, Artur Ekert, and Rossella Lupacchini, which can be found at ar

Rioux, Frank

46

Fachprfungsordnung fr den Bachelor-Teilstudiengang Deutsch als Fremdsprache  

E-Print Network [OSTI]

Fachprüfungsordnung für den Bachelor-Teilstudiengang Deutsch als Fremdsprache an der Ernst Bachelor-Teilstudiengang Deutsch als Fremd- sprache als Satzung: Inhaltsverzeichnis § 1 Geltungsbereich § 2- Teilstudiengang Deutsch als Fremdsprache. Ergänzend gilt die Gemeinsa- me Prüfungsordnung für Bachelor- und Master

Greifswald, Ernst-Moritz-Arndt-Universität

47

Ordnung fr die Studienbegleitende Ausbildung Deutsch als Zweitsprache  

E-Print Network [OSTI]

Ordnung für die Studienbegleitende Ausbildung Deutsch als Zweitsprache an der Universität Literaturwissenschaften der Universität Regensburg bietet die studienbegleitende Ausbildung Deutsch als Zweitsprache (im Fachbereichs Deutschs als Zweitsprache zu einer Unterrichtstätigkeit in diesem Bereich zu befähigen. (3) 1 Die

Schubart, Christoph

48

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Studentische IT-Hilfskräfte (w/m) 1st-Level-Support DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen

49

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein Beamline Ingenieurin (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂĽhrenden mit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

50

Jessen/Deutsch, "Optical Lattices" 1 OPTICAL LATTICES  

E-Print Network [OSTI]

Jessen/Deutsch, "Optical Lattices" 1 OPTICAL LATTICES P. S. JESSEN Optical Sciences Center@rhea.opt-sci.arizona.edu I. H. DEUTSCH Center for Advanced Studies University of New Mexico Albuquerque, NM, 87131 Phone, 1996). #12;Jessen/Deutsch, "Optical Lattices" 2 CONTENTS I. Introduction

Jessen, Poul S.

51

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein: Sachbearbeiterin Kreditoren (w/m) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit fĂĽhrenden Kindergarten. Wir freuen uns auf Ihre Bewerbung mit Angabe der Kennziffer, auch per E-Mail: Deutsches

52

A GENERALIZATION OF THE DEUTSCH-JOZSA QUANTUM ALGORITHM  

E-Print Network [OSTI]

A GENERALIZATION OF THE DEUTSCH-JOZSA QUANTUM ALGORITHM Randall R. Holmes and Frederic Texier of functions on a finite abelian group. The algorithm is patterned after and generalizes one due to Deutsch of the integers modulo two. The Deutsch-Jozsa algorithm is a quantum algorithm for distinguishing between two

Tam, Tin-Yau

53

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Beschleuniger | Forschung mit Photonen | Teilchenphysik Deutsches Elektronen-Synchrotron Ein/m) NanoLab (SEM/Mikroskopie) DESY Das Deutsche Elektronen-Synchrotron DESY ist eines der weltweit Angabe der Kennziffer, auch per E-Mail: Deutsches Elektronen-Synchrotron DESY Personalabteilung

54

A Simple Solution to Deutsch's Problem Frank Rioux  

E-Print Network [OSTI]

A Simple Solution to Deutsch's Problem Frank Rioux Emeritus Professor of Chemistry CSB. From the classical perspective, if the question (as asked by Deutsch) is whether f(x) is constant or balanced then one must calculate both f(0) and f(1) to answer the question. Deutsch pointed out

Rioux, Frank

55

Deutsche Sommerschule am Pazifik Application Instructions --5-week program  

E-Print Network [OSTI]

Deutsche Sommerschule am Pazifik Application Instructions -- 5-week program Enclosed is your application for the 5-week program of the Deutsche Sommerschule am Pazifik, including a scholarship that these applications are considered in order of receipt, so early application is strongly recommended. The Deutsche

56

Deutsch-Jozsa algorithm for continuous variables  

E-Print Network [OSTI]

We present an idealized quantum continuous variable analog of the Deutsch-Jozsa algorithm which can be implemented on a perfect continuous variable quantum computer. Using the Fourier transformation and XOR gate appropriate for continuous spectra we show that under ideal operation to infinite precision that there is an infinite reduction in number of query calls in this scheme.

Arun K. Pati; Samuel L. Braunstein

2002-07-18T23:59:59.000Z

57

Deutsch's Universal Quantum Turing Machine (Revisited)  

E-Print Network [OSTI]

Deutsch, Feynman, and Manin viewed quantum computing as a kind of universal physical simulation procedure. Much of the writing about quantum Turing machines has shown how these machines can simulate an arbitrary unitary transformation on a finite number of qubits. This interesting problem has been addressed most famously in a paper by Deutsch, and later by Bernstein and Vazirani. Quantum Turing machines form a class closely related to deterministic and probabilistic Turing machines and one might hope to find a universal machine in this class. A universal machine is the basis of a notion of programmability. The extent to which universality has in fact been established by the pioneers in the field is examined and a key notion in theoretical computer science (universality) is scrutinised. In a forthcoming paper, the authors will also consider universality in the quantum gate model.

Willem Fouché; Johannes Heidema; Glyn Jones; Petrus H. Potgieter

2007-01-16T23:59:59.000Z

58

DGfI Deutsche Gesellschaft fr Immunologie e.V.  

E-Print Network [OSTI]

DGfI Deutsche Gesellschaft für Immunologie e.V. Fritz-und-Ursula-Melchers-Preis Der Preis wird Meltzer Deutsche Gesellschaft für Immunologie e.V. c/o DRFZ, Charitéplatz 1, 10117 Berlin mail@dgfi.org Weitere Informationen www.dgfi.org #12;DGfI Deutsche Gesellschaft für Immunologie e.V. Hans

Groppe, Sven

59

Studien zur Baugeschichte des Karners in Bad Deutsch-Altenburg.  

E-Print Network [OSTI]

??Der Karner in Bad Deutsch-Altenburg ist ein zweigeschoßiger Rundbau mit reich geschmücktem Stufenportal. In dieser Diplomarbeit wurden die vorhandenen Quellen aufgearbeitet und versucht die Veränderungen… (more)

Eybl, Jutta

2012-01-01T23:59:59.000Z

60

Quantum Guessing via Deutsch-Jozsa  

E-Print Network [OSTI]

We examine the "Guessing Secrets" problem arising in internet routing, in which the goal is to discover two or more objects from a known finite set. We propose a quantum algorithm using O(1) calls to an O(logN) oracle. This improves upon the best known classical result, which uses O(logN) questions and requires an additional O(logN^3) steps to produce the answer. In showing the possibilities of this algorithm, we extend the types of questions and function oracles that the Deutsch-Jozsa algorithm can be used to solve.

Michael Nathanson

2003-01-07T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Understanding Deutsch's probability in a deterministic multiverse  

E-Print Network [OSTI]

Difficulties over probability have often been considered fatal to the Everett interpretation of quantum mechanics. Here I argue that the Everettian can have everything she needs from `probability' without recourse to indeterminism, ignorance, primitive identity over time or subjective uncertainty: all she needs is a particular *rationality principle*. The decision-theoretic approach recently developed by Deutsch and Wallace claims to provide just such a principle. But, according to Wallace, decision theory is itself applicable only if the correct attitude to a future Everettian measurement outcome is subjective uncertainty. I argue that subjective uncertainty is not to be had, but I offer an alternative interpretation that enables the Everettian to live without uncertainty: we can justify Everettian decision theory on the basis that an Everettian should *care about* all her future branches. The probabilities appearing in the decision-theoretic representation theorem can then be interpreted as the degrees to which the rational agent cares about each future branch. This reinterpretation, however, reduces the intuitive plausibility of one of the Deutsch-Wallace axioms (Measurement Neutrality).

Hilary Greaves

2003-12-15T23:59:59.000Z

62

Fourier analysis of light scattered by elongated scatterers Zeev Schiffer, Yosef Ashkenazy, Reuven Tirosh, and Mordechai Deutsch  

E-Print Network [OSTI]

Tirosh, and Mordechai Deutsch Biological stimulation of living cells is sometimes associated-Gan 52900, Israel. M. Deutsch's

Ashkenazy, Yossi "Yosef"

63

Deutsche Telekom drives open approach to apps and content stores Feb 16, 2010  

E-Print Network [OSTI]

Deutsche Telekom drives open approach to apps and content stores Feb 16, 2010 · Deutsche Telekom, allowing Deutsche Telekom customers to charge apps and other content onto their mobile phone bill key stores is planned for 2010 Deutsche Telekom today announces plans to further integrate with mobile

Deutschmann, Rainer

64

Satzung zur Streichung des Schwerpunkts Niederdeutsch in den Lehramtsstudiengngen Deutsch Gymnasium und Regionale Schule  

E-Print Network [OSTI]

1 Satzung zur Streichung des Schwerpunkts Niederdeutsch in den Lehramtsstudiengängen Deutsch Deutsch im Lehramtsstudiengang Gymnasium Die Prüfungs- und Studienordnung für den Teilstudiengang Deutsch: 1. § 2 Absatz 2 wird wie folgt gefasst: ,,(2) Für Lehramtsstudierende des Teilstudiengangs Deutsch

Greifswald, Ernst-Moritz-Arndt-Universität

65

Gruppe Zeit Ort Sprache 1 Montag, 14-16 Uhr SR Westbau UG Deutsch  

E-Print Network [OSTI]

Tabelle1 Seite 1 Gruppe Zeit Ort Sprache 1 Montag, 14-16 Uhr SR Westbau UG Deutsch 2 Montag, 14-16 Uhr SozR GMH Deutsch 3 Seminarraum A im FMF* Englisch 4 Seminarraum C im FMF* Deutsch 5 SR Westbau 2.OG Deutsch 6 Mittwoch, 14-16 Uhr HS I Englisch 7 Mittwoch, 16-18 Uhr SozR GMH Deutsch 8 SR Westbau 2

Timmer, Jens

66

Topos-theoretic Model of the Deutsch multiverse  

E-Print Network [OSTI]

The Deutsch multiverse is collection of parallel universes. In this article a formal theory and a topos-theoretic model of the Deutsch multiverse are given. For this the Lawvere-Kock Synthetic Differential Geometry and topos models for smooth infinitesimal analysis are used. Physical properties of multi-variant and many-dimensional parallel universes are discussed. Quantum fluctuations of universe geometry are considered. Photon ghosts in parallel universes are found.

Alexander K. Guts

2002-03-24T23:59:59.000Z

67

Deutsch-Jozsa algorithm as a test of quantum computation  

E-Print Network [OSTI]

A redundancy in the existing Deutsch-Jozsa quantum algorithm is removed and a refined algorithm, which reduces the size of the register and simplifies the function evaluation, is proposed. The refined version allows a simpler analysis of the use of entanglement between the qubits in the algorithm and provides criteria for deciding when the Deutsch-Jozsa algorithm constitutes a meaningful test of quantum computation.

David Collins; K. W. Kim; W. C. Holton

1998-07-03T23:59:59.000Z

68

El Salvador Korea Design Your IT Career in Korea  

E-Print Network [OSTI]

1 El Salvador ­ Korea Design Your IT Career in Korea Hwang, Wonseok Senior Volunteer of KOICA, Korea scha@korea.ac.kr #12;Who is Wonseok Hwang? · KOICA Senior Volunteer in El Salvador, 2011~2013 ­ Consejo Nacional de Ciencia y Tecnología El Salvador · President, NetPG Systems Korea · Vice President

69

Discrimination of unitary transformations in the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We describe a general framework for regarding oracle-assisted quantum algorithms as tools for discriminating between unitary transformations. We apply this to the Deutsch-Jozsa problem and derive all possible quantum algorithms which solve the problem with certainty using oracle unitaries in a particular form. We also use this to show that any quantum algorithm that solves the Deutsch-Jozsa problem starting with a quantum system in a particular class of initial, thermal equilibrium-based states of the type encountered in solution state NMR can only succeed with greater probability than a classical algorithm when the problem size exceeds $n \\sim 10^5.$

David Collins

2010-02-23T23:59:59.000Z

70

Tau auf dem Bei Alzheimer-Forschung denkt man nicht unbedingt an Teilchenbeschleuniger. Das Deutsche  

E-Print Network [OSTI]

. Das Deutsche Elektronen-Synchrotron in Hamburg, kurz DESY, hat Eva-Maria und Eckhard Mandelkow von der aller Welt kommen jährlich zu diesem Zweck an das Deutsche Elektronen-Synchrotron, kurz DESY, nach

Spang, Rainer

71

Deutsche Gesellschaft der JSPS-Stipendiaten e.V. ,,Mitglieder laden Mitglieder ein"  

E-Print Network [OSTI]

Programm Deutsche Gesellschaft der JSPS-Stipendiaten e.V. ,,Mitglieder laden Mitglieder ein:00-14:45 BegrĂĽĂ?ung Dr. Wolfgang Staguhn (Deutsche Gesellschaft der JSPS-Stipendiaten e.V.) Generalkonsul Akira

Kemper, Gregor

72

www.ianrowland.com > Items To Buy > Diana Deutsch CDs Home Items To Buy  

E-Print Network [OSTI]

www.ianrowland.com > Items To Buy > Diana Deutsch CDs Home Items To Buy Items To Buy > Auditory Illusions CDs by Diana Deutsch published by Philomel Records Actual titles: Musical Illusions and Paradoxes

73

Junior Event Deutsche Gesellschaft der JSPS-Stipendiaten e.V.  

E-Print Network [OSTI]

Junior Event Deutsche Gesellschaft der JSPS-Stipendiaten e.V. JSPS Bonn Office Seminarraum 4120. Matthias Hofmann / Prof. Dr. Keiichi Kodaira Deutsche Gesellschaft der JSPS-Stipendiaten e.V. / JSPS Bonn

Kemper, Gregor

74

Die deutsch-jdischen Beziehungen in Arnims Werk Eric Leroy du Cardonnoy (Universit de Caen)  

E-Print Network [OSTI]

1 Die deutsch-jüdischen Beziehungen in Arnims Werk Eric Leroy du Cardonnoy (Université de Caen) In diesem Beitrag wird der Frage nachgegangen, wie Achim von Arnim die deutsch- jüdischen Beziehungen Erzählungen, Theaterstücke und Romane ein sehr differenziertes Bild der deutsch-jüdischen Beziehungen. Darin

Boyer, Edmond

75

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium  

E-Print Network [OSTI]

1 Prüfungs- und Studienordnung für den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium Teilstudiengang Deutsch im Lehramtsstudiengang an Gymnasien die folgende Prüfungs- und Studienordnung als Satzung Deutsch im Lehramtsstudiengang an Gymnasien. Dieser Studiengang stellt einen Studiengang im Sinne von § 2

Greifswald, Ernst-Moritz-Arndt-Universität

76

Honors, awards, and fellowships Kendall B. Davis Deutsch Award for Excellence in Experimental Physics at MIT  

E-Print Network [OSTI]

Honors, awards, and fellowships 1994 Kendall B. Davis Deutsch Award for Excellence in Experimental Pfau Humboldt postdoctoral fellowship Axel Görlitz DAAD postdoctoral fellowship Shin Inouye Deutsch of the Academy of Sciences, Göttingen, Germany #12;2 2000 Ananth Chikkatur Deutsch Award for Excellence

77

Seminar: Deutsche Entwicklungspolitik: Bilanz und Herausforderungen angesichts der Millenniumsziele Europische Tagungs-  

E-Print Network [OSTI]

Seminar: Deutsche Entwicklungspolitik: Bilanz und Herausforderungen angesichts der Millenniumsziele Europäische Tagungs- und Bildungsstätte Bonn http://www.gsi-bonn.de Einladung zum Seminar Deutsche Montag, 4. Juli 2005 09.30-10.15 Uhr Sachbeitrag und Diskussion* 10.30-12.00 Uhr Deutsche

Franz, Sven Oliver

78

An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in  

E-Print Network [OSTI]

An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups and Optimization, University of Waterloo, Canada Abstract. We adapt the Deutsch-Jozsa algorithm to the context some consequences for the word problem in groups with a particular kind of presentation. 1 The Deutsch

Severini, Simone

79

Implementation of the Deutsch Jozsa algorithm on an ion-trap  

E-Print Network [OSTI]

.............................................................. Implementation of the Deutsch­ Jozsa on both sides) requires an examination of each side. However, the analogous quantum procedure (the Deutsch­Jozsa algorithm1,2 ) requires just one examination step. The Deutsch­Jozsa algorithm has been real- ized

Blatt, Rainer

80

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Regionale Schule  

E-Print Network [OSTI]

1 Prüfungs- und Studienordnung für den Teilstudiengang Deutsch im Lehramtsstudiengang Regionale), erlässt die Ernst-Moritz-Arndt-Universität Greifswald für den Teilstudiengang Deutsch im Studienordnung regelt das Studium und das Prüfungsverfahren im Teilstudiengang Deutsch im Lehramtsstudiengang

Greifswald, Ernst-Moritz-Arndt-Universität

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Deutsche Telekom and Cinterion Wireless Modules become M2M partners Dec 04, 2009  

E-Print Network [OSTI]

Deutsche Telekom and Cinterion Wireless Modules become M2M partners Dec 04, 2009 · Agreement signed governing cooperation, joint market development, activities and projects Deutsche Telekom AG and Cinterion in Deutsche Telekom's international M2M- strategy", says Rainer Deutschmann, Senior Vice President Mobile

Deutschmann, Rainer

82

Deutsche Telekom launches new integrated location-based services in selected markets across Europe  

E-Print Network [OSTI]

Deutsche Telekom launches new integrated location-based services in selected markets across Europe in Q4 last year, services will be available in 2010 in the Netherlands and other countries Deutsche and check the weather in the area. Deutsche Telekom's LBS service is truly for the mass market. From launch

Deutschmann, Rainer

83

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009  

E-Print Network [OSTI]

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009 · Customers able · Offer available first to T-Mobile Austria mobile broadband customers and Deutsche Telekom business customers in Germany from Q3 2009 · Deutsche Telekom is the first telecommunications provider to offer

Deutschmann, Rainer

84

Prfungs-und Studienordnung fr den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium  

E-Print Network [OSTI]

Prüfungs- und Studienordnung für den Teilstudiengang Deutsch im Lehramtsstudiengang Gymnasium Teilstudiengang Deutsch im Lehramtsstudiengang an Gymnasien die folgende Prüfungs- und Studienordnung als Satzung Deutsch im Lehramtsstudiengang an Gymnasien. Dieser Studiengang stellt einen Studiengang im Sinne von § 2

Greifswald, Ernst-Moritz-Arndt-Universität

85

Prfungsordnung der Universitt Heidelberg Deutsche Sprachprfung fr den Hochschulzugang auslndischer Studienbewerber (DSH)  

E-Print Network [OSTI]

Prüfungsordnung der Universität Heidelberg für die Deutsche Sprachprüfung für den Hochschulzugang nicht an einer deutsch- sprachigen Einrichtung erworben haben, müssen vor Beginn des Studiums Hochschulgesetzen der Länder für die Aufnahme des Studiums hinreichende deutsche Sprachkenntnisse nachweisen. Dieser

Heermann, Dieter W.

86

Studienordnung fr den Bachelor-Teilstudiengang Deutsch als Fremdsprache (DaF) an der  

E-Print Network [OSTI]

1 Studienordnung für den Bachelor-Teilstudiengang Deutsch als Fremdsprache (DaF) an der Ernst-Teilstudiengang Deutsch als Fremdsprache als Satzung: Inhaltsverzeichnis § 1 Geltungsbereich § 2 Studium § 3-Teilstudiengang Deutsch als Fremdsprache. Ergänzend gelten die Gemeinsame Prüfungsordnung für Bachelor- und

Greifswald, Ernst-Moritz-Arndt-Universität

87

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre and astroparticle physics as well as accelerator physics. The Photo Injector Test Facility PITZ in Zeuthen (near XFEL. As part of the accelerator R&D program of the Helmholtz Association the focus of the research

88

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre DESY DESY is one of the world's leading research centres for photon science, particle and astroparticle with universities. The DESY focus is on conventional and plasma-based accele- rators with applications in photon

89

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network [OSTI]

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre/m) Accelerator Research DESY DESY is one of the world's leading research centres for photon science, particle with universities. The DESY focus is on conventional and plasma-based accele- rators with applications in photon

90

Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables  

E-Print Network [OSTI]

We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter estimation protocol or the Deutsch-Jozsa algorithm. The parameter estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous variable eigenstates the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement.

Marcin Zwierz; Carlos A. Pérez-Delgado; Pieter Kok

2010-08-19T23:59:59.000Z

91

Studiengang Bachelor Studiengangsmoderator Zugangsinformationen Unterrichtssprache Fakultt Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4  

E-Print Network [OSTI]

A Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4 Angewandte Informatik B.A. Prof. D. Henrich Deutsch 1 Anglistik B.A. Prof. M. Steppat Deutsch 4 B Berufliche Bildung, Fachrichtung Metalltechnik B.A. Prof. U. Glatzel Deutsch Betriebswirtschaftslehre B.A. Prof. J. Sigloch Numerus Clausus

Schmidt, Matthias

92

White Matter Pathways Related to Reading Robert F. Dougherty, Gayle K. Deutsch, Roland Bammer, Armin Schwartzman, Brian A. Wandell  

E-Print Network [OSTI]

White Matter Pathways Related to Reading Robert F. Dougherty, Gayle K. Deutsch, Roland Bammer) and children (Deutsch, in press) · Here we identify the major pathways involved in the FA results from Deutsch tensor imaging using single-shot sense-epi. MRM, 48: 128-36. · Deutsch et al. (in press). Correlations

Dougherty, Bob

93

Nonlocality and information flow: The approach of Deutsch and Hayden  

E-Print Network [OSTI]

Deutsch and Hayden claim to have provided an account of quantum mechanics which is particularly local, and which clarifies the nature of information transmission in entangled quantum systems. In this paper, a perspicuous description of their formalism is offered and their claim assessed. It proves essential to distinguish, as Deutsch and Hayden do not, between two ways of interpreting the formalism. On the first, conservative, interpretation, no benefits with respect to locality accrue that are not already available on either an Everettian or a statistical interpretation; and the conclusions regarding information flow are equivocal. The second, ontological, interpretation, offers a framework with the novel feature that global properties of quantum systems are reduced to local ones; but no conclusions follow concerning information flow in more standard quantum mechanics.

C. G. Timpson

2003-12-18T23:59:59.000Z

94

Ghost spinors, shadow electrons and the Deutsch Multiverse  

E-Print Network [OSTI]

In this article a new solution of the Einstein-Dirac's equations is presented. There are ghost spinors, i.e. the stress-energy tensor is equal to zero and the current of these fields is non-zero vector. Last the ghost neutrino was found. These ghost spinors and shadow particles of Deutsch are identified. And in result the ghost spinors have a physical interpretation and solutions of the field equations for shadow electrons as another shadow particles are found.

Elena V. Palesheva

2001-08-05T23:59:59.000Z

95

De-Quantising the Solution of Deutsch's Problem  

E-Print Network [OSTI]

Probably the simplest and most frequently used way to illustrate the power of quantum computing is to solve the so-called {\\it Deutsch's problem}. Consider a Boolean function $f: \\{0,1\\} \\to \\{0,1\\}$ and suppose that we have a (classical) black box to compute it. The problem asks whether $f$ is constant (that is, $f(0) = f(1)$) or balanced ($f(0) \

Cristian S. Calude

2006-10-26T23:59:59.000Z

96

Nr. 73 / 06 vom 31. Oktober 2006 fr die Deutsche Sprachprfung  

E-Print Network [OSTI]

Nr. 73 / 06 vom 31. Oktober 2006 Ordnung für die Deutsche Sprachprüfung für den Hochschulzugang an der Universität Paderborn Vom 31. Oktober 2006 #12;2 Ordnung für die Deutsche Sprachprüfung für den besitzen. Dieser Nachweis kann gemä� § 2 Nr. 1 in Verbindung mit § 6 der ,,Rahmenordnung über deutsche

Hellebrand, Sybille

97

Ordnung fr die Deutsche Sprachprfung fr den Hochschulzugang auslndischer Studienbewerber (DSH)  

E-Print Network [OSTI]

Ordnung für die Deutsche Sprachprüfung für den Hochschulzugang ausländischer Studienbewerber (DSH mit der Rahmenordnung über Deutsche Sprachprüfungen für das Studium an deutschen Hochschulen (RO Senatsausschusses für Studium und Lehre vom 15. Juni 2005 folgende Ordnung für die Deutsche Sprachprüfung für den

Hanke-Bourgeois, Martin

98

Nr. 03 / 13 vom 31. Januar 2013 Ordnung fr die Deutsche Sprachprfung  

E-Print Network [OSTI]

Nr. 03 / 13 vom 31. Januar 2013 Ordnung für die Deutsche Sprachprüfung für den Hochschulzugang an der Universität Paderborn Vom 31. Januar 2013 #12;2 Ordnung für die Deutsche Sprachprüfung für den Hochschulrahmengesetz (HRG) und in den Hochschulgesetzen der Länder für die Aufnahme des Studiums hinreichende deutsche

Hellebrand, Sybille

99

Nr. 30 / 07 vom 27. Juni 2007 fr die deutsche Sprachprfung  

E-Print Network [OSTI]

1 Nr. 30 / 07 vom 27. Juni 2007 Ordnung für die deutsche Sprachprüfung für den Hochschulzugang an der Universität Paderborn Vom 27. Juni 2007 #12;2 Ordnung für die Deutsche Sprachprüfung für den besitzen. Dieser Nachweis kann gemä� § 2 Nr. 1 in Verbindung mit § 6 der ,,Rahmenordnung über deutsche

Hellebrand, Sybille

100

An elementary derivation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

Quantum computing takes fully advantage of the superposition principle to increase greatly (even exponentially) the speed of calculations, relative to the classical approach. The Deutsch-Jozsa algorithm is the simplest quantum algorithm illustrating this power. Unfortunately, the standard derivation involves several ingenious steps which usually leave students feeling that they could never have figured out the algorithm by themselves. We present here a different formulation of the problem which allows students to derive the algorithm using only basic knowledge of quantum mechanics and linear algebra.

Neda Amin; Patrick Labelle

2008-10-13T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Generalization of the Deutsch algorithm using two qudits  

E-Print Network [OSTI]

Deutsch's algorithm for two qubits (one control qubit plus one auxiliary qubit) is extended to two $d$-dimensional quantum systems or qudits for the case in which $d$ is equal to $2^n$, $n=1,2,...$ . This allows one to classify a certain oracle function by just one query, instead of the $2^{n-1}+1$ queries required by classical means. The given algorithm for two qudits also solves efficiently the Bernstein-Vazirani problem. Entanglement does not occur at any step of the computation.

Jose L. Cereceda

2004-07-29T23:59:59.000Z

102

Developing the Deutsch-Hayden approach to quantum mechanics  

E-Print Network [OSTI]

The formalism of Deutsch and Hayden is a useful tool for describing quantum mechanics explicitly as local and unitary, and therefore quantum information theory as concerning a "flow" of information between systems. In this paper we show that these physical descriptions of flow are unique, and develop the approach further to include the measurement interaction and mixed states. We then give an analysis of entanglement swapping in this approach, showing that it does not in fact contain non-local effects or some form of superluminal signalling.

Clare Hewitt-Horsman; Vlatko Vedral

2006-09-12T23:59:59.000Z

103

The Deutsch-Jozsa Problem: De-quantisation and Entanglement  

E-Print Network [OSTI]

The Deustch-Jozsa problem is one of the most basic ways to demonstrate the power of quantum computation. Consider a Boolean function f : {0,1}^n to {0,1} and suppose we have a black-box to compute f. The Deutsch-Jozsa problem is to determine if f is constant (i.e. f(x) = const forall x in {0,1}^n) or if f is balanced (i.e. f(x) = 0 for exactly half the possible input strings x in {0,1}^n) using as few calls to the black-box computing f as is possible, assuming f is guaranteed to be constant or balanced. Classically it appears that this requires at least 2^{n-1}+1 black-box calls in the worst case, but the well known quantum solution solves the problem with probability one in exactly one black-box call. It has been found that in some cases the algorithm can be de-quantised into an equivalent classical, deterministic solution. We explore the ability to extend this de-quantisation to further cases, and examine with more detail when de-quantisation is possible, both with respect to the Deutsch-Jozsa problem, as well as in more general cases.

Alastair A. Abbott

2009-10-11T23:59:59.000Z

104

Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables  

SciTech Connect (OSTI)

We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous-variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter-estimation protocol or the Deutsch-Jozsa algorithm. The parameter-estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous-variable eigenstates, the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement.

Zwierz, Marcin; Perez-Delgado, Carlos A.; Kok, Pieter [Department of Physics and Astronomy, University of Sheffield, Hounsfield Road, Sheffield S3 7RH (United Kingdom)

2010-10-15T23:59:59.000Z

105

Studiengnge m w Gesamt Deutsche Auslnder Angewandte Sportwissenschaften B.A. 130 102 232 226 6 4  

E-Print Network [OSTI]

Studiengänge m w Gesamt Deutsche Ausländer davon Bildungs- ausländer Bachelor Angewandte, sowie Deutsche und Ausländer, davon Bildungsausländer (Quelle: Studierendenstatistik , ITD) Dez. 1.3. 23.07.2013 #12;Studiengänge m w Gesamt Deutsche Ausländer davon Bildungs- ausländer Studiengangsstatistik

Noé, Reinhold

106

Lehrkraft fr Deutsch in China gesucht Am Sprachlehrzentrum der ,,Hubei University of Technology" in Wuhan, an dem u.a.  

E-Print Network [OSTI]

Dringend Lehrkraft für Deutsch in China gesucht Am Sprachlehrzentrum der ,,Hubei University Bergischen Universität Wuppertal und den Universitäten in Wuhan teilnehmen, Deutsch lernen, wird der Fachstudium zwei Jahre Deutsch, um das dritte Studienjahr an der Universität Wuppertal absolvieren zu können

107

Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms with Three Qubits  

E-Print Network [OSTI]

Fiber-Optics Implementation of the Deutsch-Jozsa and Bernstein-Vazirani Quantum Algorithms; published 16 April 2003) We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein will be interested in here is Deutsch's algorithm [3], the first quantum algorithm ever discovered, which was later

Cerf, Nicolas

108

Tftler im Bierkeller Richard von Schirach, Die Nacht der Physiker, Heisenberg, Hahn, Weizscker und die deutsche Bombe  

E-Print Network [OSTI]

und die deutsche Bombe 272 Seiten, Berenberg Verlag, Berlin 2012, 25 Euro Der Abwurf der ersten Reichsmark in die deutsche Forschung. Daneben war die Motivation der Wis- senschaftler ein zweiter Schlüssel- senberg rückblickend feststellte, bleibt auch für Schirach eine plausible Erklärung für das deutsche

109

A bio-inspired location search algorithm for peer to peer Sachin Kulkarni, Niloy Ganguly, Geoffrey Canright, Andreas Deutsch . . . 1  

E-Print Network [OSTI]

Ganguly, Geoffrey Canright, Andreas Deutsch . . . 1 #12;List of Contributors Sachin Kulkarni Department.canright@telenor.com Andreas Deutsch Center for Information Services and High Performance Computing (ZIH), TU-Dresden, Dresden 01062 andreas.deutsch@tu-dresden.de #12;A bio-inspired location search algorithm for peer to peer

Ganguly, Niloy

110

Zweite Satzung zur nderung der Zulassungsordnung der Universitt Stuttgart fr den Deutsch-Franzsischen Masterstudiengang Empirische Politik-und Sozialforschung  

E-Print Network [OSTI]

1 Zweite Satzung zur �nderung der Zulassungsordnung der Universität Stuttgart für den Deutsch Zulassungsordnung für den Deutsch-Französischen Mas- terstudiengang Empirische Politik- und Sozialforschung vom 27: ,,(2) Wurden im deutsch-französischen Bachelorstudiengang oder im gleichwertigen Stu- diengang nicht

Möbius, Bernd

111

Everettian Rationality: defending Deutsch's approach to probability in the Everett interpretation  

E-Print Network [OSTI]

An analysis is made of Deutsch's recent claim to have derived the Born rule from decision-theoretic assumptions. It is argued that Deutsch's proof must be understood in the explicit context of the Everett interpretation, and that in this context, it essentially succeeds. Some comments are made about the criticism of Deutsch's proof by Barnum, Caves, Finkelstein, Fuchs, and Schack; it is argued that the flaw which they point out in the proof does not apply if the Everett interpretation is assumed. A longer version of this paper, entitled "Quantum Probability and Decision Theory, Revisted", is also available online.

David Wallace

2003-03-10T23:59:59.000Z

112

Solution of the Deutsch-Josza Problem by NMR Ensemble Computing without Sensitivity Scaling  

E-Print Network [OSTI]

Experimental NMR implementations of the Deutsch-Josza quantum algorithm based on pesudo-pure spin states exhibit an exponential sensitivity scaling with the number of qubits. By employing truly mixed spin states in spin Liouville space, where molecules with different nuclear spin configurations represent different input states, the Deutsch-Josza problem can be solved by single function evaluation without sensitivity loss concomitant with increase of the number of bits.

F. M. Woodward; R. Brüschweiler

2000-06-06T23:59:59.000Z

113

Implementing the Deutsch's algorithm with spin-orbital angular momentum of photon without interferometer  

E-Print Network [OSTI]

Deutsch's algorithm is the simplest quantum algorithm which shows the acceleration of quantum computer. In this paper, we theoretically advance a scheme to implement quantum Deutsch's algorithm in spin-orbital angular momentum space. Our scheme exploits a newly developed optical device called "q-plate", which can couple and manipulate the spin-orbital angular momentum simultaneously. This experimental setup is of high stability and efficiency theoretically for there is no interferometer in it.

Pei Zhang; Yan Jiang; Rui-Feng Liu; Hong Gao; Hong-Rong Li; Fu-Li Li

2012-07-24T23:59:59.000Z

114

Hybrid and optical implementation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A hybrid model of the Deutsch-Jozsa algorithm is presented, inspired by the proposals of hybrid computation by S. Lloyd and P. van Loock et. al. The model is based on two observations made about both the discrete and continuous algorithms already available. First, the Fourier transform is a single-step operation in a continuous-variable (CV) setting. Additionally, any implementation of the oracle is nontrivial in both schemes. The steps of the computation are very similar to those in the CV algorithm, with the main difference being the way in which the qunats, or quantum units of analogic information, and the qubits interact in the oracle. Using both discrete and continuous states of light, linear devices, and photo-detection, an optical implementation of the oracle is proposed. For simplicity, infinitely squeezed states are used in the continuous register, whereas the optical qubit is encoded in the dual-rail logic of the KLM protocol. The initial assumption of ideal states as qunats will be dropped to study the effects of finite squeezing in the quality of the computation.

Luis A. Garcia; Jagdish R. Luthra

2009-12-31T23:59:59.000Z

115

Quantum entanglement in the NMR implementation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A scheme to execute an n-bit Deutsch-Jozsa (D-J) algorithm using n qubits has been implemented for up to three qubits on an NMR quantum computer. For the one and two bit Deutsch problem, the qubits do not get entangled, hence the NMR implementation is achieved without using spin-spin interactions. It is for the three bit case, that the manipulation of entangled states becomes essential. The interactions through scalar J-couplings in NMR spin systems have been exploited to implement entangling transformations required for the three bit D-J algorithm.

Arvind; Kavita Dorai; Anil Kumar

1999-09-22T23:59:59.000Z

116

Two-bit Deutsch-Jozsa algorithm using an atomic ensemble  

E-Print Network [OSTI]

The first optical proposal for the realization of the two-bit version of the Deutsch-Jozsa algorithm [D. Deutsch and R. Jozsa, Proc. R. Soc. London A {\\bf 493}, 553 (1992)] is presented. The proposal uses Stark shifts in an ensemble of atoms and degenerate sources of photons. The photons interact dispersively with an atomic ensemble, leading to an effective Hamiltonian in atom-field basis, which is useful for performing the required two-qubit operations. Combining these with a set of one-qubit operations, the algorithm can be implemented. A discussion of the experimental feasibility of the proposal is given.

Shubhrangshu Dasgupta; G. S. Agarwal

2006-01-16T23:59:59.000Z

117

Extending the Promise of the Deutsch--Jozsa--Hoyer Algorithm for Finite Groups  

E-Print Network [OSTI]

Hoyer has given a generalisation of the Deutsch--Jozsa algorithm which uses the Fourier transform on a group G which is (in general) non-Abelian. His algorithm distinguishes between functions which are either perfectly balanced (m-to-one) or constant, with certainty, and using a single quantum query. Here, we show that this algorithm (which we call the Deutsch--Jozsa--Hoyer algorithm) can in fact deal with a broader range of promises, which we define in terms of the irreducible representations of G.

Michael Batty; Samuel L. Braunstein; Andrew J. Duncan

2004-12-08T23:59:59.000Z

118

Simple scheme for implementing the Deutsch-Jozsa algorithm in thermal cavity  

E-Print Network [OSTI]

We present a simple scheme to implement the Deutsch-Jozsa algorithm based on two-atom interaction in a thermal cavity. The photon-number-dependent parts in the evolution operator are canceled with the strong resonant classical field added. As a result, our scheme is immune to thermal field, and does not require the cavity to remain in the vacuum state throughout the procedure. Besides, large detuning between the atoms and the cavity is not necessary neither, leading to potential speed up of quantum operation. Finally, we show by numerical simulation that the proposed scheme is equal to demonstrate the Deutsch-Jozsa algorithm with high fidelity.

Wen-Xing Yang; Zhe-Xuan Gong

2006-11-22T23:59:59.000Z

119

Fnfte Satzung zur nderung der Fachstudien-und Prfungsordnung fr das Fach Deutsch im Lehramtsstudiengang an der Friedrich-Alexander-  

E-Print Network [OSTI]

Fünfte Satzung zur �nderung der Fachstudien- und Prüfungsordnung für das Fach Deutsch im Prüfungsordnung für das Fach Deutsch im Lehramtsstudiengang an der Friedrich-Alexander-Universität Erlangen

Fiebig, Peter

120

Deutsch-Franzsisches Parlaments-Praktikum 2014/2015 Echange Franco-Allemand d'Assistants Parlementaires Stagiaires 2014/2015  

E-Print Network [OSTI]

Deutsch-Französisches Parlaments-Praktikum 2014/2015 Echange Franco-Allemand d verbinden. Bewerbungsbedingungen 1. Deutsche Staatsbürgerschaft 2. Nicht länger als vier Jahre

Greifswald, Ernst-Moritz-Arndt-Universität

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Deutsch-Franzsisches Parlaments-Praktikum 2013/2014 Echange Franco-Allemand d'Assistants Parlementaires Stagiaires 2013/2014  

E-Print Network [OSTI]

Deutsch-Französisches Parlaments-Praktikum 2013/2014 Echange Franco-Allemand d verbinden. Bewerbungsbedingungen 1. Deutsche Staatsbürgerschaft 2. Nicht länger als vier Jahre

Schubart, Christoph

122

Translated from Deutsches rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 1 of 30  

E-Print Network [OSTI]

Translated from Deutsches Ă?rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 1 measurement accuracy in quantitative laboratory analyses for medical purposes. #12;Translated from Deutsches Deutsches Ă?rzteblatt, Vol. 98, No. 42, 19 October 2001, pp. A 2747 to A 2759 Page 3 of 30 consists

Rodriguez, Carlos

123

Veranstalltungsform Titel Sprache SWS ECTS Prfung Seminar Aktuelle Probleme der Wirtschafts-und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zustzlich Hausarbeit (ECTS: 4)  

E-Print Network [OSTI]

Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zusätzlich Hausarbeit (ECTS: 4) Seminar Arbeits- und Lebenswelten in der Literatur Deutsch 2 2 bis 3 Referat/Präsentation (2 ECTS), zusätzlich Protokoll, Hausarbeit (3 ECTS) Workshop Decision Making in Complex Systems ­ Part II Deutsch 1 1 Essay and Mini

Cremers, Daniel

124

Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-Universitt Marburg, Fachbereich Physik, Hans-Meerwein-Str., MZG-C6, 35032 Marburg  

E-Print Network [OSTI]

Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-Universität Marburg, Fachbereich Physik, Hans Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps-Universität Marburg, Fachbereich Physik, Hans.terahertzcenter.de E-Mail: info@terahertzcenter.de #12;Deutsches Terahertz-Zentrum e.V. Anschrift: Philipps

Schubart, Christoph

125

Veranstalltungsform Titel Untertitel Sprache SWS ECTS Prfung Seminar Aktuelle Probleme der Wirtschafts-und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zustzlich Hausarbeit (ECTS: 4)  

E-Print Network [OSTI]

Wirtschafts- und Unternehmensethik Deutsch 3 2-4 Referat (ECTS: 2) zusätzlich Hausarbeit (ECTS: 4) Seminar Arbeits- und Lebenswelten in der Literatur Deutsch 2 2 bis 3 Referat/Präsentation (2 ECTS), zusätzlich in modelling complex systems ­ Agents in NetworksDeutsch 1 1 Essay and Mini-Simulation Project Seminar Der

Cengarle, MarĂ­a Victoria

126

Scalable method for demonstrating the Deutsch-Jozsa and Bernstein-Vazirani algorithms using cluster states  

SciTech Connect (OSTI)

We show that fundamental versions of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms can be performed using a small entangled cluster state resource of only six qubits. We then investigate the minimal resource states needed to demonstrate general n-qubit versions and a scalable method to produce them. For this purpose, we propose a versatile photonic on-chip setup.

Tame, M. S.; Kim, M. S. [QOLS, Blackett Laboratory, Imperial College London, Prince Consort Road, SW7 2BW, United Kingdom and Institute for Mathematical Sciences, Imperial College London, SW7 2PG (United Kingdom)

2010-09-15T23:59:59.000Z

127

Non-locality and gauge freedom in Deutsch and Hayden's formulation of quantum mechanics  

E-Print Network [OSTI]

Deutsch and Hayden have proposed an alternative formulation of quantum mechanics which is completely local. We argue that their proposal must be understood as having a form of `gauge freedom' according to which mathematically distinct states are physically equivalent. Once this gauge freedom is taken into account, their formulation is no longer local.

David Wallace; Chris Timpson

2005-03-16T23:59:59.000Z

128

A modified quantum adiabatic evolution for the Deutsch-Jozsa problem  

E-Print Network [OSTI]

Deutsch-Jozsa algorithm has been implemented via a quantum adiabatic evolution by S. Das et al. [Phys. Rev. A 65, 062310 (2002)]. This adiabatic algorithm gives rise to a quadratic speed up over classical algorithms. We show that a modified version of the adiabatic evolution in that paper can improve the performance to constant time.

Zhaohui Wei; Mingsheng Ying

2005-12-01T23:59:59.000Z

129

Optical implementation of Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms in eight dimensions  

E-Print Network [OSTI]

We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms for 8-point functions. The measured visibility of the 8-path interferometer is about 97.5%. Potential applications of our setup to quantum communication or cryptographic protocols using several qubits are discussed.

E. Brainis; L. -P. Lamoureux; N. J. Cerf; Ph. Emplit; M. Haelterman; S. Massar

2002-12-24T23:59:59.000Z

130

Scheme for implementing the Deutsch-Jozsa algorithm via atomic ensembles  

E-Print Network [OSTI]

We propose a physical scheme for implementing the Deutsch-Jozsa algorithm using atomic ensembles and optical devices. The scheme has inherent fault tolerance to the realistic noise and efficient scaling with the number of ensembles for some entangled states within the reach of current technology. It would be an important step toward more complex quantum computation via atomic ensembles.

Ping Dong; Zheng-Yuan Xue; Ming Yang; Zhuo-Liang Cao

2005-10-18T23:59:59.000Z

131

18/11/08 11:48 AMReview of "The Psychology Of Music, 2nd Ed." Page 1 of 13http://ego.psych.mcgill.ca/levitin.html/pubspages/Deutsch.html  

E-Print Network [OSTI]

18/11/08 11:48 AMReview of "The Psychology Of Music, 2nd Ed." Page 1 of 13http://ego.psych.mcgill.ca/levitin.html/pubspages/Deutsch.html Diana Deutsch (Ed), The Psychology of Music, Second Edition, San Diego:Diana Deutsch (Ed was. At the time of its initial publication in 1982, Diana Deutsch's "The Psychology of Music

Levitin, Daniel

132

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

133

October 10th Daejeon Convention Center, KOREA  

E-Print Network [OSTI]

using pilot devices during the construction phase of International Thermonuclear Experimental Reactor Thermonuclear Experimental Reactor European Union Russia China Japan United States of America India Korea #12

134

Die Rolle der Plurizentrik beim Erlernen von Deutsch als Fremdsprache in Polen, dargestellt anhand einer Befragung von Deutschlehrern.  

E-Print Network [OSTI]

??Die vorliegende Arbeit versucht, zum einen die Berücksichtigung der Plurizentrik durch Lehrkräfte im Deutsch-als-Fremdsprache-Unterricht in polnischen Lyzeen darzustellen, zum anderen zur Einbeziehung verschiedener Varietäten der… (more)

Onak, Monika

2013-01-01T23:59:59.000Z

135

Experimental Realization of Deutsch's Algorithm in a One-way Quantum Computer  

E-Print Network [OSTI]

We report the first experimental demonstration of an all-optical one-way implementation of Deutsch's quantum algorithm on a four-qubit cluster state. All the possible configurations of a balanced or constant function acting on a two-qubit register are realized within the measurement-based model for quantum computation. The experimental results are in excellent agreement with the theoretical model, therefore demonstrating the successful performance of the algorithm.

M. S. Tame; R. Prevedel; M. Paternostro; P. Böhi; M. S. Kim; A. Zeilinger

2006-11-17T23:59:59.000Z

136

Orchestrating an NMR quantum computation: the N=3 Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A detailed description of the development of a three qubit NMR realization of the Deutsch-Jozsa algorithm [Collins et.al., Phys. Rev. A 62, 022304 (2000)] is provided. The theoretical and experimental techniques used for the reduction of the algorithm's evolution steps into a sequence of NMR pulses are discussed at length. This includes the description of general pulse sequence compilation techniques, various schemes for indirectly coupled gate realizations, experimental pulse parameterization techniques and bookkeeping methods for pulse phases.

David Collins; K. W. Kim; W. C. Holton; H. Sierzputowska-Gracz; E. O. Stejskal

2001-05-10T23:59:59.000Z

137

Scaling issues in ensemble implementations of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We discuss the ensemble version of the Deutsch-Jozsa (DJ) algorithm which attempts to provide a "scalable" implementation on an expectation-value NMR quantum computer. We show that this ensemble implementation of the DJ algorithm is at best as efficient as the classical random algorithm. As soon as any attempt is made to classify all possible functions with certainty, the implementation requires an exponentially large number of molecules. The discrepancies arise out of the interpretation of mixed state density matrices.

Arvind; David Collins

2003-07-21T23:59:59.000Z

138

Scheme for implementing the Deutsch-Jozsa algorithm in cavity QED  

SciTech Connect (OSTI)

We propose a scheme for realizing the Deutsch-Jozsa algorithm in cavity QED. The scheme is based on the resonant interaction of atoms with a cavity mode. The required experimental techniques are within the scope of what can be obtained in the microwave cavity QED setup. The experimental implementation of the scheme would be an important step toward more complex quantum computation in cavity QED.

Zheng Shibiao [Department of Electronic Science and Applied Physics, Fuzhou University, Fuzhou 350002 (China)

2004-09-01T23:59:59.000Z

139

Korea's Green Growth Strategy: Mitigating Climate Change and...  

Open Energy Info (EERE)

Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Jump to: navigation, search Name Korea's Green Growth Strategy: Mitigating Climate Change...

140

United States-Republic of Korea (ROK) International Nuclear Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

United States-Republic of Korea (ROK) International Nuclear Energy Research Initiative (INERI) Annual Steering Committee Meeting United States-Republic of Korea (ROK) International...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Sunpower Korea | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen, Minnesota:36052°,Sunfield, Michigan:Sunnyvale,Korea Jump to:

142

Transactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007  

E-Print Network [OSTI]

of the deterministic guidance contained in this Regulatory Guide, in conjunction with NEI (Nuclear Energy InstituteTransactions of the Korean Nuclear Society Autumn Meeting PyeongChang, Korea, October 25-26, 2007 " MCR " . Guideline of Cyber Security Policy for Digital I&C Systems in Nuclear Power Plant Zeen

Kim, Kwangjo

143

Förderung von Deutsch als Zweitsprache durch generatives Schreiben auf Basis einer Sprachstandsdiagnose nach USB DaZ in Ö im morphologisch-syntaktischen Bereich.  

E-Print Network [OSTI]

??Diese Masterarbeit beschäftigt sich mit dem Zusammenspiel von Sprachstandsdiagnose und Sprachförderung. Praktisch umgesetzt wurde dies in der Erstellung von Übungen, die der Förderung von Deutsch… (more)

Scharinger, Ursula

2013-01-01T23:59:59.000Z

144

Potential Collaborative Research topics with Korea’s Agency for Defense Development  

SciTech Connect (OSTI)

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

145

Circuit QED: Implementation of the three-qubit refined Deutsch-Jozsa quantum algorithm  

E-Print Network [OSTI]

We propose a protocol to construct the 35 $f$-controlled phase gates of a three-qubit refined Deutsch-Jozsa (DJ) algorithm, by using single-qubit $\\sigma_z$ gates, two-qubit controlled phase gates, and two-target-qubit controlled phase gates. Using this protocol, we discuss how to implement the three-qubit refined DJ algorithm with superconducting transmon qutrits resonantly coupled to a single cavity. Our numerical calculation shows that implementation of this quantum algorithm is feasible within the present circuit QED technique. The experimental realization of this algorithm would be an important step toward more complex quantum computation in circuit QED.

Qi-Ping Su; Chui-Ping Yang

2014-10-12T23:59:59.000Z

146

Experimental demonstration of the Deutsch-Jozsa algorithm in homonuclear multispin systems  

SciTech Connect (OSTI)

Despite early experimental tests of the Deutsch-Jozsa (DJ) algorithm, there have been only a very few nontrivial balanced functions tested for register number n>3. In this paper, we experimentally demonstrate the DJ algorithm in four- and five-qubit homonuclear spin systems by the nuclear-magnetic-resonance technique, by which we encode the one function evaluation into a long shaped pulse with the application of the gradient ascent algorithm. Our work, dramatically reducing the accumulated errors due to gate imperfections and relaxation, demonstrates a better implementation of the DJ algorithm.

Wu Zhen; Luo Jun; Feng Mang [State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Li Jun; Zheng Wenqiang; Peng Xinhua [Hefei National Laboratory for Physics Sciences at Microscale, Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China)

2011-10-15T23:59:59.000Z

147

Implementation of the refined Deutsch-Jozsa algorithn on a 3-bit NMR quantum computer  

E-Print Network [OSTI]

We implemented the refined Deutsch-Jozsa algorithm on a 3-bit nuclear magnetic resonance quantum computer, which is the meaningful test of quantum parallelism because qubits are entangled. All of the balanced and constant functions were realized exactly. The results agree well with theoretical predictions and clearly distinguish the balanced functions from constant functions. Efficient refocusing schemes were proposed for the soft z-pulse and J-coupling and it is proved that the thermal equilibrium state gives the same results as the pure state for this algorithm.

Jaehyun Kim; Jae-Seung Lee; Soonchil Lee; Chaejoon Cheong

1999-10-04T23:59:59.000Z

148

Cavity QED implementation of the multi-qubit refined Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We theoretically study the realization of a multi-qubit refined Deutsch-Jozsa (DJ) algorithm using resonant interaction of many Rydberg atoms with a single-mode microwave cavity, in which the multi-qubit controlled phase gates could be accomplished efficiently. We show how to achieve a multi-qubit refined DJ algorithm in high fidelity, even in the case of a weak cavity decay and some imperfection. We argue that the required operations in our scheme are almost within the present experimental possibilities.

Wan Li Yang; Chang Yong Chen; Zhen Yu Xu; Mang Feng

2010-02-25T23:59:59.000Z

149

The Dynamics of Entanglement in the Adiabatic Search and Deutsch Algorithms  

E-Print Network [OSTI]

The goal of this paper is to study the effect of entanglement on the running time of a quantum computation. Adiabatic quantum computation is suited to this kind of study, since it allows us to explicitly calculate the time evolution of the entanglement throughout the calculation. On the other hand however, the adiabatic formalism makes it impossible to study the roles of entanglement and fidelity separately, which means that results have to be interpreted carefully. We study two algorithms: the search algorithm and the Deutsch-Jozsa algorithm. We find some evidence that entanglement can be considered a resource in quantum computation.

K. Choy; G. Passante; D. Ahrensmeier; M. E. Carrington; T. Fugleberg; R. Kobes; G. Kunstatter

2006-05-03T23:59:59.000Z

150

Experimental realization of the Deutsch-Jozsa algorithm with a six-qubit cluster state  

SciTech Connect (OSTI)

We describe an experimental realization of the Deutsch-Jozsa quantum algorithm to evaluate the properties of a two-bit Boolean function in the framework of one-way quantum computation. For this purpose, a two-photon six-qubit cluster state was engineered. Its peculiar topological structure is the basis of the original measurement pattern allowing the algorithm realization. The good agreement of the experimental results with the theoretical predictions, obtained at {approx}1 kHz success rate, demonstrates the correct implementation of the algorithm.

Vallone, Giuseppe [Museo Storico della Fisica e Centro Studi e Ricerche Enrico Fermi, Via Panisperna 89/A, Compendio del Viminale, IT-00184 Roma (Italy); Dipartimento di Fisica, Universita Sapienza di Roma, IT-00185 Roma (Italy); Donati, Gaia; Bruno, Natalia; Chiuri, Andrea [Dipartimento di Fisica, Universita Sapienza di Roma, IT-00185 Roma (Italy); Mataloni, Paolo [Dipartimento di Fisica, Universita Sapienza di Roma, IT-00185 Roma (Italy); Istituto Nazionale di Ottica (INO-CNR), L.go E. Fermi 6, IT-50125 Florence (Italy)

2010-05-15T23:59:59.000Z

151

Implementing Deutsch-Jozsa algorithm using light shifts and atomic ensembles  

SciTech Connect (OSTI)

We present an optical scheme to implement the Deutsch-Jozsa algorithm using ac Stark shifts. The scheme uses an atomic ensemble consisting of four-level atoms interacting dispersively with a field. This leads to a Hamiltonian in the atom-field basis which is quite suitable for quantum computation. We show how one can implement the algorithm by performing proper one- and two-qubit operations. We emphasize that in our model the decoherence is expected to be minimal due to our usage of atomic ground states and freely propagating photon.

Dasgupta, Shubhrangshu; Biswas, Asoka; Agarwal, G.S. [Physical Research Laboratory, Navrangpura, Ahmedabad 380 009 (India)

2005-01-01T23:59:59.000Z

152

Experimental Realization of the Deutsch-Jozsa Algorithm with a Six-Qubit Cluster State  

E-Print Network [OSTI]

We describe the first experimental realization of the Deutsch-Jozsa quantum algorithm to evaluate the properties of a 2-bit boolean function in the framework of one-way quantum computation. For this purpose a novel two-photon six-qubit cluster state was engineered. Its peculiar topological structure is the basis of the original measurement pattern allowing the algorithm realization. The good agreement of the experimental results with the theoretical predictions, obtained at $\\sim$1kHz success rate, demonstrate the correct implementation of the algorithm.

Giuseppe Vallone; Gaia Donati; Natalia Bruno; Andrea Chiuri; Paolo Mataloni

2010-03-24T23:59:59.000Z

153

Entangling capacity of global phases and implications for Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We investigate the creation of entanglement by the application of phases whose value depends on the state of a collection of qubits. First we give the necessary and sufficient conditions for a given set of phases to result in the creation of entanglement in a state comprising of an arbitrary number of qubits. Then we analyze the creation of entanglement between any two qubits in three qubit pure and mixed states. We use our result to prove that entanglement is necessary for Deutsch-Jozsa algorithm to have an exponential advantage over its classical counterpart.

H. Azuma; S. Bose; V. Vedral

2001-02-05T23:59:59.000Z

154

An implementation of the Deutsch-Jozsa algorithm on a three-qubit NMR quantum computer  

E-Print Network [OSTI]

A new approach to the implementation of a quantum computer by high-resolution nuclear magnetic resonance (NMR) is described. The key feature is that two or more line-selective radio-frequency pulses are applied simultaneously. A three-qubit quantum computer has been investigated using the 400 MHz NMR spectrum of the three coupled protons in 2,3-dibromopropanoic acid. It has been employed to implement the Deutsch-Jozsa algorithm for distinguishing between constant and balanced functions. The extension to systems containing more coupled spins is straightforward and does not require a more protracted experiment.

N Linden H Barjat R Freeman

1998-08-21T23:59:59.000Z

155

Discrimination of unitary transformations in the Deutsch-Jozsa algorithm: Implications for thermal-equilibrium-ensemble implementations  

SciTech Connect (OSTI)

A general framework for regarding oracle-assisted quantum algorithms as tools for discriminating among unitary transformations is described. This framework is applied to the Deutsch-Jozsa problem and all possible quantum algorithms which solve the problem with certainty using oracle unitaries in a particular form are derived. It is also used to show that any quantum algorithm that solves the Deutsch-Jozsa problem starting with a quantum system in a particular class of initial, thermal equilibrium-based states of the type encountered in solution-state NMR can only succeed with greater probability than a classical algorithm when the problem size n exceeds {approx}10{sup 5}.

Collins, David [Department of Physical and Environmental Sciences, Mesa State College, 1100 North Avenue, Grand Junction, Colorado 81501 (United States)

2010-05-15T23:59:59.000Z

156

International diffusion practice : lessons from South Korea's New Village Movement  

E-Print Network [OSTI]

This research focuses on how South Korea's development model-namely, the Saemaul Undong, or the New Village Movement-is diffused internationally, in particular, to the developing country of Vietnam. South Korea's successful ...

Kim, Jung Hwa, M.C.P. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

157

Transatlantic Tensions and European Security  

E-Print Network [OSTI]

2005) “Deutsche vertrauen Putin mehr als Bush,” 23 Februarymeeting with President Vladimir Putin of Russia, the Germanthey trusted more, Bush or Putin. The results showed 29%

Sarotte, Mary Elise

2006-01-01T23:59:59.000Z

158

NMR tomography of the three-qubit Deutsch-Jozsa algorithm  

SciTech Connect (OSTI)

The optimized version of the Deutsch-Jozsa algorithm proposed by Collins et al. was implemented using the three {sup 19}F nuclear spins of 2,3,4-trifluoroaniline as qubits. To emulate the behavior of pure quantum-mechanical states pseudopure states of the ensemble were prepared prior to execution of the algorithm. Full tomography of the density matrix was employed to obtain detailed information about initial, intermediate, and final states. Information, thus obtained, was applied to optimize the pulse sequences used. It is shown that substantial improvement of the fidelity of the preparation may be achieved by compensating the effects caused by the different relaxation behavior of the different substates of the density matrix. All manipulations of the quantum states were performed under the conditions of unresolved spin-spin interactions.

Mangold, Oliver; Heidebrecht, Andreas; Mehring, Michael [2. Physikalisches Institut, University of Stuttgart, Stuttgart (Germany)

2004-10-01T23:59:59.000Z

159

"Who needs MacArthur?" : analyzing South Korea's counterinvasion capability against North Korea  

E-Print Network [OSTI]

Assuming there is another North Korean invasion; could the South Koreans counterinvade North Korea and prevail even without the United States' assistance? This paper studies the possibility of a South Korean counterinvasion ...

Chung, Jonghyuk

2011-01-01T23:59:59.000Z

160

South Korea: Hi-Tech Mecca  

E-Print Network [OSTI]

Broadcast Transcript: Greetings from South Korea, hi-tech Mecca. According to the San Francisco Chronicle, practically the entire country now has access to broadband speeds of up to 20 megabits per second. Compare that to a paltry 4 megabits per...

Hacker, Randi; Tsutsui, William

2005-10-12T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Implementation of a Deutsch-like quantum algorithm utilizing entanglement at the two-qubit level, on an NMR quantum information processor  

E-Print Network [OSTI]

We describe the experimental implementation of a recently proposed quantum algorithm involving quantum entanglement at the level of two qubits using NMR. The algorithm solves a generalisation of the Deutsch problem and distinguishes between even and odd functions using fewer function calls than is possible classically. The manipulation of entangled states of the two qubits is essential here, unlike the Deutsch-Jozsa algorithm and the Grover's search algorithm for two bits.

Kavita Dorai; Arvind; Anil Kumar

2000-06-22T23:59:59.000Z

162

Proper and improper density matrices and the consistency of the Deutsch model for Local Closed Timelike Curves  

E-Print Network [OSTI]

We discuss the concept of proper and improper density matrixes and we argue that this issue is of fundamental importance for the understanding of the quantum-mechanical CTC model proposed by Deutsch. We arrive at the conclusion that under a realistic interpretation, the distinction between proper and improper density operators is not a relativistically covariant notion and this fact leads to the conclusion that the D-CTC model is physically inconsistent.

A. C. Lobo; I. L. Paiva; P. R. Dieguez

2011-10-28T23:59:59.000Z

163

A scalable method for demonstrating the Deutsch-Jozsa and Bernstein-Vazirani algorithms using cluster states  

E-Print Network [OSTI]

We show that fundamental versions of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms can be performed using a small entangled cluster state resource of only six qubits. We then investigate the minimal resource states needed to demonstrate arbitrary n-qubit versions and a scalable method to produce them. For this purpose we propose a versatile on-chip photonic waveguide setup.

M. S. Tame; M. S. Kim

2010-03-25T23:59:59.000Z

164

Experimental Implementation of the Deutsch-Jozsa Algorithm for Three-Qubit Functions using Pure Coherent Molecular Superpositions  

E-Print Network [OSTI]

The Deutsch-Jozsa algorithm is experimentally demonstrated for three-qubit functions using pure coherent superpositions of Li$_{2}$ rovibrational eigenstates. The function's character, either constant or balanced, is evaluated by first imprinting the function, using a phase-shaped femtosecond pulse, on a coherent superposition of the molecular states, and then projecting the superposition onto an ionic final state, using a second femtosecond pulse at a specific time delay.

Jiri Vala; Zohar Amitay; Bo Zhang; Stephen R. Leone; Ronnie Kosloff

2001-07-10T23:59:59.000Z

165

Implementation schemes in NMR of quantum processors and the Deutsch-Jozsa algorithm by using virtual spin representation  

SciTech Connect (OSTI)

Schemes of experimental realization of the main two-qubit processors for quantum computers and the Deutsch-Jozsa algorithm are derived in virtual spin representation. The results are applicable for every four quantum states allowing the required properties for quantum processor implementation if for qubit encoding, virtual spin representation is used. A four-dimensional Hilbert space of nuclear spin 3/2 is considered in detail for this aim.

Kessel, Alexander R.; Yakovleva, Natalia M. [Kazan Physical-Technical Institute, Russian Academy of Science, Sibirsky trakt 10/7, Kazan 420029 (Russian Federation)

2002-12-01T23:59:59.000Z

166

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

167

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

168

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

169

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

170

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

171

South Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar PowerstoriesNrelPartnerTypePonsa,HomeIndiana:Rhode Island References:Korea:

172

Development of an Integrated Natural Barrier Database System for Site Evaluation of a Deep Geologic Repository in Korea - 13527  

SciTech Connect (OSTI)

Korea Radioactive-waste Management Corporation (KRMC) established in 2009 has started a new project to collect information on long-term stability of deep geological environments on the Korean Peninsula. The information has been built up in the integrated natural barrier database system available on web (www.deepgeodisposal.kr). The database system also includes socially and economically important information, such as land use, mining area, natural conservation area, population density, and industrial complex, because some of this information is used as exclusionary criteria during the site selection process for a deep geological repository for safe and secure containment and isolation of spent nuclear fuel and other long-lived radioactive waste in Korea. Although the official site selection process has not been started yet in Korea, current integrated natural barrier database system and socio-economic database is believed that the database system will be effectively utilized to narrow down the number of sites where future investigation is most promising in the site selection process for a deep geological repository and to enhance public acceptance by providing readily-available relevant scientific information on deep geological environments in Korea. (authors)

Jung, Haeryong; Lee, Eunyong; Jeong, YiYeong; Lee, Jeong-Hwan [Korea Radioactive-waste Management Corportation - KRMC, 1045 Daedeokdaero, Yuseong-gu, Daejeon 305-353 (Korea, Republic of)] [Korea Radioactive-waste Management Corportation - KRMC, 1045 Daedeokdaero, Yuseong-gu, Daejeon 305-353 (Korea, Republic of)

2013-07-01T23:59:59.000Z

173

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

174

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

175

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

176

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

177

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

178

Korea Silicon Co Ltd | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood,GeorgeKlimaschutz eKodiak,Kooskia, Idaho:Korea

179

AstroKorea | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 EastMaine: Energy Resources JumpAspen Aerogels JumpRenewable EnergyAssured|AstroKorea

180

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NMR experimental realization of seventh-order coupling transformations and the seven-qubit modified Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

We propose a scalable method on the basis of nth-order coupling operators to construct f-dependent phase transformations in the n-qubit modified Deutsch-Jozsa (D-J) quantum algorithm. The novel n-qubit entangling transformations are easily implemented via J-couplings between neighboring spins. The seven-qubit modified D-J quantum algorithm and seventh-order coupling transformations are then experimentally demonstrated with liquid state nuclear magnetic resonance (NMR) techniques. The method may offer the possibility of creating generally entangled states of n qubits and simulating n-body interactions on n-qubit NMR quantum computers.

Daxiu Wei; Jun Luo; Xiaodong Yang; Xianping Sun; Xizhi Zeng; Maili Liu; Shangwu Ding; Mingsheng Zhan

2003-01-10T23:59:59.000Z

182

Room-temperature implementation of the Deutsch-Jozsa algorithm with a single electronic spin in diamond  

E-Print Network [OSTI]

The nitrogen-vacancy defect center (NV center) is a promising candidate for quantum information processing due to the possibility of coherent manipulation of individual spins in the absence of the cryogenic requirement. We report a room-temperature implementation of the Deutsch-Jozsa algorithm by encoding both a qubit and an auxiliary state in the electron spin of a single NV center. By thus exploiting the specific S=1 character of the spin system, we demonstrate how even scarce quantum resources can be used for test-bed experiments on the way towards a large-scale quantum computing architecture.

Fazhan Shi; Xing Rong; Nanyang Xu; Ya Wang; Jie Wu; Bo Chong; Xinhua Peng; Juliane Kniepert; Rolf-Simon Schoenfeld; Wolfgang Harneit; Mang Feng; Jiangfeng Du

2010-02-12T23:59:59.000Z

183

An application of the Deutsch-Josza algorithm to formal languages and the word problem in groups  

E-Print Network [OSTI]

We adapt the Deutsch-Josza algorithm to the context of formal language theory. Specifically, we use the algorithm to distinguish between trivial and nontrivial words in groups given by finite presentations, under the promise that a word is of a certain type. This is done by extending the original algorithm to functions of arbitrary length binary output, with the introduction of a more general concept of parity. We provide examples in which properties of the algorithm allow to reduce the number of oracle queries with respect to the deterministic classical case. This has some consequences for the word problem in groups with a particular kind of presentation.

Michael Batty; Andrea Casaccino; Andrew J. Duncan; Sarah Rees; Simone Severini

2008-01-18T23:59:59.000Z

184

Study Abroad in South Korea Construction Management & Civil Engineering  

E-Print Network [OSTI]

Korea and North Korea. After having become more acclimated to culture the students separated from Institute for Defense Analysis, to speakers from the private sector working in oil refining plants, they went up to the ski slopes where 2018 Olympic ski events will be held. One of the main features

Hutcheon, James M.

185

Nuclear Security Summit | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Uranium Fuel Development The White HouseOffice of the Press SecretaryBelgium, France, Germany, the Republic of Korea and the United States, the parties to this joint statement...

186

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

187

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

188

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

189

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

190

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

191

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

192

Country Report on Building Energy Codes in Korea  

SciTech Connect (OSTI)

This report is part of a series of reports on building energy efficiency codes in countries associated with the Asian Pacific Partnership (APP) - Australia, South Korea, Japan, China, India, and the United States of America (U.S.). This reports gives an overview of the development of building energy codes in Korea, including national energy policies related to building energy codes, history of building energy codes, recent national projects and activities to promote building energy codes. The report also provides a review of current building energy codes (such as building envelope, HVAC, and lighting) for commercial buildings in Korea.

Evans, Meredydd; McJeon, Haewon C.; Shui, Bin; Lee, Seung Eon

2009-04-17T23:59:59.000Z

193

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

194

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

195

An assessment of North Korea's nuclear weapons capabilities  

E-Print Network [OSTI]

In February of 2013, North Korea conducted its third nuclear weapons test. Speculations are that this test was conducted to further develop a warhead small enough to fit on an intercontinental ballistic missile. This test ...

Sivels, Ciara (Ciara Brooke)

2013-01-01T23:59:59.000Z

196

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

197

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

198

April 20, 2005 --Lecture 35 Computer Security  

E-Print Network [OSTI]

, Iran, Iraq, Libya, North Korea, Serbia, Sudan, Syria, and Taleban controlled areas of Afghanistan #12

Jones, Douglas W.

199

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

200

Transnational Circulations of "Laban" Methods: Gender, Power Relations, and Negotiated Meanings in Early Twenty-First Century South Korea's Modernity  

E-Print Network [OSTI]

economic globalization extends the economy beyond thein the economy during South Korea’s globalization process,globalization, which conforms to the world economy order and

Hwang, Hye-Won

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

202

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

203

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

204

Country hedging for real income stabilization: a case study of South Korea and Egypt  

E-Print Network [OSTI]

It Manageable in the Case of Egypt?" Journal of Modeling, 2:S1UDY OF SOUIH KOREA AND EGYPT by Kathryn M. llirdon andSTUDY OF SOUTII KOREA AND EGYPT* By Kathryn M. Gordon and

Gordon, Kathryn M.; Rausser, Gordon C.

1984-01-01T23:59:59.000Z

205

Holy Mother of Chiri Mountain: A Female Mountain Spirit in Korea  

E-Print Network [OSTI]

Spirit in Korea by Maya Stiller UCLA Center for the Study ofSpirit in Korea by Maya Stiller I n his case study of femaleand commoners alike. Maya Stiller is a graduate student in

Stiller, Maya

2011-01-01T23:59:59.000Z

206

Electricity privatization : should South Korea privatize its state-owned electric utility?  

E-Print Network [OSTI]

The state-owned electric utility, Korea Electricity Power Cooperation (KEPCO), privatization has been a key word in South Korea since 1997, when the government received $55 billion from the International Monetary Fund in ...

Lim, Sungmin

2011-01-01T23:59:59.000Z

207

Implementation of controlled phase shift gates and Collins version of Deutsch-Jozsa algorithm on a quadrupolar spin-7/2 nucleus using non-adiabatic geometric phases  

E-Print Network [OSTI]

In this work Controlled phase shift gates are implemented on a qaudrupolar system, by using non-adiabatic geometric phases. A general procedure is given, for implementing controlled phase shift gates in an 'N' level system. The utility of such controlled phase shift gates, is demonstrated here by implementing 3-qubit Deutsch-Jozsa algorithm on a 7/2 quadrupolar nucleus oriented in a liquid crystal matrix.

T. Gopinath; Anil Kumar

2009-09-22T23:59:59.000Z

208

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

209

Using the Deutsch-Jozsa algorithm to determine parts of an array and apply a specified function to each independent part  

E-Print Network [OSTI]

Using the Deutsch-Jozsa algorithm, we will develop a method for solving a class of problems in which we need to determine parts of an array and then apply a specified function to each independent part. Since present quantum computers are not robust enough for code writing and execution, we will build a model of a vector quantum computer that implements the Deutsch-Jozsa algorithm from a machine language view using the APL2 programming language. The core of the method is an operator (DJBOX) which allows evaluation of an arbitrary function f by the Deutsch-Jozsa algorithm. Two key functions of the method are GET_PARTITION and CALC_WITH_PARTITIONS. The GET_PARTITION function determines parts of an array based on the function f. The CALC_WITH_PARTITIONS function determines parts of an array based on the function f and then applies another function to each independent part. We will imagine the method is implemented on the above vector quantum computer. We will show that the method can be successfully executed.

Samir Lipovaca

2009-08-10T23:59:59.000Z

210

THREE WORDS ABOUT MOBILE PHONES: FINDINGS FROM SWEDEN, THE US, ITALY, JAPAN, AND KOREA  

E-Print Network [OSTI]

THREE WORDS ABOUT MOBILE PHONES: FINDINGS FROM SWEDEN, THE US, ITALY, JAPAN, AND KOREA Naomi S phones: findings from Sweden, the US, Italy, Japan, and Korea While roughly half of the world students in Sweden, the US, Italy, Japan, and Korea, between the ages of 18 and 24. One of our open

Carlini, David

211

REPORT from ISWA 2011 WORLD CONGRESS 17-20 October 2011, DAEGU, KOREA  

E-Print Network [OSTI]

Production ­ Fuell Cell Power by Plasma Gasification of Municipal Solid Waste", Mr. Jorgen Haukohl from Waste Association, held between 17th &20th October 2011 in Daegu, Korea, with a total participation of Environment of Korea, and Korea Society of Waste Management. Many Local companies like GS Caltex, Samsung

Columbia University

212

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

213

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

214

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

215

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

216

hal-00585316,version1-12Apr2011 Korea nuclear exports: Why did the Koreans win the UAE tender?  

E-Print Network [OSTI]

, thanks to an active national program of Nuclear Power Plant (NPP) construction, Korea has developed

217

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

218

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

220

Secure quantum private information retrieval using phase-encoded queries  

SciTech Connect (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Republic of Korea Country report Description of dosimetry services in the Republic of Korea  

E-Print Network [OSTI]

The Korea Atomic Energy Research Institute (KAERI) has a state-of-the-art In Vivo Radioassay and Research Facility (IVRRF) facility designed expressly for in vivo measurement of radioactive material. Although the IVRRF's primary activity is providing routine in vivo counting services to KAERI radiation workers, the facility also conducts work for clients including a fuel fabrication facilities and nuclear facilities. Counting System KAERI in vivo counter combines the characteristics of the U/Pu lung counter and the advantage of a high sensitivity scanning NaI(Tl) whole body counter into one compact system. The low energy lung counter is designed for facilities that need to accurately measure lung depositions of actinides such as uranium, plutonium and americium. The scanning whole body counter is designed to detect and identify the location of higher energy nuclides anywhere in the body. The detection system of the low energy lung counter consists of two arrays of ACT (Actinide)-II detector system which combi...

Lee, T Y

1996-01-01T23:59:59.000Z

222

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

223

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

224

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

225

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

226

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

227

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

228

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

229

The status of coal briquetting technology in Korea  

SciTech Connect (OSTI)

Anthracite is the only indigenous fossil fuel resource produced in Korea and is an important main source of residential fuel. Due to its particular characteristics, the best way to use Korean coal is in the form of briquettes, called {open_quotes}Yontan.{close_quotes} The ability to use this coal as briquettes was a great discovery made nearly 50 years ago and since then, has made a great contribution to the energy consumption of low and middle income households. Korean anthracite in coal briquette form has been used widely for household heating purposes. Collieries in Korea produced no more than one million tons of anthracite annually in the 1960s. Production, however, increased substantially up to about 17 million tons per year in the mid-1970s. In 1986, Korea succeeded in raising its coal production to 24.2 million tons, which was the maximum production level achieved by the Korean coal industrial sector. Since then, anthracite production has fallen. In 1991, coal output dropped to 15.1 million tons, a decrease of 12.2 percent from the 17.2 million tons produced in 1990, due to falling coal demand and rising labor costs. The role of coal as an energy source will be more important in the future to meet projected economic growth in Korea. While the production of indigenous Korean anthracite is expected to decrease under a coal mining rationalization policy, imports of bituminous coal will increase rapidly and will be used as an oil substitute in industry and power generation. In this chapter, general aspects of the Korean coal industry and coal utilization for residential uses, especially the Yontan coal briquetting techniques, are discussed. In addition, coal briquetting technology applications suitable for the APEC region will be presented.

Choi, Woo-Zin

1993-12-31T23:59:59.000Z

230

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

231

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

232

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

233

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

234

Corporate Governance from a Comparative Perspective: Specific Applications of the Duty of Loyalty in Korea  

E-Print Network [OSTI]

transaction. Kon S. Kim, Corporate Governance in Korea, 8 J.ARTICLES CORPORATE GOVERNANCE FROM A COMPARATIVEof Care Standard in Corporate Governance, 75 IOWA L. REV. 1,

Kwon, Jae Yeol

2004-01-01T23:59:59.000Z

235

Bangladesh-Korea Information Access Center (IAC) Department of CSE, BUET, Dhaka 1000  

E-Print Network [OSTI]

Notice As per MOU signed by BUET and KADO, Korea, IAC is a self sustainable center and BUET will not pay

Rahman, A.K.M. Ashikur

236

Case Studies from the Climate Technology Partnership: Landfill Gas Projects in South Korea and Lessons Learned  

SciTech Connect (OSTI)

This paper examines landfill gas projects in South Korea. Two case studies provide concrete examples of lessons learned and offer practical guidance for future projects.

Larney, C.; Heil, M.; Ha, G. A.

2006-12-01T23:59:59.000Z

237

E-Print Network 3.0 - area korea implications Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of this material is permitted. However, permission to reprintrepublish this material for advertising or promotional purposes or for creating Summary: -mail : kim1849@korea.com...

238

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

Goldberg, Sharon

239

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

240

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

242

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

243

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

244

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

245

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

246

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

247

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

248

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

249

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

250

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

251

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

252

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

253

Avian survey and field guide for Osan Air Base, Korea.  

SciTech Connect (OSTI)

This report summarizes the results of the avian surveys conducted at Osan Air Base (AB). This ongoing survey is conducted to comply with requirements of the Environmental Governing Standards (EGS) for the Republic of Korea, the Integrated Natural Resources Management Plan (INRMP) for Osan AB, and the 51st Fighter Wing's Bird Aircraft Strike Hazard (BASH) Plan. One hundred ten bird species representing 35 families were identified and recorded. Seven species are designated as Natural Monuments, and their protection is accorded by the Korean Ministry of Culture and Tourism. Three species appear on the Korean Association for Conservation of Nature's (KACN's) list of Reserved Wild Species and are protected by the Korean Ministry of Environment. Combined, ten different species are Republic of Korea (ROK)-protected. The primary objective of the avian survey at Osan AB was to determine what species of birds are present on the airfield and their respective habitat requirements during the critical seasons of the year. This requirement is specified in Annex J.14.c of the 51st Fighter BASH Plan 91-212 (51 FW OPLAN 91-212). The second objective was to initiate surveys to determine what bird species are present on Osan AB throughout the year and from the survey results, determine if threatened, endangered, or other Korean-listed bird species are present on Osan AB. This overall census satisfies Criterion 13-3.e of the EGS for Korea. The final objective was to formulate management strategies within Osan AB's operational requirements to protect and enhance habitats of known threatened, endangered, and ROK-protected species in accordance with EGS Criterion 13-3.a that are also favorable for the reproduction of indigenous species in accordance with the EGS Criterion 13-3.h.

Levenson, J.

2006-12-05T23:59:59.000Z

254

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

255

Effect of Flow Pulses on Degradation Downstream of Hapcheon Dam, South Korea  

E-Print Network [OSTI]

Effect of Flow Pulses on Degradation Downstream of Hapcheon Dam, South Korea Young Ho Shin1 and Pierre Y. Julien, M.ASCE2 Abstract: The changes in channel geometry downstream of Hapcheon Dam, South: Channels; Geometry; Dams; Korea, South; Sediment transport. Author keywords: Alluvial channels; Downstream

Julien, Pierre Y.

256

Current MSW Management and Waste-to-Energy Status in the Republic of Korea  

E-Print Network [OSTI]

(WTE) in Korea and the potential for improvement. Despite growth of per capita GDP of nearly 501 Current MSW Management and Waste-to-Energy Status in the Republic of Korea By Yoonjung Seo of the generally accepted hierarchy of waste management. The study also investigated the status of waste-to-energy

Columbia University

257

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

258

[Review of] Stefan Michael Newerkla. Sprachkontakte deutsch – tschechisch – slowakisch. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische Entwicklung, Beleglage, bisherige und neue Deutungen. Zweite, durchgehend überarbeitete und aktualisierte Auflage (= Schriften über Sprachen und Texte 7)  

E-Print Network [OSTI]

— 112 — Slavia Centralis 1/2013 Ocene, zapiski, poro?ila – Reviews, Notes, Reports SteFan MiCHael neWerkla. SPracHKontaKte deutScH – tScHecHiScH – SLoWaKiScH. Wörterbuch der deutschen Lehnwörter im Tschechischen und Slowakischen: historische...

Greenberg, Marc L.

2013-01-01T23:59:59.000Z

259

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

260

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

262

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

263

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

264

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

265

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

266

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

267

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

268

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

269

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

270

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

271

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

272

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

273

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

274

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

275

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

276

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

277

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

278

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

279

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

280

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

282

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

283

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

284

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

285

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

286

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

287

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

288

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

289

Stability and Nukes: China's Domestic Concerns over North Korea's Nuclear Program  

E-Print Network [OSTI]

While the bilateral friendship between China and North Korea was solidified and endured during the Korean war, Beijing's ties to Pyongyang have weakened considerably during the nuclear crisis on the Korean Peninsula, which ...

Xu, Jun

2014-05-31T23:59:59.000Z

290

Variations in patterns of low fertility in South Korea in 2004: a county level analysis  

E-Print Network [OSTI]

Since the early 1960s, South Korea has been going through a rapid fertility decline, along with its socioeconomic development and effective family planning programs. After achieving a desired replacement level of fertility in 1984, the total...

Yoon, Jungwon

2009-06-02T23:59:59.000Z

291

Urban settlement design, Seoul, Korea : a comparative study for low-income housing  

E-Print Network [OSTI]

The study proposes an alternative design approach for urban dwelling environments of the low-income sectors in Seoul, Korea, based upon a comparative evaluation of the physical and socio-economic performance of the existing ...

Je, Hae-Seong

1982-01-01T23:59:59.000Z

292

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

293

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

294

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

295

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

296

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

297

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

298

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

299

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

300

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

302

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

303

Design and optimisation of quantum logic circuits for a three-qubit Deutsch-Jozsa algorithm implemented with optically-controlled, solid-state quantum logic gates  

E-Print Network [OSTI]

We analyse the design and optimisation of quantum logic circuits suitable for the experimental demonstration of a three-qubit quantum computation prototype based on optically-controlled, solid-state quantum logic gates. In these gates, the interaction between two qubits carried by the electron-spin of donors is mediated by the optical excitation of a control particle placed in their proximity. First, we use a geometrical approach for analysing the entangling characteristics of these quantum gates. Then, using a genetic programming algorithm, we develop circuits for the refined Deutsch-Jozsa algorithm investigating different strategies for obtaining short total computational times. We test two separate approaches based on using different sets of entangling gates with the shortest possible gate computation time which, however, does not introduce leakage of quantum information to the control particles. The first set exploits fast approximations of controlled-phase gates as entangling gates, while the other one arbitrary entangling gates with a shorter gate computation time compared to the first set. We have identified circuits with consistently shorter total computation times when using controlled-phase gates.

A. Del Duce; S. Savory; P. Bayvel

2009-10-09T23:59:59.000Z

304

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

305

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

306

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

307

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

308

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

309

1st NIFS-CRC Int. Symp. and 1st Korea-Japan WS, 5/20-22, 2007  

E-Print Network [OSTI]

1st NIFS-CRC Int. Symp. and 1st Korea-Japan WS, 5/20-22, 2007 1 Excitation of atomic hydrogen at metal surfaces promoted by proton motion Daiji Kato NIFS #12;1st NIFS-CRC Int. Symp. and 1st Korea of the excited state formation. · Conclusion #12;1st NIFS-CRC Int. Symp. and 1st Korea-Japan WS, 5/20-22, 2007 3

Princeton Plasma Physics Laboratory

310

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

311

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

312

Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.  

SciTech Connect (OSTI)

We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

2008-01-01T23:59:59.000Z

313

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

314

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

315

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

316

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

317

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

318

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

319

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

320

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

322

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

323

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

324

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

325

Business Case for Energy Efficiency in Support of Climate Change Mitigation, Economic and Societal Benefits in the Republic of Korea  

E-Print Network [OSTI]

KEMCO, 2012c. Korea's Energy Standards and Labeling: MarketBaseline Unit Energy Consumption Adjustment Market Sharesof Conserved Energy Table for Freezers Market Share Lifetime

McNeil, Michael A.

2014-01-01T23:59:59.000Z

326

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

327

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

328

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

329

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

330

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

331

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

332

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

333

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

334

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

335

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

336

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

337

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

338

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

339

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

340

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

342

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

343

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

344

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

345

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

346

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

347

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

348

Shallow hydraulic fracturing measurements in Korea support tectonic and seismic indicators of regional stress.  

SciTech Connect (OSTI)

We have conducted five hydraulic fracturing stress measurement campaigns in Korea, involving 13 test holes ranging in depth from 30 to 250 m, at locations from North Seoul to the southern coast of the peninsula. The measurements reveal consistent crustal stress magnitudes and directions that suggest persistence throughout western and southern Korea. The maximum horizontal stress {sigma}{sub H} is oriented between ENE-WSW and E-W, in accord with plate movement and deformation, and with directions indicated by both focal mechanism solutions from earthquakes inland and offshore as well as borehole breakouts in mainland China close to its eastern coast. With respect to magnitudes, the vertical stress is the overall minimum stress at all tested locations, suggesting a thrust faulting regime within the relatively shallow depths reached by our tests. Typically, such a stress regime becomes one favoring strike-slip at greater depths, as is also indicated by the focal mechanism solutions around Korea.

Haimson, Bezalel Cecil (University of Wisconsin, Madison, WI); Lee, Moo Yul; Song, I. (Ruhr-University Bochum, Bochum, Germany)

2003-07-01T23:59:59.000Z

349

An Analysis of Relationships between the Green Building Certification System for Multi-family Housing (GBCS-MF) Scores and Resident Perception Ratings in Korea  

E-Print Network [OSTI]

forward. I dedicate this dissertation to my loving parents. . vi NOMENCLATURE GBCS-MF Green Building Certification System for Multi-Family MLTM Ministry of Land, Transportation and Maritime Affairs, Korea MEV Ministry of Environment, Korea....7.8. Ecological Environment (EE) ........................................................................ 43   2.7.9. Indoor Environmental Quality (IEQ) ............................................................. 44   2.8. GBCS-MF Related Studies in Korea...

Lee, Joo Hyun

2013-12-06T23:59:59.000Z

350

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

351

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

352

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

353

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

354

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

355

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

356

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

357

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

358

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

359

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

360

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

362

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

363

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

364

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

365

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

366

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

367

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

368

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

369

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

370

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

371

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

372

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

373

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

374

Evidence for Gassy Sediments on the Inner Shelf of SE Korea From Geoacoustic Properties  

E-Print Network [OSTI]

1 Evidence for Gassy Sediments on the Inner Shelf of SE Korea From Geoacoustic Properties (Tuesday is characterized by an up to 40 m thick blanket of soft sediments often characterized by acoustic turbidity structures below that gas layer. Sound speeds were measured directly in these sediments using the Acoustic

375

Biogeochemical changes at early stage after the closure of radioactive waste geological repository in South Korea  

E-Print Network [OSTI]

Biogeochemical changes at early stage after the closure of radioactive waste geological repository e Korea Radioactive Waste Agency (KORAD), 111, Daedeok-daero 989 beon-gil, Yuseong-gu, Daejeon 305 Organic waste a b s t r a c t Permanent disposal of low- and intermediate-level radioactive wastes

Ohta, Shigemi

376

August 24~28, 2014 International Convention Center (ICC) Jeju, Jeju Island, Korea  

E-Print Network [OSTI]

Arab Emirates). Korea is working not only for successful completion in UAE but also actively promote, and Slovenia (more than 30%); the United States, United Kingdom, and Russia (less than 20%). In China, 28 units power plants and building 5 new nuclear power plants domestically and 4 nuclear power plants in UAE(United

377

Seismological Evidence for a Low-Yield Nuclear Test on 12 May 2010 in North Korea  

E-Print Network [OSTI]

E Seismological Evidence for a Low-Yield Nuclear Test on 12 May 2010 in North Korea by Miao Zhang. INTRODUCTION Three nuclear tests (in 2006, 2009, and 2013) conducted by the Democratic People's Republic.g., the U. S. Geological Survey [USGS] and the Comprehensive Nuclear-Test-Ban Treaty Organization [CTBTO

Wen, Lianxing

378

In IEEE International Conference on Robotics and Automation Pages 29412947, Seoul, Korea, May 2001  

E-Print Network [OSTI]

In IEEE International Conference on Robotics and Automation Pages 2941­2947, Seoul, Korea, May 2001 Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation communication is an enabling factor in mul- tiple mobile robot systems. There is signi#12;cant interac- tion

Sukhatme, Gaurav S.

379

Culturally Variable Preferences for Robot Design and Use in South Korea, Turkey, and the United States  

E-Print Network [OSTI]

.2 [User- Centered Design]; I.2.9 [Robotics]: Commercial robots and applications; K.4: Computers, Turkey, United States, survey, robot design, robot application, user preferences. 1. INTRODUCTIONCulturally Variable Preferences for Robot Design and Use in South Korea, Turkey, and the United

Sabanovic, Selma

380

Transactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014  

E-Print Network [OSTI]

Transactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014 System) in Korean nuclear power plants. Recently, there have been attempted to implement the software and the higher performance of FPGAs. The FPGAs are typically modeled with HDLs (Hardware Description Languages

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Transactions of the Korean Nuclear Society Spring Meeting Jeju, Korea, May 17-18, 2012  

E-Print Network [OSTI]

Transactions of the Korean Nuclear Society Spring Meeting Jeju, Korea, May 17-18, 2012 NuDE: Development Environment for Safety-Critical Software of Nuclear Power Plant Jong-Hoon Lee , Junbeom Yoo, software V&V should be performed in parallel with software development. In IEEE standard 1012 for Software

382

Transactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014  

E-Print Network [OSTI]

Transactions of the Korean Nuclear Society Autumn Meeting Pyeongchang, Korea, October 30-31, 2014 A Translator Verification Technique for FPGA Software Development in Nuclear Power Plants Jaeyeob Kim a , Eui- critical system such as RPS (Reactor Protection System) in NPP (Nuclear Power Plants). Increasing

383

SMART WATER GRID INTERNATIONAL CONFERENCE 2013 12-14 November 2013, Incheon, Republic of Korea  

E-Print Network [OSTI]

SMART WATER GRID INTERNATIONAL CONFERENCE 2013 12-14 November 2013, Incheon, Republic of Korea SMART WATER GRIDS AND NETWORK VULNERABILITY Pierre Y. Julien1 and Olga A. Martyusheva2 1 Professor, Colorado State University, Fort Collins, CO 80521-1372, USA Keywords: Energy Conservation; Smart Water Grid

Julien, Pierre Y.

384

Japan, France Vying for Korea's Nuclear Project By Cho Jin-seo  

E-Print Network [OSTI]

. Haignere promised privileges in fusion energy businesses and supports for Korea's own fusion energy energy source and considered the next-generation energy of the planet. indizio@koreatimes.co.kr 01,000 Jobs for Poor, Aged Roh's Supporters Launch Fresh 'Piggybank' Drive | | | | Copyright© Hankooki.com All

385

Maritime trade and port evolution in a socialist developing country: Nampo, gateway of North Korea  

E-Print Network [OSTI]

Maritime trade and port evolution in a socialist developing country: Nampo, gateway of North Korea. The study refers to port development issues in the socialist developing countries, in terms of constraints and advantages for ports, and proposes some analysis based on Nampo, the main international trading port city

Paris-Sud XI, Université de

386

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

387

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

388

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

389

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

390

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

391

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

392

The Regulatory Challenges of Decommissioning Nuclear Power Plants in Korea - 13101  

SciTech Connect (OSTI)

As of 2012, 23 units of nuclear power plants are in operation, but there is no experience of permanent shutdown and decommissioning of nuclear power plant in Korea. It is realized that, since late 1990's, improvement of the regulatory framework for decommissioning has been emphasized constantly from the point of view of International Atomic Energy Agency (IAEA)'s safety standards. And it is known that now IAEA prepare the safety requirement on decommissioning of facilities, its title is the Safe Decommissioning of Facilities, General Safety Requirement Part 6. According to the result of IAEA's Integrated Regulatory Review Service (IRRS) mission to Korea in 2011, it was recommended that the regulatory framework for decommissioning should require decommissioning plans for nuclear installations to be constructed and operated and these plans should be updated periodically. In addition, after the Fukushima nuclear disaster in Japan in March of 2011, preparedness for early decommissioning caused by an unexpected severe accident became also important issues and concerns. In this respect, it is acknowledged that the regulatory framework for decommissioning of nuclear facilities in Korea need to be improved. First of all, we identify the current status and relevant issues of regulatory framework for decommissioning of nuclear power plants compared to the IAEA's safety standards in order to achieve our goal. And then the plan is to be established for improvement of regulatory framework for decommissioning of nuclear power plants in Korea. After dealing with it, it is expected that the revised regulatory framework for decommissioning could enhance the safety regime on the decommissioning of nuclear power plants in Korea in light of international standards. (authors)

Lee, Jungjoon; Ahn, Sangmyeon; Choi, Kyungwoo [Korea Institute of Nuclear Safety, 62 Gwahak-ro, Yuseong-gu, Daejeon 305-338 (Korea, Republic of)] [Korea Institute of Nuclear Safety, 62 Gwahak-ro, Yuseong-gu, Daejeon 305-338 (Korea, Republic of); Kim, Juyoul; Kim, Juyub [FNC Technology, 46 Tabsil-ro, Giheung-gu, Yongin 446-902 (Korea, Republic of)] [FNC Technology, 46 Tabsil-ro, Giheung-gu, Yongin 446-902 (Korea, Republic of)

2013-07-01T23:59:59.000Z

393

The earth matter effects in neutrino oscillation experiments from Tokai to Kamioka and Korea  

E-Print Network [OSTI]

We study the earth matter effects in the Tokai-to-Kamioka-and-Korea experiment (T2KK), which is a proposed extension of the T2K (Tokai-to-Kamioka) neutrino oscillation experiment between J-PARC at Tokai and Super-Kamiokande (SK) in Kamioka, where an additional detector is placed in Korea along the same neutrino beam line.By using recent geophysical measurements, we examine the earth matter effects on the oscillation probabilities at Kamioka and Korea. The average matter density along the Tokai-to-Kamioka baseline is found to be 2.6 g/cm^3, and that for the Tokai-to-Korea baseline is 2.85, 2.98, and 3.05 g/cm^3 for the baseline length of L = 1000, 1100, and 1200 km, respectively. The uncertainty of the average density is about 6%, which is determined by the uncertainty in the correlation between the accurately measured sound velocity and the matter density. The effect of the matter density distribution along the baseline is studied by using the step function approximation and the Fourier analysis. We find that the nu_mu -> nu_e oscillation probability is dictated mainly by the average matter density, with small but non-negligible contribution from the real part of the first Fourier mode. We also find that the sensitivity of the T2KK experiment on the neutrino mass hierarchy does not improve significantly by reducing the matter density error from 6% to 3%, since the measurement is limited by statistics for the minimum scenario of T2KK with SK at Kamioka anda 100 kt detector in Korea considered in this report. The sensitivity of the T2KK experiment on the neutrino mass hierarchy improves significantly by splitting the total beam time into neutrino and anti-neutrino runs, because the matter effect term contributes to the oscillation amplitudes with the opposite sign.

Kaoru Hagiwara; Naotoshi Okamura; Ken-ichi Senda

2011-09-08T23:59:59.000Z

394

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

395

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

396

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

397

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

398

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

399

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

400

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

402

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

403

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

404

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

405

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

406

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

407

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

408

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

409

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

410

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

411

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

412

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

413

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

414

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

415

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

416

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

417

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

418

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

419

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

420

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

422

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

423

Historical Jesus and Mokmin hermeneutics with reference to the description of Jesus in Minjung theology in Korea   

E-Print Network [OSTI]

The quest for the contextual meaning of the life and teaching of the historical Jesus seems to be a perennial question. Given the religious, cultural and social situation in Korea as well as in Asia generally, any ...

Lee, Moonjang

1997-07-11T23:59:59.000Z

424

The politics of consensus-building : case study of diesel vehicles and urban air pollution in South Korea  

E-Print Network [OSTI]

Look at the three efforts to resolve public disputes over diesel passenger cars and urban air quality management in South Korea. this dissertation explores the main obstacles in nascent democracies to meeting the necessary ...

Kim, Dong-Young, Ph. D. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

425

A new direction and business plan for the golf business in Korea : strategies to attract customers to the domestic market  

E-Print Network [OSTI]

The golf industry in South Korea has been flourishing and has maintained high profitability. However, the South Korean market is not adequately prepared for the increasingly globalized world economy and resulting changes ...

Kim, Ikhwan

2014-01-01T23:59:59.000Z

426

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

427

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

428

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

429

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

430

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

431

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

432

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

433

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

434

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

435

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

436

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

437

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

438

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

Dahan, Ely

439

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

440

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

442

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

443

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

444

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

445

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

446

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

447

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

448

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

449

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

450

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

451

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

452

The trend of digital control system design for nuclear power plants in Korea  

SciTech Connect (OSTI)

Currently there are 20 nuclear power plants (NPPs) in operation, and 6 more units are under construction in Korea. The control systems of those NPPs have also been developed together with the technology advancement. Control systems started with On-Off control using the relay logic, had been evolved into Solid-State logic using TTL ICs, and applied with the micro-processors since the Yonggwang NPP Units 3 and 4 which started its construction in 1989. Multiplexers are also installed at the local plant areas to collect field input and to send output signals while communicating with the controllers located in the system cabinets near the main control room in order to reduce the field wiring cables. The design of the digital control system technology for the NPPs in Korea has been optimized to maximize the operability as well as the safety through the design, construction, start-up and operation experiences. Both Shin-Kori Units 1 and 2 and Shin-Wolsong Units 1 and 2 NPP projects under construction are being progressed at the same time. Digital Plant Control Systems of these projects have adopted multi-loop controllers, redundant loop configuration, and soft control system for the radwaste system. Programmable Logic Controller (PLC) and Distributed Control System (DCS) are applied with soft control system in Shin-Kori Units 3 and 4. This paper describes the evolvement of control system at the NPPs in Korea and the experience and design improvement through the observation of the latest failure of the digital control system. In addition, design concept and its trend of the digital control system being applied to the NPP in Korea are introduced. (authors)

Park, S. H.; Jung, H. Y.; Yang, C. Y.; Choe, I. N. [Korea Power Engineering Company, 360-9 Mabuk-Dong, Yongin-Si, Gyeonggi-Do, 446-713 (Korea, Republic of)

2006-07-01T23:59:59.000Z

453

Republic of Korea Reduction of Financing Barriers for Energy Savings Performance Contracts  

SciTech Connect (OSTI)

This paper discusses the findings developed for strengthening the role of performance contracting in improving energy efficiency in the Republic of Korea. The U.S. Environmental Protection Agency (EPA) sponsored development of this paper by the National Renewable Energy Laboratory (NREL), as a part of the Korean-U.S. Climate Technology Partnerships (CTP) program. The results and recommendations outlined in this paper together with other efforts are designed to assist other countries striving to improve their efficient use of energy.

Howard, D. L.

2005-11-01T23:59:59.000Z

454

Miocene paleomagnetic data from southeastern Korea: implications on models for opening of the Japan Sea  

E-Print Network [OSTI]

1989) Jiwon Han, B. S. , Hanyang University Chair of Advisory Committee: Robert J. McCabe Early Miocene to middle Miocene age samples were collected from 30 paleo- magnetic sites from southeastern Korea. The characteristic directions of magne...- tization were determined by use of vector plots after AF and thermal demagne- tization. The mean paleomagnetic direction for 25 sites (14 normal polarity snd 11 reversed polarity) is D = 39. 4', I = 46. 2' (ass ? 9. 4', k=10. 3). Five sites which...

Han, Jiwon

1989-01-01T23:59:59.000Z

455

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

456

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

457

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

458

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

Langseth, Helge

459

Measurements of radioxenon in ground level air in South Korea following the claimed nuclear test in North Korea on October 9, 2006  

SciTech Connect (OSTI)

Abstract Following the claimed nuclear test in the Democratic People’s Republic of Korea (DPRK) on October 9, 2006, and a reported seismic event, a mobile system for sampling of atmospheric xenon was transported to the Republic of South Korea (ROK) in an attempt to detect possible emissions of radioxenon in the region from a presumed test. Five samples were collected in the ROK during October 11–14, 2006 near the ROK–DPRK border, and thereafter transported to the Swedish Defense Research Agency (FOI) in Stockholm, Sweden, for analysis. Following the initial measurements, an automatic radioxenon sampling and analysis system was installed at the same location in the ROK, and measurements on the ambient atmospheric radioxenon background in the region were performed during November 2006 to February 2007. The measured radioxenon concentrations strongly indicate that the explosion in October 9, 2006 was a nuclear test. The conclusion is further strengthened by atmospheric transport models. Radioactive xenon measurement was the only independent confirmation that the supposed test was in fact a nuclear explosion and not a conventional (chemical) explosive.

Ringbom, Anders; Elmgren, K.; Lindh, Karin; Peterson, Jenny; Bowyer, Ted W.; Hayes, James C.; McIntyre, Justin I.; Panisko, Mark E.; Williams, Richard M.

2009-12-03T23:59:59.000Z

460

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

462

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

463

Korea's Newly Enacted Unified Bankruptcy Act: The Role of the New Act in Facilitating (or Discouraging) the Transfer of Corporate Control  

E-Print Network [OSTI]

perspective of corporate governance, the decision whether toefforts to implement corporate governance reforms and otherthe weakness of the corporate governance mechanism in Korea,

Ko, Haksoo

2007-01-01T23:59:59.000Z

464

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

465

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

466

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

467

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

468

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

469

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

470

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

471

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

472

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

473

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

474

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

475

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

476

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

477

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

478

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

479

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

480

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

482

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

483

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

484

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

485

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

486

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

487

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

488

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

489

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

490

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

491

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

492

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

493

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

494

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

495

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

496

Liquefied U.S. Natural Gas Exports to South Korea (Million Cubic Feet)  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 6330 0 14343 342 328 370Japan (MillionSouth Korea

497

Sabine Pass, LA Exports to Korea Liquefied Natural Gas (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2007 10,998 9,933 10,998Hampshire"RhodeWest Virginia"TotalFeet) Brazil Liquefied NaturalKorea

498

Freeport, TX Liquefied Natural Gas Exports to South Korea (Million Cubic  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 6330 0 1 0 0 0ThousandFeet) South Korea (Million

499

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

500

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z