National Library of Energy BETA

Sample records for file transfer protocol

  1. File Transfer Protocol (FTP) Site Instructions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload Website

  2. Drinking Water and Groundwater Protection Division File Transfer...

    Open Energy Info (EERE)

    Drinking Water and Groundwater Protection Division File Transfer Protocol (FTP) Site Instructions Jump to: navigation, search OpenEI Reference LibraryAdd to library Permitting...

  3. GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through Wireless

    E-Print Network [OSTI]

    Yu, Chansu

    1 GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through WirelessSachin Hirve April 30, 2008April 30, 2008 Contents:Contents: What is Software Radio?What is Software Radio? USRPUSRP ­­ MultiMulti--functional hardwarefunctional hardware GNU RadioGNU Radio Previous Work

  4. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  5. An Oblivious Transfer Protocol with Log-Squared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6-computation and communication (k · log2 n + · log n), where k is a possibly non-constant security parameter. The new proto- col communication and is private in the standard complexity-theoretic model. Keywords. Computationally

  6. An Oblivious Transfer Protocol with LogSquared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log­Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6­computation and communication #(k · log 2 n + # · log n), where k is a possibly non­constant security parameter. The new proto the same asymptotic communication and is private in the standard complexity­theoretic model. Keywords

  7. Drinking Water and Groundwater Protection Division File Transfer Protocol

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (UtilityInstrumentsAreafor Geothermal Resources Rules - Idaho Jump

  8. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  9. Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate

    E-Print Network [OSTI]

    Morozov, Kirill

    . Building on their result, we extend it in two ways: 1) we construct ef- ficient passively-secure protocols-theoretic security for both parties, hence building OT as- suming noisy resources (channels or correlations channel or correlation in the case of passive cheaters. Their construction was inefficient. The OT

  10. Design of the PSI connection processor for the Xpress transfer protocol

    E-Print Network [OSTI]

    Brudeseth, Rolf

    1994-01-01

    Transfer Protocol is designed. The implementation is based on the finite state machines in revision 3.4. While reviewing the state machines 7 it became clear that they would require modifications to ensure that they will behave as one must assume...

  11. Response to Incorporation of Supplemental Gonadotropins for Donor and Recipient Protocols in Commercial Bovine Embryo Transfer

    E-Print Network [OSTI]

    Chiles, Kelley

    2012-07-16

    stream_source_info CHILES-THESIS.pdf.txt stream_content_type text/plain stream_size 82955 Content-Encoding ISO-8859-1 stream_name CHILES-THESIS.pdf.txt Content-Type text/plain; charset=ISO-8859-1 RESPONSE... TO INCORPORATION OF SUPPLEMENTAL GONADOTROPINS FOR DONOR AND RECIPIENT PROTOCOLS IN COMMERCIAL BOVINE EMBRYO TRANSFER A Thesis by KELLEY CHRISTINE CHILES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment...

  12. Microsoft PowerPoint - File Transfer-Turner

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on darkMicroorganisms toPalladium wavyfamilyOuachitaEnergyTransfer

  13. ITC Filing of Operational Protocols - August 9, 2011 | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation Standards and TestEquipment: EnergyITC Filing of

  14. Design of the PSi Header Processor for Xpress Transfer Protocol(XTP)

    E-Print Network [OSTI]

    Rayaprolu, Murthy S.

    1992-01-01

    dual-pipeline scheme has been designed to handle variable length packets. The shoter packets follow pipeline Pl, and the longer packets follow pipeline P2. Also, all packets belonging to the same Connection Processors as those following P2 also... follow P2 irrespective of their length. In all, there are seven processing stages(processing elements) in the designed header processor. The first stage, which interfaces with the adjacent protocol layers, is common to both pipelines. In pipeline Pl...

  15. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES Science NetworkMediator Effects of Protonation State

  16. Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7 Checklist for Adding a Collection to the DRILL Photos Images: 1. Take dorsal and lateral photos. 2. Sort images in their collection folder into the specific file in Images Ready For DRILL folder on the FTP server. 4. Transfer

  17. MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

    E-Print Network [OSTI]

    Yoo, Seung-mok

    2012-01-01

    the measured energy consumptions during one data transfertransmission, and energy consumption for the data transferand the energy consumption depends on the data transfer

  18. MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

    E-Print Network [OSTI]

    Yoo, Seung-mok

    2012-01-01

    include wireless sensing systems, low-power design, energyFast and Energy-Efficient Data Transfer over SPI in WirelessEnergy efficiency, master-slave switch, SPI bus, wireless

  19. Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico

    E-Print Network [OSTI]

    Perez, Mary Louise

    2012-08-31

    Management Institute, Inc. (PMI) to implement Information Technology (IT) projects and to transfer technology know how knowledge to its subsidiary in Mexico. To answer this question, an assessment of Cisco and Avaya VoIP telephony systems was completed...

  20. Fertility of Beef Recipients Following a Fixed-Time Embryo Transfer Protocol that Includes Follicle Stimulating Hormone Diluted in Hyaluronan

    E-Print Network [OSTI]

    Thorne, Jacob Westley

    2013-05-06

    and Methods The data of this study was collected in collaboration with OvaGenix, LP, a private embryo transfer company located in Bryan, TX. All cattle were provided by customers of OvaGenix, LP and the cost of materials and labor were funded by Bioniche... as effective as the 40 mg dose, and thus the 20 mg dose was not included in the present study. Estradiol CIDR?Removal?+?PGF Day?0? Day? FSHProg./Estr.?Combo?+?CIDR? Transfer 1675 8 ? 22? ? Table?1.?? Fertility...

  1. Table of Contents Eligibility Forms

    E-Print Network [OSTI]

    Transfer Protocol is a secure file transfer system H HVAC Heating, Ventilation, Air Conditioning I IDS

  2. Carver File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and...

  3. Euclid File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  4. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  5. LLaannggeerrhhaannss LLaabb PPrroottooccoollss Importing DRILL Data via .txt file

    E-Print Network [OSTI]

    Langerhans, Brian

    LLaannggeerrhhaannss LLaabb PPrroottooccoollss Importing DRILL Data via .txt file To import data into the DRILL or to modify existing entries or to delete entries, using a modified DRILL data xlsx./ .txt file instead of using the DRILL Admin functions. 1. Back up the DRILL using the weekly backup protocol. 2

  6. Franklin File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance...

  7. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFileFile

  8. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES Science NetworkMediator Effects of ProtonationEfficient Wide

  9. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  10. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFile

  11. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO FileFiles

  12. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil

  13. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  14. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  15. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  16. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  17. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1q4207---TO: FILE

  18. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE

  19. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3

  20. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3F&i

  1. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile Systems

  2. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile

  3. FERC Filing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans - PermeationGovernment | Department ofFerc Filing

  4. Introducing fast file transfer from space

    E-Print Network [OSTI]

    Wood, Lloyd

    anywhere on EarthDMC can image anywhere on Earth Palm Island Resort, Dubai, 14 Dec 2003 (UK-DMC) Three

  5. Application Protocols o Multimedia

    E-Print Network [OSTI]

    Biagioni, Edoardo S.

    Application Protocols o Telnet o FTP o WWW o SMTP o NNTP o IRC 7 #12; IRC o Internet Relay Chat o similar to telnet o chat

  6. An Evaluation of UDP Transport Protocols

    SciTech Connect (OSTI)

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  7. A Protocol for Quantum Energy Distribution

    E-Print Network [OSTI]

    Masahiro Hotta

    2008-07-10

    A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

  8. INTERNET PROTOCOL DARPA INTERNET PROGRAM

    E-Print Network [OSTI]

    McBrien, Peter

    RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared Way Marina del Rey, California 90291 #12;#12;September 1981 Internet Protocol TABLE OF CONTENTS ...................................................... 9 3. SPECIFICATION ................................................... 11 3.1 Internet Header Format

  9. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  10. Wumpus Protocol Analysis

    E-Print Network [OSTI]

    White, Barbara Y.

    The goal of this research was to assist in the creation of a new, improved Wumpus advisor by taking protocols of ten people learning to play Wumpus with a human coach. It was hoped that by observing these subjects learn ...

  11. Page 1 of 1 Internal Billing and Non-Salary Cost Transfers Using Journal Entry Tool (JET)

    E-Print Network [OSTI]

    Bohnhoff, David

    Page 1 of 1 Internal Billing and Non-Salary Cost Transfers Using Journal Entry Tool (JET) JET loading the file to JET. Cell Format: Please use upper case for alpha letters used in the funding codes file named "JET Excel File Layout". #12;

  12. Evolving Custom Communication Protocols

    E-Print Network [OSTI]

    Fernandez, Thomas

    Evolving Custom Communication Protocols by Wes Faler of Part-Time Scientists for 28C3, Berlin One-at-time simulation #12;Easy as 1...2...3... Parameter sweep int driver_movesPerTransaction[] = { 1, 20 }; int driver_wheelTicksPerCommand[] = { 512, 4096 }; int driver_commandsPerPacket[] = { 1, 25

  13. Peer-to-Peer I/O (P2PIO) Protocol Specification Version 0.6

    E-Print Network [OSTI]

    such as Grid input and output files with collaborators, independent of the churn rate of the collaboration and their churn rate is steadily increasing. A number of existing P2P solutions are specific to a problem domain protocols. They also exhibit different degrees of node churn: some participants are almost always available

  14. UNIX file permissions

    E-Print Network [OSTI]

    ... out sensitive information (like promotion documents and qualifier exams). ... about security, you will want to change your "umask" line in your .cshrc file.

  15. Office of Technology Transfer Material Transfer Agreements

    E-Print Network [OSTI]

    Tullos, Desiree

    Office of Technology Transfer Material Transfer Agreements Confidentiality Agreements Copyright / Patent Licensing The Office of Technology Transfer facilitates the transfer of innovations out of the university for public benefit TOOLS #12;Office of Technology Transfer Facilitating transfer of innovations

  16. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  17. House Simulation Protocols Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols Report House Simulation Protocols Report Report cover Building America's House Simulation Protocols report is designed to assist researchers in tracking...

  18. Superior Energy Performance Certification Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance cm Certification Protocol December 7, 2012 D R A F T f o r R E V I E W Superior Energy Performance cm Certification Protocol 1 December 7, 2012 2012...

  19. The Effect of the Initial Window Size and Limited Transmit Algorithm on the Transient Behavior of TCP Transfers

    E-Print Network [OSTI]

    Avrachenkov, Konstantin

    . This harmful scenario happens when the very last pack ets of the file transfer are lost. Therefore to avoid on the network load we suggest to implement the new modification only for short file transfers. Key words. TCP for the TCP performance since based on conservative approach its value is normally set to sev eral times

  20. The Effect of the Initial Window Size and Limited Transmit Algorithm on the Transient Behavior of TCP Transfers

    E-Print Network [OSTI]

    Ayesta, Urtzi

    . This harmful scenario happens when the very last pack- ets of the file transfer are lost. Therefore to avoid on the network load we suggest to implement the new modification only for short file transfers. Key words. TCP for the TCP performance since based on conservative approach its value is normally set to sev- eral times

  1. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  2. Renewal-anomalous-heterogeneous files

    E-Print Network [OSTI]

    Ophir Flomenbom

    2010-08-13

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is exponential as in Brownian files, yet obeys: {\\psi}_{\\alpha} (t)~t^(-1-{\\alpha}), 0renewal as all the particles attempt to jump at the same time. It is shown that the mean square displacement (MSD) in a renewal-anomalous-heterogeneous file, , obeys, ~[_{nrml}]^{\\alpha}, where _{nrml} is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  3. BPA files reciprocity tariff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 12 BONNEVILLE POWER ADMINISTRATION FOR IMMEDIATE RELEASE Friday, March 30, 2012 CONTACT: Doug Johnson, 503-230-5840 or 503-230-5131 BPA files reciprocity tariff Portland, Ore. -...

  4. Design and simulation of Header Processor for Xpress Transfer Protocol

    E-Print Network [OSTI]

    Chandangoudar, Girish R.

    1993-01-01

    designed to meet the needs of high-speed networks. This research focuses on the hardware imple- mentation of XTP. Different hardware architectures for XTP are presented. A dual- pipelined XTP Header Processor is explained. To overcome many... of the problems associated with the dual-pipelined XTP Header Processor, a single-pipelined XTP Header Processor is proposed, Different design issues snd implementation techniques for the single-pipelined Header Processor are explained. Simulation models...

  5. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  6. Thesis Research Protocol November 2013 1 Thesis Research Protocol

    E-Print Network [OSTI]

    van Vliet, Lucas J.

    Thesis Research Protocol November 2013 1 Thesis Research Protocol November 2013 Thesis Research Project The master's programme Industrial Ecology is completed by the Thesis Research Project (TRP Ecology. The Thesis Research Project is composed of two modules: a Thesis Preparation Module (6 EC

  7. Sex GENOTYPING PROTOCOL PCR PROTOCOL NAME: Sex1

    E-Print Network [OSTI]

    Shoubridge, Eric

    Sex GENOTYPING PROTOCOL GENE NAME: PCR PROTOCOL NAME: Sex1 PCR REAGENTS: 10X NEB THERMOPOL PCR) PRIMERS: Sex1 Forward (20uM Standard Working Concentration) Sex1 Reverse (20uM Standard Working CONDITIONS: Sex (or Sex1) 95 C for 3 min 95 C for 30 sec 60 C for 1 min 35 cycles

  8. Continuous-Variable Protocols in the Noisy-Storage Model

    E-Print Network [OSTI]

    Fabian Furrer; Christian Schaffner; Stephanie Wehner

    2015-09-30

    We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achieve security by establishing a trade-off between quantum uncertainty generated in the protocol and the classical capacity of the memory channel. As our main technical tool, we study and derive new uncertainty relations for continuous-variable systems. Finally, we provide explicit security parameters for realistic memory models.

  9. 1999 CBECS Public Use Files

    Gasoline and Diesel Fuel Update (EIA)

    oil, propane, district steam or district hot water were used in the building. HOW ARE THE PUBLIC USE FILES USED? For each group of variables, there are two items: a layout file and...

  10. EPA -- Amended Environmental Impact Statement Filing System Guidance...

    Office of Environmental Management (EM)

    Amended Environmental Impact Statement Filing System Guidance EPA -- Amended Environmental Impact Statement Filing System Guidance Amended Environmental Impact Statement Filing...

  11. TO: FILE MEMORANDUM

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM:FILE

  12. Extending DIRAC File Management with Erasure-Coding for efficient storage

    E-Print Network [OSTI]

    Samuel Cadellin Skipsey; Paulin Todev; David Britton; David Crooks; Gareth Roy

    2015-10-30

    The state of the art in Grid style data management is to achieve increased resilience of data via multiple complete replicas of data files across multiple storage endpoints. While this is effective, it is not the most space-efficient approach to resilience, especially when the reliability of individual storage endpoints is sufficiently high that only a few will be inactive at any point in time. We report on work performed as part of GridPP\\cite{GridPP}, extending the Dirac File Catalogue and file management interface to allow the placement of erasure-coded files: each file distributed as N identically-sized chunks of data striped across a vector of storage endpoints, encoded such that any M chunks can be lost and the original file can be reconstructed. The tools developed are transparent to the user, and, as well as allowing up and downloading of data to Grid storage, also provide the possibility of parallelising access across all of the distributed chunks at once, improving data transfer and IO performance. We expect this approach to be of most interest to smaller VOs, who have tighter bounds on the storage available to them, but larger (WLCG) VOs may be interested as their total data increases during Run 2. We provide an analysis of the costs and benefits of the approach, along with future development and implementation plans in this area. In general, overheads for multiple file transfers provide the largest issue for competitiveness of this approach at present.

  13. Confidential Continuous Variable Direct Communication Protocol by Using Fock-Coherent Entangled States

    E-Print Network [OSTI]

    Soudeh Jahanshahi; Soroosh Alighanbari; Alireza Bahrampour; Mohammad Hossein Zandi

    2015-02-02

    We propose a scheme for the secure direct communication based on the entangled phase-coherent states, which shows an elevated level of confidentiality. The protocol gives a simultaneous security control for every bit of transferred information. The security-check-per-bit is provided by sending an additional mode to prove the legitimate parties' authenticity. Other benefit include increased transfer rate, since a separate control sequences is unnecessary. We study the security of the scheme for both ideal and realistic quantum channel. The protocol shows a robust security and prepares 50% probability to detect the presence of the eavesdropper.

  14. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  15. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;#12;Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  16. Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks Thomas R. Henderson * and Randy H. Katz University of California at Berkeley {tomhbased protocol, the Service Specific Connection Oriented Protocol (SSCOP), for use as a transport protocol

  17. LONG TERM FILE MIGRATION - PART I: FILE REFERENCE PATTERNS

    E-Print Network [OSTI]

    Smith, A.J.

    2011-01-01

    death). or even and a renewal model two state Semi-MarkovThus model for those files displaying no trend, a renewal

  18. File:20121127144736519.pdf | Open Energy Information

    Open Energy Info (EERE)

    pixels, file size: 116 KB, MIME type: applicationpdf) File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  19. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  20. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  1. Expressive Analytical Model for Routing Protocols infor Routing Protocols in

    E-Print Network [OSTI]

    Julien, Christine

    Taesoo Jun Angela Dalton Sh h k B dShreeshankar Bodas Christine Julien Sriram Vishwanath TR-UTEDGE-2007 in Mobile Ad Hoc Networks Taesoo Jun, Angela Dalton, Shreeshankar Bodas, Christine Julien, and Sriram, sriram}@ece.utexas.edu Abstract--Many routing protocols exist for mobile ad hoc networks. To select

  2. Reviews and approves OG protocol Publishes New protocols, Revisions,

    E-Print Network [OSTI]

    Kay, Mark A.

    CIRB reviews/approves Study-Specific Worksheet; notifies researcher & local IRB of acceptance Confirms- Specific Worksheet Worksheet Acceptance (site accepted) New protocols Revisions Renewals DSMB rpts Local local site closure to Researcher and to local IRB Oncology Group (OG) Scientific review at CTEP takes

  3. Globus Online File Transfer - NERSC Tutorial - March 8, 2011

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlassRegistration Welcome to

  4. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security The library is open only to members of Brasenose; strangers are not to be admitted. Eating, drinking (with the exception of water) and smoking are strictly forbidden. Library the library. Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  5. Langerhans Lab Protocols DRILL Data and Server Backup.docx revised 8/2/13 by JW & RBL Page 1 of 1

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols DRILL Data and Server Backup.docx revised 8/2/13 by JW & RBL Page 1 of 1 DRILL Data and Server Backups Weekly backup of DRILL Spreadsheet Working on the server computer: Open Navicat Lite -> Lab_Data -> drill -> tables -> drill_1 -> Export Wizard -> format: text file -> Next

  6. Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread programming models scaling properties and eventually higher density: phase change memory (PCM), spin torque transfer (STT-RAM), etc. PCM: heat and cool a material with elec pulses the rate of heat/cool determines

  7. A Protocol For Cooling and Controlling Composite Systems by Local Interactions

    E-Print Network [OSTI]

    Daniel Burgarth; Vittorio Giovannetti

    2008-11-14

    We discuss an explicit protocol which allows one to externally cool and control a composite system by operating on a small subset of it. The scheme permits to transfer arbitrary and unknown quantum states from a memory on the network ("upload access") as well as the inverse ("download access"). In particular it yields a method for cooling the system.

  8. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  9. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    April 2015 (Revision 1) - PROTOCOL - EA-30-02 Office of Environment, Safety and Health Assessments Protocol for Required Reading, April 2015 (Revision 1) - PROTOCOL -...

  10. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and MyersHr. Anthony V. Andolina:I.)p' : ,J: FILE

  11. TO: FILE FROM: SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  12. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company Name orElectronicElenaEliza File

  13. MICROCOMP output file

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA PublicLED1,400 Jobs |Inc.MEETINGO:\END\EPAC300.lc (file 1 of

  14. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/O Streams forOrhan Kizilkaya, Ph.D. Title:Other File Systems

  15. Implementation of two-party protocols in the noisy-storage model

    SciTech Connect (OSTI)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-15

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  16. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  17. Transfer information remotely via noise entangled coherent channels

    E-Print Network [OSTI]

    A. El Allati; N. Metwally; Y. Hassouni

    2010-02-11

    In this contribution, a generalized protocol of quantum teleportation is suggested to investigate the possibility of remotely transfer unknown multiparities entangled coherent state. A theoretical technique is introduced to generate maximum entangled coherent states which are used as quantum channels. We show that the mean photon number plays a central role on the fidelity of the transferred information. The noise parameter can be considered as a control parameter only for small values of the mean photon number.

  18. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and Alexandre Juin 1994 #12; Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v the existing hardware and software testing methods would be adequate for the testing of communication protocols

  19. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and AlexandreZal Juin 1994 #12;Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v. Bochmann and software testing methods would be adequate for the testing of communication protocols. The purpose

  20. The Pulse Protocol: Energy Efficient Infrastructure Access

    E-Print Network [OSTI]

    Awerbuch, Baruch

    The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, herb}@cs.jhu.edu Abstract-- We present the Pulse protocol which is designed for multi-hop wireless. The Pulse protocol utilizes a periodic flood initiated at the network gateways which provides both routing

  1. TEC Working Group Topic Groups Archives Protocols

    Broader source: Energy.gov [DOE]

    The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  2. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et tudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  3. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  4. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  5. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  7. Transfer of Spatial Reference Frame Using Singlet States and Classical Communication

    E-Print Network [OSTI]

    Thomas B. Bahder

    2014-08-27

    A simple protocol is described for transferring spatial direction from Alice to Bob (two spatially separated observers) up to inversion. The two observers are assumed to share quantum singlet states and classical communication. The protocol assumes that Alice and Bob have complete free will (measurement independence) and is based on maximizing the Shannon mutual information between Alice and Bob's measurement outcomes. Repeated use of this protocol for each spatial axis of Alice allows transfer of a complete 3-dimensional reference frame, up to inversion of each of the axes. The technological complexity of this protocol is similar to that needed for BB84 quantum key distribution, and hence is much simpler to implement than recently proposed schemes for transmission of reference frames. A second protocol based on a Bayesian formalism is also presented.

  8. Fast population transfer engineering of three-level systems

    E-Print Network [OSTI]

    Xi Chen; J. G. Muga

    2012-07-12

    We design, by invariant-based inverse engineering, resonant laser pulses to perform fast population transfers in three-level systems. The efficiency and laser intensities are examined for different protocols. The energy cost to improve the fidelity is quantified. The laser intensities can be reduced by populating the intermediate state and by multi-mode driving.

  9. Bioheat Transfer Valvano, page 1 Bioheat Transfer

    E-Print Network [OSTI]

    a technically challenging task. First, tissue heat transfer includes conduction, convection, radiation and by heat transfer due to blood flow near the probe. In vivo, the instrument measures effective thermal properties that are the combination of conductive and convective heat transfer. Thermal properties

  10. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  11. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  12. Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    count has been set back to 2 on Aug 5. The file stripe count of 1 triggered a bug with "cp -p" in a loop calling sytem function ioctl(). The bug has been fixed in new Lustre...

  13. Using pico to edit files

    E-Print Network [OSTI]

    Using pico to edit files. Someday you might want to learn emacs or vi. They are much more powerful editors than pico, but much more complicated, too. I have...

  14. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  15. Extending DIRAC File Management with Erasure-Coding for efficient storage

    E-Print Network [OSTI]

    Skipsey, Samuel Cadellin; Britton, David; Crooks, David; Roy, Gareth

    2015-01-01

    The state of the art in Grid style data management is to achieve increased resilience of data via multiple complete replicas of data files across multiple storage endpoints. While this is effective, it is not the most space-efficient approach to resilience, especially when the reliability of individual storage endpoints is sufficiently high that only a few will be inactive at any point in time. We report on work performed as part of GridPP\\cite{GridPP}, extending the Dirac File Catalogue and file management interface to allow the placement of erasure-coded files: each file distributed as N identically-sized chunks of data striped across a vector of storage endpoints, encoded such that any M chunks can be lost and the original file can be reconstructed. The tools developed are transparent to the user, and, as well as allowing up and downloading of data to Grid storage, also provide the possibility of parallelising access across all of the distributed chunks at once, improving data transfer and IO performance. ...

  16. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Office of Environmental Management (EM)

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  17. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform...

    Energy Savers [EERE]

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  18. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov [DOE]

    This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007.

  19. Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization

    E-Print Network [OSTI]

    Bernardo, Danilo Valeros; 10.5121/ijnsa.2010.2402

    2010-01-01

    The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the dev...

  20. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  1. CMSC 412 Project #5 File System

    E-Print Network [OSTI]

    Hollingsworth, Jeffrey K.

    will be emailed to you). CFS - Chameleon FileSystem The main part of this project is to develop a new filesystem. The second IDE disk's image is called diskd.img. CFS will provide a filesystem that includes multiple. Then you can mount the CFS file system on drive 1 onto /d, for instance. VFS and file operations Since

  2. Wireless adiabatic power transfer

    SciTech Connect (OSTI)

    Rangelov, A.A., E-mail: rangelov@phys.uni-sofia.bg [Department of Physics, Sofia University, James Bourchier 5 blvd., 1164 Sofia (Bulgaria); Suchowski, H.; Silberberg, Y. [Department of Physics of Complex System, Weizmann Institute of Science, Rehovot 76100 (Israel); Vitanov, N.V. [Department of Physics, Sofia University, James Bourchier 5 blvd., 1164 Sofia (Bulgaria)

    2011-03-15

    Research Highlights: > Efficient and robust mid-range wireless energy transfer between two coils. > The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. > Wireless energy transfer is insensitive to any resonant constraints. > Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  3. Improving the Security of Cryptographic Protocol Standards

    E-Print Network [OSTI]

    Basin, David

    for their implementation. This generality is enabled by standards and technical documents such as Request for CommentsImproving the Security of Cryptographic Protocol Standards David Basin Cas Cremers Kunihiko Miyazaki Sasa Radomirovic Dai Watanabe May 1, 2014 Keywords: Standards, Network Protocols, Security

  4. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  5. Protocols for Processes Munindar P. Singh

    E-Print Network [OSTI]

    Protocols for Processes Munindar P. Singh (Students: Amit K. Chopra, Nirmit V. Desai, Ashok U. Mallya) singh@ncsu.edu Department of Computer Science North Carolina State University http://www.csc.ncsu.edu/faculty/mpsingh/ c Munindar P. Singh, July 2004 p.1/25 #12;Why Processes and Protocols? Heavy interest from

  6. Positron: Composing Commitment Protocols No Institute Given

    E-Print Network [OSTI]

    to a specific role). We evaluate our contributions by modeling well-known protocols in the insurance, manufactur with how they relate to one another. Such a description, even if supported by standards such as BPMN [20 exchanged by the business partners. In contrast, a commitment protocol emphasizes the social state

  7. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  8. Measuring Transport Protocol Potential for Energy Efficiency

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras. Several attempts have been made to measure the energy efficiency of trans- port protocols, (e.g. [10], [12-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

  9. HEAT TRANSFER FLUIDS

    E-Print Network [OSTI]

    Lenert, Andrej

    2012-01-01

    The choice of heat transfer fluids has significant effects on the performance, cost, and reliability of solar thermal systems. In this chapter, we evaluate existing heat transfer fluids such as oils and molten salts based ...

  10. Accessing Your EM Data Through the File Server A major problem of putting flash drives directly into the microscope

    E-Print Network [OSTI]

    Baker, Timothy S.

    into the microscope computer is the threat of viruses. A particularly malevolent virus could shut the microscope down including your home computer. Here are the steps for transferring and accessing your files. 1. On the microscope computer go to the Desktop and then to: My Computer/Tools/M ap Network Drive. 2. In the Drive: box

  11. Heat Transfer Guest Editorial

    E-Print Network [OSTI]

    Kandlikar, Satish

    Journal of Heat Transfer Guest Editorial We are indeed delighted in bringing out this special issue was showcased in diverse areas such as traditional heat and mass transfer, lab-on-chip, sensors, biomedical applica- tions, micromixers, fuel cells, and microdevices. Selected papers in the field of heat transfer

  12. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  13. Context-Aware Protocol Engines for Ad Hoc Networks

    E-Print Network [OSTI]

    Garcia-Luna-Aceves, J.J.

    2009-01-01

    Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation

  14. Adapting a delay-based protocol to heterogeneous environments

    E-Print Network [OSTI]

    Kotla, Kiran

    2008-10-10

    We investigate the issues in making a delay-based protocol adaptive to heterogeneous environments. We assess and address the problems a delay-based protocol faces when competing with a loss-based protocol such as TCP. We ...

  15. An Alternative Quantization Protocol for the History Dependent Parrondo Game

    E-Print Network [OSTI]

    Faisal Shah Khan

    2008-06-09

    Earlier work on the quantization of the history dependent (HD) Parrondo game by Flitney, Ng, and Abbott led to the FNA protocol. We propose an alternative quantization protocol for this game which differs from the FNA protocol in various aspects.

  16. Office of Environment, Safety and Health Assessments Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    April 2015 Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 The purpose of this protocol is to establish...

  17. Web-enabled project management and collaboration using Microsoft Groove system

    E-Print Network [OSTI]

    Yuksel, Kamer

    2008-10-10

    Application Service Provider CFMA Construction Financial Management Association EDA Electronic Data Interchange FTP File Transfer Protocols IT Information Technology NSPE National Society of Professional Engineers PMCS Project Management... ............................................................................................................56 5.3 Files Tool..................................................................................................................57 5.4 Forms Tool...

  18. Heat transfer system

    DOE Patents [OSTI]

    Not Available

    1980-03-07

    A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

  19. Heat transfer system

    DOE Patents [OSTI]

    McGuire, Joseph C. (Richland, WA)

    1982-01-01

    A heat transfer system for a nuclear reactor. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

  20. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

  1. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  2. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

  3. High Performance Computing Data Center Metering Protocol | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

  4. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

  5. TEC Working Group Topic Groups Archives Protocols Meeting Summaries...

    Office of Environmental Management (EM)

    Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 Jacksonville TEC Meeting,...

  6. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  7. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Office of Environmental Management (EM)

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design...

  8. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  9. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  10. The Development of Rapid Aging and Poisoning Protocols for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices...

  11. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at...

  12. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments Protocol for the Development and Maintenance of Criteria Review and...

  13. Optimizing local protocols implementing nonlocal quantum gates

    E-Print Network [OSTI]

    Scott M. Cohen

    2010-02-02

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and are deterministic while also being "one-shot", in that they use only one copy of an entangled resource state. The optimization is in the sense of minimizing the amount of entanglement used, and it is often the case that less entanglement is needed than with an alternative protocol using two-way teleportation.

  14. Energy Assessment Protocol for Glass Furnaces

    E-Print Network [OSTI]

    Plodinec, M. J.; Kauffman, B. M.; Norton, O. P.; Richards, C.; Connors, J.; Wishnick, D.

    2005-01-01

    of the protocol are implemented, resulting in cost savings of greater than $200,000 per year. PROJECT OVERVIEW The glass industry is a major energy consumer. Depending on the market sector, a glass furnace heated by oxy-fuel burners may use from 3..., the manufacturer of the burners used in the PPG furnace, brought extensive field experience to the team, as well as in-depth knowledge of burner performance. ENERGY ASSESSMENT PROTOCOL The project team developed the protocol based on DIAL, Eclipse and PPG...

  15. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  16. JOURNAL OF LATEX CLASS FILES 1 Specification and Synthesis of Reactive Protocols

    E-Print Network [OSTI]

    Xu, Huan

    towards more-electric aircraft increases efficiency by reducing power take-offs from the engines, Pasadena, CA 91125, USA, and (2) Department of Electrical and Systems Engineering, Uni- versity Electric Power Distribution Huan Xu1, Ufuk Topcu2, and Richard M. Murray1 Abstract--The increasing

  17. File:State protocol agreement oct2009.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto ElectricMonasterwindCAESRAPID Toolkit Flyer.pdfSkystream

  18. GDCT Initialization File [gdct.ini] Format Specification Guide

    E-Print Network [OSTI]

    Rosebrugh, Robert

    GDCT Initialization File [gdct.ini] Format Specification Guide Written By: Jeremy Bradbury June 22, 2000 Below is the layout of the gdct.ini file. It is important to note the following: If the gdct.ini to represent that a file does not exist under the "Recent Files" section of the gdct.ini file. [Internal

  19. Protected quantum-state transfer in decoherence-free subspaces

    E-Print Network [OSTI]

    Wei Qin; Chuan Wang; Xiangdong Zhang

    2015-04-07

    We propose and analyse a robust quantum state transfer protocol by the use of a combination of coherent quantum coupling and decoherence-free subspaces in a coupled quantum spin chain. Under decoherence, an arbitrary unknown quantum state embedded in a decoherence-free subspace can be perfectly transferred through a noisy channel being weakly coupled to two end registers. The method protects quantum information from both the channel noise and the environmental decoherence. A special case of utilizing two physical qubits to encode one logical qubit is considered as an example and the robustness is confirmed by numerical performances.

  20. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  1. A SECURE TEXT MESSAGING PROTOCOL Gary Belvin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in conformity with the requirements for the degree of Master of Science in Security Informatics. Baltimore Key Agreement Protocol for SMS (KAPS) 12 3.1 Retransmission Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.9 Key Agreement

  2. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  3. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10

    In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the ...

  4. Verifying the Mascara Protocol | A rst step |

    E-Print Network [OSTI]

    Sidorova, Natalia

    Verifying the Mascara Protocol | A #12;rst step | Dragan Bosnacki Dennis Dams Susanne Graf Leszek list properties associated with the di#11;erent entities which we intend to verify or for which we

  5. An Algorithm for Evolving Protocol Constraints

    E-Print Network [OSTI]

    Collins, Mark

    We present an investigation into the design of an evolutionary mechanism for multiagent protocol constraint optimisation. Starting with a review of common population based mechanisms we discuss the properties of the ...

  6. Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File

    E-Print Network [OSTI]

    Sokol, Dina

    Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File To save | New | Source File. d. In the new window, right-click and select Paste. e. Then select "File | Save as" to save and name the file. i. In the window that pops up, the bottom fill-in box is labelled "Save as type

  7. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    "B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson, C.E. Hancock

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  8. Fuel transfer system

    DOE Patents [OSTI]

    Townsend, H.E.; Barbanti, G.

    1994-03-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool. 6 figures.

  9. Fuel transfer system

    DOE Patents [OSTI]

    Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Cupertino, CA)

    1994-01-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

  10. Facility Survey & Transfer

    Broader source: Energy.gov [DOE]

    As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

  11. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  12. On the Complexity of Verifying Cyber-Physical Security Protocols

    E-Print Network [OSTI]

    Nigam, Vivek

    On the Complexity of Verifying Cyber-Physical Security Protocols Max Kanovich, Tajana Ban Kirigin agents. We classify such security protocols as Cyber-Physical.6 The key elements of such protocols important class of Bounded Memory Cyber-Physical Security19 Protocols with a Memory Bounded Intruder

  13. Validating a token coherence protocol for scientific Fernandez-Pascual

    E-Print Network [OSTI]

    Acacio, Manuel

    Validating a token coherence protocol for scientific workloads Ricardo Fernandez-Pascual r.fernandez

  14. Automatic Protocol Selection in Secure Two-Party Computations

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Protocol Selection in Secure Two-Party Computations (Full Version) Florian Kerschbaum1 for the best performance. In this paper we propose automatic protocol selection which selects a protocol, based on an extended performance model we automatically select the best protocol for a sub

  15. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    Help Apps Datasets Community Login | Sign Up Search File Edit History File:CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search...

  16. Department of Energy Files Motion to Withdraw Yucca Mountain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 -...

  17. NERSC Online Training May 3: Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Online Training May 3: Navigating NERSC File Systems NERSC Online Training May 3: Navigating NERSC File Systems April 26, 2011 by Richard Gerber A NERSC training event, "Navigating...

  18. Hybrid protocol of remote implementations of quantum operations

    E-Print Network [OSTI]

    Ning Bo Zhao; An Min Wang

    2007-08-04

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

  19. Transport Protocol Services (TAPS) Problem: more and more transport protocols available, with various features,

    E-Print Network [OSTI]

    Welzl, Michael

    Transport Protocol Services (TAPS) Problem: more and more transport protocols that would not offer "TCP or UDP" but "transport services" A transport system: transport-services@ifi.uio.no hXps://sympa.uio.no/ifi.uio.no/info/transport-services Problem

  20. Voice Recognition Data Collection Operating Protocol

    E-Print Network [OSTI]

    .5.1; ACI Inc. Database NiCad, or NiHyd 9v rechargeable battery Installation Install and set up format Data are entered in a standardized manner in Word and saved as a text-only-with-line- breaks file

  1. Wireless adiabatic power transfer

    E-Print Network [OSTI]

    A. A. Rangelov; H. Suchowski; Y. Silberberg; N. V. Vitanov

    2010-10-30

    We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  2. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  3. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  4. Quantum Communication Protocol Employing Weak Measurements

    E-Print Network [OSTI]

    Alonso Botero; Benni Reznik

    1999-09-27

    We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin. In our protocol, Alice, first generates a "code" by performing weak measurements on a sample of N spins. The sample is sent to Bob, who later performs a post-selection by measuring the spin along either of two certain directions. The results of the post-selection define the "key', which he then broadcasts publicly. Using both her previously generated code and this key, Alice is able to infer the {\\em direction} chosen by Bob in the post-selection. Alternatively, if Alice broadcasts publicly her code, Bob is able to infer from the code and the key the direction chosen by Alice for her weak measurement. Two possible experimental realizations of the protocols are briefly mentioned.

  5. 1 Files and Databases mass storage

    E-Print Network [OSTI]

    Verschelde, Jan

    Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested Jan Verschelde, 28 January 2015 Intro to Computer Science (MCS 260) mass storage and dictionaries L-7 28 January 2015 1 / 32 #12;mass storage dictionaries in Python 1 Files and Databases mass storage

  6. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelire; R. Lauro; J. Ruggiero; J. -L. Le Gout

    2009-11-17

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  7. Technology transfer 1994

    SciTech Connect (OSTI)

    Not Available

    1994-01-01

    This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

  8. TO: FILE FROM: I SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  9. TO: FILE MEMORANDUM ALTERNATE NAME:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE

  10. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR THE SITE-218in aradsafe/files [ICO] Name Last

  11. A Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    -- Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In additionA Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks J. Jobin, for many sensor network applications, timeliness of data delivery at a sink that collects and interprets

  12. HEAT AND MOISTURE TRANSFER THROUGH CLOTHING

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01

    R. C. Eberhart (ed), Heat transfer in medicine and biology.between convective heat transfer and mass transferConvective and radiative heat transfer coefficients for

  13. Heat and moisture transfer through clothing

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01

    R. C. Eberhart (ed), Heat transfer in medicine and biology.Convective and radiative heat transfer coefficients forbetween convective heat transfer and mass transfer

  14. Ames Lab 101: Technology Transfer

    ScienceCinema (OSTI)

    Covey, Debra

    2012-08-29

    Ames Laboratory Associate Laboratory Director, Sponsored Research Administration, Debra Covey discusses technology transfer. Covey also discusses Ames Laboratory's most successful transfer, lead-free solder.

  15. Repairable File and Storage Systems A Dissertation Presented

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Repairable File and Storage Systems A Dissertation Presented by Ningning Zhu to The Graduate School of the Dissertation Repairable File and Storage System by Ningning Zhu Doctor of Philosophy in Computer Science Stony stream file/storage system. Repairable file/storage system needs to perform two tasks. First it has

  16. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 l total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  17. Comparing Communication Protocols under Cooperative Pressure

    E-Print Network [OSTI]

    Eiben, A.E. "Guszti"

    Comparing Communication Protocols under Cooperative Pressure A.E. Eiben M.C. Schut N. Vink largely on the abilities of the agents to cooperate and communicate. In environments where coordination is essential for goal accomplishment, agents must thus appropriately communicate for cooperative task

  18. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode end-to-end tunnel mode security-gateway to security-gateway transport mode and tunnel model can coexist #12;7 Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8 Ravi

  19. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  20. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the tworound group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  1. Efficiency Limitations for -Protocols for Group Homomorphisms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Limitations for -Protocols for Group Homomorphisms (Full Version) Endre Bangerter1 , Jan stephan.krenn@bfh.ch Abstract. Efficient zero-knowledge proofs of knowledge for group ho- momorphisms be performed very efficiently within groups of known order, for hidden order groups the respective proofs

  2. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  3. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    structure called the blockchain. The protocol requires from miners to solve a "proof of work" (POW, aka-forcing a hash inequality based on SHA-256, in order to generate new blocks for the blockchain. The blocks that comprise the blockchain contain sets of transactions that are generated at will by owners of bitcoins, who

  4. Increasing Communications Security through Protocol Parameter Diversity

    E-Print Network [OSTI]

    New Mexico, University of

    of the protocol more difficult to predict. This form of diversity is designed to mitigate the shrew attack [16 Rica, 2060 gbarrantes@ecci.ucr.ac.cr and Stephanie Forrest University of New Mexico, Department. Recently, several projects have addressed the problem of widely replicated attacks through a technique

  5. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  6. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01

    data when transmitted over best-effort networks like the Internet. The protocols are end-to-end, and do not propose any modifications (like reservations) to the network infrastructure-hence, they can be used over the existing Internet. The design...

  7. Multiscale photosynthetic exciton transfer

    E-Print Network [OSTI]

    A. K. Ringsmuth; G. J. Milburn; T. M. Stace

    2012-06-14

    Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest sustained coherent exciton transfer may be possible over distances large compared with nearest-neighbour (n-n) chromophore separations, at physiological temperatures, in a clustered network with small static disorder. This may support findings suggesting long-range coherence in algal chloroplasts, and provides a framework for engineering large chromophore or quantum dot high-temperature exciton transfer networks.

  8. Policy on Cost Transfer Policy on Cost Transfer

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Policy on Cost Transfer 12/22/2014 Policy on Cost Transfer I. Purpose and Scope The University has posting of a cost to the general ledger, initiated by payroll charges, purchase orders or check requests (and the purchasing card). Cost Transfer means any subsequent transfer of the original charge

  9. Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference

    E-Print Network [OSTI]

    Kandlikar, Satish

    Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference Las Vegas, Nevada, USA July 21-23, 2003 HT2003-47449 HEAT TRANSFER FROM A MOVING AND EVAPORATING MENISCUS ON A HEATED SURFACE meniscus with complete evaporation of water without any meniscus break-up. The experimental heat transfer

  10. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-01-06

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  11. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-02-03

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  12. Protocols for the Equitable Assessment of Marine Energy Converters

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  13. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  14. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  15. Accelerating the transfer in Technology Transfer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposalsAboutAccelerating the transfer in

  16. MAVIDOS Maternal Vitamin D Osteoporosis Study: study protocol for a randomized controlled trial.

    E-Print Network [OSTI]

    Harvey, Nicholas C.; Javaid, Kassim; Bishop, Nicholas; Kennedy, Stephen; Papageorghiou, Aris T.; Fraser, Robert; Gandhi, Saurabh V.; Schoenmakers, Inez; Prentice, Ann; Cooper, Cyrus

    2012-02-07

    Maternal Vitamin D Osteoporosis Study: study protocol for a randomized controlled trial. The MAVIDOS Study Group Nicholas C Harvey1, Kassim Javaid2, Nicholas Bishop3, Stephen Kennedy4, Aris T Papageorghiou4, Robert Fraser5, Saurabh V Gandhi5, Inez... ]. The effect of maternal 25(OH)- vitamin D status appeared to be partly mediated via concentrations of venous umbilical cord calcium, sug- gesting that placental calcium transfer to the fetus may be a critical step in these associations. Indeed mRNA expression...

  17. File:Apschem.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File history File

  18. Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley

    E-Print Network [OSTI]

    Foley, Simon

    and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

  19. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    E-Print Network [OSTI]

    Jump, David

    2014-01-01

    for Proprietary Software Testing Protocols (vendors value software testing as a means to and requirements for testing software vendor energy

  20. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,

  1. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,Coke

  2. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin

  3. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million

  4. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall

  5. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric Power

  6. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric

  7. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to

  8. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15

  9. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15Electric Power

  10. FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and Myers CoMadison -T:..) ".. _,;

  11. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002 2.

  12. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002

  13. TECHNOLOGY TRANSFER: PROBLEMS AND PROSPECTS

    E-Print Network [OSTI]

    TECHNOLOGY TRANSFER: PROBLEMS AND PROSPECTS Jesse w. Fussell Department of Defense 9800 Savage Road of technology transfer in this technical area in the past, to forecast prospects for technology transfer in the future, and to suggest some ideas for stimulating the process. 2. TECHNOLOGY TRANSFER PROBLEMS Many

  14. Protocol for laboratory research on degradation, interaction, and fate of wastes disposed by deep-well injection: Final report

    SciTech Connect (OSTI)

    Collins, A.G.; Crocker, M.E.

    1987-12-01

    The objective of this research investigation was to develop a laboratory protocol for use in determining degradation, interaction, and fate of organic wastes disposed in deep subsurface reservoirs via disposal wells. Knowledge of the ultimate fate of deep-well disposed wastes is important because provisions of the Resource Conservation and Recovery Act (RCRA) require that by August 1988, the Environmental Protection Agency (EPA) must show that the disposal of specified wastes by deep-well injection is safe to human health and the environment, or the practice must be stopped. The National Institute for Petroleum and Energy Research (NIPER) developed this protocol primarily by transferring some of its expertise and knowledge of laboratory protocol relevant to improved recovery of petroleum. Phenol, because it is injected into deep, subsurface reservoirs for disposal, was selected for study by the EPA. Phenol is one waste product that has been injected into the Frio formation; therefore, a decision was made to use phenol and sedimentary rock from the Frio formation for a series of laboratory experiments to demonstrate the protocol. This study investigates the adsorption properties of a specific reservoir rock which is representative of porous sedimentary geologic formations used as repositories for hazardous organic wastes. The developed protocol can be used to evaluate mobility, adsorption, and degradation of an organic hazardous waste under simulated subsurface reservoir conditions. 22 refs., 13 figs., 16 tabs.

  15. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    Deng, Yuxin

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1 , Stephane Grumbach2 , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  16. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1,2, , Stephane Grumbach3, , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  17. Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko

    E-Print Network [OSTI]

    Goddard, Wayne

    Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet

  18. Concrete Security for Entity Recognition: The Jane Doe Protocol

    E-Print Network [OSTI]

    Zenner, Erik

    Concrete Security for Entity Recognition: The Jane Doe Protocol Stefan Lucks1 , Erik Zenner2 , Andr NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether ­ the "Jane Doe Protocol" ­, and provides a formal proof of its concrete security. The protocol neither

  19. Automated protocol selection for energy efficient WSN applications

    E-Print Network [OSTI]

    Atkinson, Robert C

    Automated protocol selection for energy efficient WSN applications C. Shen, S. Harte, E. Popovici the implementation of different protocols for different topology and appli- cation scenarios to optimise the overall Heterogeneous Automated Wireless Sensor (THAWS), embedding a reactive routing protocol, an energy

  20. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  1. Instructions to CBECS 1992 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    and dBASE (CE92F01D.DBF) formats. These files contain the 1992 CBECS basic data including building characteristics, energy consumption and expenditures, and temperature data. The...

  2. Optimizing Native Files in Energy.gov

    Broader source: Energy.gov [DOE]

    For native files in Energy.gov, following these best practices will result in better search results in commercial search engines. To learn how to optimize PDFs, see the PDF requirements.

  3. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later algorithm ? cipher spec · encryption algorithm · message digest algorithm ? master secret · 48 byte shared secret ? is resumable flag · can be used to initiate new connections 10© Ravi Sandhu 2001 SSL CONNECTION

  4. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later secret · 48 byte shared secret is resumable flag · can be used to initiate new connections 10© Ravi each keys generated from master secret, client/server random client_write_MAC_secret server_write_MAC_secret

  5. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  7. Technology transfer issue

    SciTech Connect (OSTI)

    Jacobson, C.

    1982-05-31

    Testimony by Lawrence J. Brady, Commerce Assistant Secretary for Trade Administration, at Congressional hearings on the national security issues of technology transfers to the Soviet Union identified steps the US needs to take to deal effectively with the problem. These steps include an understanding of how the Soviet Union has and will benefit militarily by acquiring Western technology and efforts to work with other countries, counterintelligence agencies, and industries to stem the flow of technological information. Brady outlined changes in technology development that complicate the enforcement of transfer rules, and emphasized the importance of a close relationship between the business community and the Commerce Department. (DCK)

  8. Analysis and behavioral modeling of the Finite State Machines of the Xpress Transfer Protocol

    E-Print Network [OSTI]

    Madduri, Venkateswara Rao

    1994-01-01

    . This research focuses on the analysis and behavioral modeling of the Finite State Machines of the XTP. The simulation language used is the Verilog Hardware Description Language. We have modeled XTP Finite State Machines as a set of communicating, concurrent...

  9. Incorporation of analgesics into rodent embryo transfer protocols: assessing the effects on reproductive outcomes

    E-Print Network [OSTI]

    Burckhardt, Heather Ann

    2009-05-15

    an unforeseen difficulty: the increased burden on facilities due to the number of animals needing to be housed. The answer to this difficulty was cryopreservation. This technique was first performed successfully in 1972 on mouse embryos. Since then... from Harlan and vasectomized Swiss Webster and ICR male mice from Harlan were selected for this project. All animals were housed at Texas A&M University?s Laboratory Animal Resources and Research (LARR) facility, which is accredited...

  10. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  11. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  12. File:06COAExtraLegalVehiclePermittingProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    traLegalVehiclePermittingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:06COAExtraLegalVehiclePermittingProcess.pdf Size of this preview: 463 ...

  13. Three Dimensional Radiative Transfer

    E-Print Network [OSTI]

    Tom Abel

    2000-05-09

    Radiative Transfer (RT) effects play a crucial role in the thermal history of the intergalactic medium. Here I discuss recent advances in the development of numerical methods that introduce RT to cosmological hydrodynamics. These methods can also readily be applied to time dependent problems on interstellar and galactic scales.

  14. DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c

    E-Print Network [OSTI]

    Wiederhold, Gio

    To a Mouse, 1787 The previous chapter described models of databases. The structure of the database the database model, but do not make it directly available to a database management system. In this chapter we404 !le DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c fl1977 by Mc

  15. Introduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File

    E-Print Network [OSTI]

    The library was completely overhauled It now provides consistently named functions and data types The commentsIntroduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File System Softwarepraktikum fur Fortgeschrittene Michael Kuhn Parallele und

  16. Cost Transfer Procedures How And When To Make Cost Transfers

    E-Print Network [OSTI]

    Hammack, Richard

    Cost Transfer Procedures How And When To Make Cost Transfers Effective February 9, 2003, cost elsewhere. Federal regulations require additional documentation to support cost transfers to sponsored program indexes. Costs may not be shifted to other research projects or from one budget period to the next

  17. Faculty Positions Heat Transfer and

    E-Print Network [OSTI]

    Faculty Positions Heat Transfer and Thermal/Energy Sciences Naval Postgraduate School Monterey-track faculty position at the assistant professor level in the areas of Heat Transfer and Thermal/Fluid Sciences

  18. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  19. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  20. Call Description cread highspeed, synchronous read from a CFS file

    E-Print Network [OSTI]

    Torczon, Virginia

    Call Description cread highspeed, synchronous read from a CFS file cwrite highspeed, synchronous write to a CFS file gilow global MIN operation used for integer scalars gopf make a global operation

  1. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY REPORT: SPA130 ROOM INVENTORY REPORT RUN

  2. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA

  3. Swipe transfer assembly

    DOE Patents [OSTI]

    Christiansen, Robert M. (Blackfoot, ID); Mills, William C. (McKeesport, PA)

    1992-01-01

    The swipe transfer assembly is a mechanical assembly which is used in conjunction with glove boxes and other sealed containments. It is used to pass small samples into or out of glove boxes without an open breach of the containment, and includes a rotational cylinder inside a fixed cylinder, the inside cylinder being rotatable through an arc of approximately 240.degree. relative to the outer cylinder. An offset of 120.degree. from end to end allows only one port to be opened at a time. The assembly is made of stainless steel or aluminum and clear acrylic plastic to enable visual observation. The assembly allows transfer of swipes and smears from radiological and other specially controlled environments.

  4. QER- Comment of Energy Transfer

    Broader source: Energy.gov [DOE]

    From: Lee Hanse Executive Vice President Interstate Energy Transfer Mobile - 210 464 2929 Office - 210 403 6455

  5. HIGEE Mass Transfer

    E-Print Network [OSTI]

    Mohr, R. J.; Fowler, R.

    1986-01-01

    compared with other more conventional mass transfer equipment, will show up to advantage at reasonably large capacity but compare poorly for low capacity duties. (3) Capacity and separation capability (i.e. number of stages) in a HIGEE... are not independent variables, because diameter features in both. If the casing dimensions, OD and axial length, are arbitrarily fixed; then for a duty requiring a large number of stages the packing thickness will be greater and the ID correspondingly smaller...

  6. Plastic container bagless transfer

    DOE Patents [OSTI]

    Tibrea, Steven L.; D'Amelio, Joseph A.; Daugherty, Brent A.

    2003-11-18

    A process and apparatus are provided for transferring material from an isolated environment into a storage carrier through a conduit that can be sealed with a plug. The plug and conduit can then be severed to provide a hermetically sealed storage carrier containing the material which may be transported for storage or disposal and to maintain a seal between the isolated environment and the ambient environment.

  7. Technology Transfer, Entrepreneurship and Innovation

    E-Print Network [OSTI]

    Reed, Nancy E.

    Technology Transfer, Entrepreneurship and Innovation The College of Engineering at UH Manoa has a strong tradition of technology transfer and entrepreneurship that supports the University of Hawai`i's innovation and technology transfer initiative. Principal units are mechanical engineering, electrical

  8. 5. Heat transfer Ron Zevenhoven

    E-Print Network [OSTI]

    Zevenhoven, Ron

    Three heat transfer mechanisms Conduction Convection Radiation 2/120 Pic: B88 bo Akademi University1/120 5. Heat transfer Ron Zevenhoven bo Akademi University Thermal and Flow Engineering / Vrme | Thermal and Flow Engineering | 20500 Turku | Finland #12;3/120 5.1 Conductive heat transfer bo Akademi

  9. Technology Transfer Ombudsman Program | Department of Energy

    Office of Environmental Management (EM)

    Technology Transfer Ombudsman Program Technology Transfer Ombudsman Program The Technology Transfer Commercialization Act of 2000, Public Law 106-404 (PDF) was enacted in November...

  10. Duplicate File Names-A Novel Steganographic Data Hiding Technique

    E-Print Network [OSTI]

    Wu, Jie

    or a terrorist plot. None-the-less, these files can also be potentially dangerous viruses, malware, child porn

  11. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  12. Patent subsidy and patent filing in China By Zhen Lei

    E-Print Network [OSTI]

    Sekhon, Jasjeet S.

    Patent subsidy and patent filing in China By Zhen Lei , Zhen Sun, and Brian Wright Department of patent subsidy policies on patent filings in Chi- na. China had rapid growth in patenting in recent years and became the number one in patent filings in 2011. We study five neighboring cities in Jiangsu province

  13. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 3 PGM = SPAR1 2010 FLORIDA

  14. 3.0 Exporting Models Save model as OBJ file

    E-Print Network [OSTI]

    Gordon, Scott

    3.0 Exporting Models Save model as OBJ file: o Make sure that the model, and the UV are saved. Save model as an OgreXML file: o Install the blender2ogre exporter Visit https directory (remember that single-click selects a folder) o Type a name for the saved file in the box just

  15. US - Voice Over Internet Protocol Phone Service Providers Market Analysis

    E-Print Network [OSTI]

    Srinivasan, Vijaybabu

    2006-05-19

    .263 Bit stream in the Real-time Transport Protocol Vijaybabu Srinivasan Spring 2006 17 EMGT835 RTCP RTP Control protocol RTP Real-Time Transport H.323 Protocols... Total 100 Reputation/ Image: Evaluation Criteria: Reputation is the current sum total of the specific traits attributed to a company by people. A company?s reputation is produced by the memory impressions of its perceived actions over time. 13...

  16. Tuning HDF5 for Lustre File Systems

    SciTech Connect (OSTI)

    Howison, Mark; Koziol, Quincey; Knaak, David; Mainzer, John; Shalf, John

    2010-09-24

    HDF5 is a cross-platform parallel I/O library that is used by a wide variety of HPC applications for the flexibility of its hierarchical object-database representation of scientific data. We describe our recent work to optimize the performance of the HDF5 and MPI-IO libraries for the Lustre parallel file system. We selected three different HPC applications to represent the diverse range of I/O requirements, and measured their performance on three different systems to demonstrate the robustness of our optimizations across different file system configurations and to validate our optimization strategy. We demonstrate that the combined optimizations improve HDF5 parallel I/O performance by up to 33 times in some cases running close to the achievable peak performance of the underlying file system and demonstrate scalable performance up to 40,960-way concurrency.

  17. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    Nevada State Protocol Agreement for Implementing the National Historic Preservation Act Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory...

  18. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

  19. Sandia Energy - Sandia to Discuss Energy-Storage Test Protocols...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communication within the power system. These protocols will provide for evaluation of energy storage interoperability and functionality, providing frequency and voltage stability...

  20. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  1. Chapter 15: Commercial New Construction Protocol. The Uniform...

    Energy Savers [EERE]

    Construction Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  2. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  3. The Future of the Andrew File System

    ScienceCinema (OSTI)

    None

    2011-04-25

    The talk will discuss the ten operational capabilities that have made AFS unique in the distributed file system space and how these capabilities are being expanded upon to meet the needs of the 21st century. Derrick Brashear and Jeffrey Altman will present a technical road map of new features and technical innovations that are under development by the OpenAFS community and Your File System, Inc. funded by a U.S. Department of Energy Small Business Innovative Research grant. The talk will end with a comparison of AFS to its modern days competitors.

  4. Transportation and Energy Use Data Files

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0Proved ReservesData Files Transportation and Energy Use Data Files

  5. Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur and Roger P. Wattenhofer

    E-Print Network [OSTI]

    Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur, and availability by storing replicas of each file on multiple machines. It continuously monitors machine availability and relocates replicas as necessary to maximize the effective availability of the system. We

  6. Wireless Power Transfer

    ScienceCinema (OSTI)

    None

    2013-11-19

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  7. Wireless Power Transfer

    SciTech Connect (OSTI)

    2013-07-22

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  8. NREL: Technology Transfer - Ombuds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatial ToolkitSMARTS -BeingFuture for SolarTechnology Transfer

  9. DATA META FILE 2004 This file describes the instrumentation, field setup, and quality control procedures

    E-Print Network [OSTI]

    Minnesota, University of

    to revision. See dates above for recent updates concerning the data file and metadata. The following data) was measured in 2004. A calibration drift was discovered and the sensor was replaced for 2005. PAR can

  10. Seer: An analysis package for LHCO files

    E-Print Network [OSTI]

    Travis A. W. Martin

    2015-03-10

    Seer is a multipurpose package for performing trigger, signal determination and cuts of an arbitrary number of collider processes stored in the LHCO file format. This article details the use of Seer, including the necessary details for users to customize the code for investigating new kinematic variables.

  11. DEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS

    E-Print Network [OSTI]

    DEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS Ocean Drilling Program Texas A&M University Technical; however, republication of any portion requires the written consent of the Director, Ocean Drilling Program, Texas A&M University Research Park, 1000 Discovery Drive, College Station, Texas 77840, as well

  12. Title: Ontario Greenbelt Boundary File Data Creator /

    E-Print Network [OSTI]

    Title: Ontario Greenbelt Boundary File Data Creator / Copyright Owner: Ontario Ministry of Municipal Affairs and Housing Publisher: Ontario Ministry of Municipal Affairs and Housing Edition: N/A Versions: N/A Publication Date: N/A Coverage Date(s): N/A Updates: N/A Abstract: The Ontario Greenbelt

  13. A ClassChest for Deriving Transport Protocols W. Timothy Strayer

    E-Print Network [OSTI]

    Strayer, William Timothy

    , California strayer@ca.sandia.gov Abstract Development of new transport protocols or protocol algo rithmsA ClassChest for Deriving Transport Protocols W. Timothy Strayer Sandia National Laboratories to transport protocols, so that the focus is placed on the protocolspecific aspects. The Meta Transport

  14. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Michael Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  15. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  16. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  17. Implementing a Low Power TDMA Protocol Over 802.11

    E-Print Network [OSTI]

    and contrast our protocol to other wireless power- saving mechanisms, then discuss the design, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow

  18. FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and dis- tributed control applications. We present formal for systematic and extensive testing of Modbus devices. Keywords: SCADA Protocol, Modbus, Test-case Generation, Formal Methods 1. Introduction A distributed digital control system--sometimes called a SCADA system

  19. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single

  20. On the Design and Implementation of Secure Network Protocols

    E-Print Network [OSTI]

    Paterson, Kenny

    On the Design and Implementation of Secure Network Protocols Nadhem J. AlFardan Thesis submitted Hart, for providing all what I needed to carry out my laboratory work. Finally, thanks to everyone who kept asking me "are you done yet?". 4 #12;Abstract Network Protocols are critical to the operation

  1. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Verification of Cryptographic Protocols Implemented in Java Card Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  2. Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation

    E-Print Network [OSTI]

    Han, Qi "Chee"

    Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation Alan Marchiori, Lin It is a difficult endeavor to realistically evaluate the perfor- mance of wireless sensor network (WSN) protocols. Generic network simulators are often used, but they tend to rely on synthetic models. Because WSN

  3. Rational Protocol Design: Cryptography Against Incentive-driven Adversaries

    E-Print Network [OSTI]

    Maurer, Ueli

    in part by NSF awards #0830464, #1111599, and #1223623, the Army Research Laboratory under Cooperative Research Projects Agency through the U.S. Office of Naval Research under Contract N00014-Cryptographic Protocols, Game Theory, Se- cure Computation, Composition I. INTRODUCTION Consider a cryptographic protocol

  4. Secure Wireless Payment Protocol School of Computer Science

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Secure Wireless Payment Protocol Hong Wang School of Computer Science Carleton University 1125 Colonel By Drive, Ottawa, Canada Abstract With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols

  5. Design of a PSi header processor for the internet protocol

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01

    bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

  6. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  7. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis semination protocol. Infuse takes two input parameters: (i) the choice

  8. ''GANGS'' MAC Protocol Proposal Saad Biaz Dai Yawen

    E-Print Network [OSTI]

    consumption. This paper presents a MAC layer protocol, named ''GANGS'', as a method of saving energy in sensor is not necessarily engineered or predetermined. Because of this, sensor network protocols and algorithms must be self the most energy, followed by radios. Processor and sensor power consumption are usually less important [8

  9. Bliss: Specifying Declarative Service Protocols Munindar P. Singh

    E-Print Network [OSTI]

    Bliss: Specifying Declarative Service Protocols Munindar P. Singh North Carolina State University Raleigh, NC 27695-8206, USA singh@ncsu.edu Abstract--BSPL, the Blindingly Simple Protocol Language, dispensing with conventional control flow features such as sequencing and choice. Singh [1] previously showed

  10. Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn

    E-Print Network [OSTI]

    Lam, Simon S.

    Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn Dong-Young Lee. For a system under churn, it is impossible to maintain a correct distributed DT continually. We define of protocols maintains high accuracy for systems under churn and each system converges to 100% accuracy after

  11. Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks Masaya Yoshida ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy protocols for power-efficient data collection have been proposed [1][2]. Recently, energy harvesting has

  12. Alternative Experimental Protocol for a PBR-Like Result

    E-Print Network [OSTI]

    D. J. Miller

    2012-02-29

    Pusey, Barrett and Rudolph (PBR) have recently proven an important new theorem in the foundations of quantum mechanics. Here we propose alternative experimental protocols which lead to the PBR result for a special case and a weaker PBR-like result generally. Alternative experimental protocols support the assumption of measurement independence required for the PBR theorem.

  13. Improving the Battery Performance of Ad-Hoc Routing Protocols

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department-- In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism

  14. Transport Protocol Behavior and Energy-Saving Lefteris Mamatas

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    networks [1]. Several attempts have been made to measure the energy efficiency of transport protocols, (eTransport Protocol Behavior and Energy-Saving Potential Lefteris Mamatas Demokritos University of the transport level needs to be associated with some energy potential index which, unlike energy expenditure

  15. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  16. Design and Analysis of Communication Protocols for Quantum Repeater Networks

    E-Print Network [OSTI]

    Cody Jones; Danny Kim; Matthew T. Rakher; Paul G. Kwiat; Thaddeus D. Ladd

    2015-05-06

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

  17. Combinatorial Evolution and Forecasting of Communication Protocol ZigBee

    E-Print Network [OSTI]

    Levin, Mark Sh; Kistler, Rolf; Klapproth, Alexander

    2012-01-01

    The article addresses combinatorial evolution and forecasting of communication protocol for wireless sensor networks (ZigBee). Morphological tree structure (a version of and-or tree) is used as a hierarchical model for the protocol. Three generations of ZigBee protocol are examined. A set of protocol change operations is generated and described. The change operations are used as items for forecasting based on combinatorial problems (e.g., clustering, knapsack problem, multiple choice knapsack problem). Two kinds of preliminary forecasts for the examined communication protocol are considered: (i) direct expert (expert judgment) based forecast, (ii) computation of the forecast(s) (usage of multicriteria decision making and combinatorial optimization problems). Finally, aggregation of the obtained preliminary forecasts is considered (two aggregation strategies are used).

  18. Technology transfer 1995

    SciTech Connect (OSTI)

    Not Available

    1995-01-01

    Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

  19. General Relativistic Radiative Transfer

    E-Print Network [OSTI]

    S. Knop; P. H. Hauschildt; E. Baron

    2006-11-30

    We present a general method to calculate radiative transfer including scattering in the continuum as well as in lines in spherically symmetric systems that are influenced by the effects of general relativity (GR). We utilize a comoving wavelength ansatz that allows to resolve spectral lines throughout the atmosphere. The used numerical solution is an operator splitting (OS) technique that uses a characteristic formal solution. The bending of photon paths and the wavelength shifts due to the effects of GR are fully taken into account, as is the treatment of image generation in a curved spacetime. We describe the algorithm we use and demonstrate the effects of GR on the radiative transport of a two level atom line in a neutron star like atmosphere for various combinations of continuous and line scattering coefficients. In addition, we present grey continuum models and discuss the effects of different scattering albedos on the emergent spectra and the determination of effective temperatures and radii of neutron star atmospheres.

  20. Heat transfer probe

    DOE Patents [OSTI]

    Frank, Jeffrey I.; Rosengart, Axel J.; Kasza, Ken; Yu, Wenhua; Chien, Tai-Hsin; Franklin, Jeff

    2006-10-10

    Apparatuses, systems, methods, and computer code for, among other things, monitoring the health of samples such as the brain while providing local cooling or heating. A representative device is a heat transfer probe, which includes an inner channel, a tip, a concentric outer channel, a first temperature sensor, and a second temperature sensor. The inner channel is configured to transport working fluid from an inner inlet to an inner outlet. The tip is configured to receive at least a portion of the working fluid from the inner outlet. The concentric outer channel is configured to transport the working fluid from the inner outlet to an outer outlet. The first temperature sensor is coupled to the tip, and the second temperature sensor spaced apart from the first temperature sensor.

  1. The File Mover: An Efficient Data Transfer System for Grid Applications Cosimo Anglano, Massimo Canonico

    E-Print Network [OSTI]

    Anglano, Cosimo

    resources, seems a promising solution. In or- der to enable the achievement of satisfactory performance High Energy Physics, Climate Modeling, and Life Sciences, re- quires the processing of massive data], For these applications, the creation of Data Grids[8], that pool geographically distributed storage and computing

  2. Fast controlled unitary protocols using group or quasigroup structures

    E-Print Network [OSTI]

    Li Yu

    2013-03-12

    A nonlocal bipartite unitary gate can sometimes be implemented using prior entanglement and only one round of classical communication in which the two parties send messages to each other simultaneously. This cuts the classical communication time by a half compared to the usual protocols, which require back-and-forth classical communication. We introduce such a "fast" protocol that can implement a class of controlled unitaries exactly, where the controlled operators form a subset of a projective representation of a finite group, which may be Abelian or non-Abelian. The entanglement cost is only related to the size of the group and is independent of the dimension of the systems. We also introduce a second fast protocol that can implement any given controlled unitary approximately. This protocol uses the algebraic structure of right quasigroups, which are generalizations of quasigroups, the latter being equivalent to Latin squares. This second protocol could optionally use shared classical randomness as a resource, in addition to using entanglement. When compared with other known fast unitary protocols, the entanglement cost of this second protocol is lower for general controlled unitaries except for some rare cases.

  3. on technology transfer, industry research +

    E-Print Network [OSTI]

    Cafarella, Michael J.

    on technology transfer, industry research + economic development annual report U N I V E R S I T Y and resources available at the University of Michigan as showcased in this year's Annual Report on Technology Transfer, Industry Research, and Economic Development. At the heart of the University's contributions

  4. 4065 (RP-664) Heat Transfer

    E-Print Network [OSTI]

    of roomsurface-to-air heat transmission is dependentonan accurateestimateof the filmcoefficient. Forty- eight4065 (RP-664) Convective Energy and Heat Transfer Thermal Load in Building Calculations Daniel E convection film coefficients significantly underpredict the rate of surface convective heat 'transfer

  5. Uploading Files to Your University Writing Portfolio: ENGL 1100 & Note: If your file is over 250mb, please see the section in troubleshooting about uploading files

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    a saved document from your computer into your University Writing Portfolio. 8. Select the document you forgot to save your document with the course prefix and course number. BE SURE to save or change finished, click "save file(s)." Always SAVE after uploading new content! *Tip: You may upload and rename

  6. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

  7. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-08-05

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  8. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  9. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  10. File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air...

    Open Energy Info (EERE)

    Up Search File Edit History File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements.pdf Jump to: navigation, search File...

  11. Urban Sewage Delivery Heat Transfer System (2): Heat Transfer

    E-Print Network [OSTI]

    Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

    2006-01-01

    analysis of above flow resistance and energy cost, we know that the economy flux ratio of transfer heat-transfer means is between 0.54 and 0.85, namely sewage flux is smaller, and minC Cr min wwCVc?= . It is necessary to point out that though depending... efficiency of contranatant two pass thimble: ()213 1 11 21wwNn wz tt Cr tt 1n? ?? ?==?+ ? (1) Fig.1 Reverse-flow heat efficiency of TDHTS Contranatant single pass heat-transfer efficiency: ( ) ()1 1exp (1 ) 1exp (1)n Cr NTU Cr? = ?? ? ? Put...

  12. EPA -- Amended Environmental Impact Statement Filing System Guidance...

    Office of Environmental Management (EM)

    1506.10 of the Council on Environmental Quality's Regulations Implementing the National Environmental Policy Act The purpose of the EPA Filing System Guidelines is to provide...

  13. Building Life Cycle Cost Programs File Saving Troubleshooting...

    Energy Savers [EERE]

    Cycle Cost Programs File Saving Troubleshooting Some users have experienced difficulties saving BLCC projects. The primary issue causing the issue is that the user is not an...

  14. Public Financial Disclosure Reports Filed by the Secretary and...

    Office of Environmental Management (EM)

    Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public...

  15. Motion for Leave to File Consolidated Answer and Consolidated...

    Broader source: Energy.gov (indexed) [DOE]

    of Robert G. Burnley, Director ofthe Commonwealth of Virginia Department of Environmental Quality, filed in Federal Energy Regulatory Commission ("FERC") Docket No. ELOS-14S. The...

  16. FERC Hydroelectric Project Handbook for Filings other than Licenses...

    Open Energy Info (EERE)

    FERC Hydroelectric Project Handbook for Filings other than Licenses and Exemptions Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance...

  17. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFileFile

  18. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  19. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  20. Delayed response protocols for high-delay wireless networks

    E-Print Network [OSTI]

    Sadry, Nauzad Erach

    2002-01-01

    Wireless networks have become more prevalent over the last few years. These networks introduce different types of errors, which are due to the unpredictable nature of the wireless channel. The congestion control algorithms of existing TCP protocols...

  1. Rapid designs for cache coherence protocol engines in Bluespec

    E-Print Network [OSTI]

    Ng, Man Cheuk, 1980-

    2005-01-01

    In this thesis, we present the framework for Rapid Protocol Engine Development (RaPED). We implemented the framework in Bluespec, which is a high level hardware language based on Term Rewriting Systems (TRSs). The framework ...

  2. A Secure Routing Protocol for Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Klappenecker, Andreas

    't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification Tunneling Two

  3. LDP : location discovery protocol for data center networks

    E-Print Network [OSTI]

    Pamboris, Andreas

    2009-01-01

    3.1 Data center network topology . . . . . . . 3.2 De?ningA Scalable, Commodity Data Center Network Architecture. InDiscovery Protocol for Data Center Networks A thesis

  4. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  5. A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures

    E-Print Network [OSTI]

    Acacio, Manuel

    A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures Ricardo Fern Murcia SPAIN {r.fernandez,jmgarcia,meacacio}@ditec.um.es Jose Duato Dpto. Informatica de Sistemas y

  6. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect (OSTI)

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  7. 2002/11/12 Roberto Innocente 1 Transport protocols

    E-Print Network [OSTI]

    Innocente, Roberto

    that that the receiver is flooded by the sender TCP as many other protocols uses a sliding window mechanism in every congestion control It had an importance similar to that the Watt's Flyball regulator had for the steam

  8. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  9. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  10. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  11. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Hanson, Steven CJ

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  12. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Hanson, Steven CJ

    2013-03-07

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  13. Vrije Universiteit Brussel Technology Transfer Interface

    E-Print Network [OSTI]

    Goelzer, Heiko

    Vrije Universiteit Brussel Technology Transfer Interface -connecting science and society- [for Prof. Hugo Thienpont More Information Technology Transfer Interface (TTI) Vrije Universiteit Brussel.interface@vub.ac.be - www.vubtechtransfer.be Vrije Universiteit Brussel Technology Transfer Interface -connecting science

  14. Mechanical resonators for storage and transfer of electrical and optical quantum states

    E-Print Network [OSTI]

    S. A. McGee; D. Meiser; C. A. Regal; K. W. Lehnert; M. J. Holland

    2013-05-29

    We study an optomechanical system in which a microwave field and an optical field are coupled to a common mechanical resonator. We explore methods that use these mechanical resonators to store quantum mechanical states and to transduce states between the electromagnetic resonators from the perspective of the effect of mechanical decoherence. Besides being of fundamental interest, this coherent quantum state transfer could have important practical implications in the field of quantum information science, as it potentially allows one to overcome intrinsic limitations of both microwave and optical platforms. We discuss several state transfer protocols and study their transfer fidelity using a fully quantum mechanical model that utilizes quantum state-diffusion techniques. This work demonstrates that mechanical decoherence should not be an insurmountable obstacle in realizing high fidelity storage and transduction.

  15. Technology Transfer Overview | Department of Energy

    Office of Environmental Management (EM)

    Technology Transfer Overview Technology Transfer Overview Through strategic investments in science and technology, the U.S. Department of Energy (DOE) helps power and secure...

  16. MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER

    E-Print Network [OSTI]

    Lahey, Richard T.

    MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER "ENGINEERING APPLICATIONS OF FRACTAL and multiphase flow & heat transfer will be stressed. This paper will begin by reviewing some important concepts

  17. Preparing for Transfer Biological Engineering

    E-Print Network [OSTI]

    Walter, M.Todd

    Preparing for Transfer Majors: Biological Engineering Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering Information Science, Systems, & Technology Materials Science & Engineering Mechanical Engineering Operations

  18. Preparing for Transfer Biological Engineering

    E-Print Network [OSTI]

    Walter, M.Todd

    Preparing for Transfer Majors: Biological Engineering Biomedical Engineering* Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering Information Science, Systems, & Technology Materials Science & Engineering Mechanical Engineering

  19. Knowledge Capture and Transfer Program

    Broader source: Energy.gov [DOE]

    The Office of Learning and Workforce Development is working with Heads of Departmental Elements, DOE senior leaders and subject-matter-experts to capture and transfer the knowledge and experiences...

  20. Electrohydrodynamically enhanced condensation heat transfer

    E-Print Network [OSTI]

    Wawzyniak, Markus

    1993-01-01

    In a condenser the thickness of the liquid condensate film covering the cooled surface constitutes a resistance to the heat transfer. By establishing a non uniform electric field in the vicinity of the condensation surface the extraction of liquid...

  1. Wireless transfer of electric power

    E-Print Network [OSTI]

    Moffatt, Robert Alexander

    2009-01-01

    In this dissertation, I describe the design and construction of a system which can transfer electric power wirelessly. This is accomplished using inductive, near-field, non-radiative coupling between self-resonant copper ...

  2. O C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol

    E-Print Network [OSTI]

    Segall, Adrian

    , j}.At the end, the east table of node a is {b, c, d, e, j}. a i f ec g h db j 100 200 300 400 500 with updated information. f c g h a b d 100 200 300 400 500 600 100 200 300 400 h? source access target h? h! hO C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol For Wireless Ad Hoc

  3. Automatic computation of transfer functions

    DOE Patents [OSTI]

    Atcitty, Stanley; Watson, Luke Dale

    2015-04-14

    Technologies pertaining to the automatic computation of transfer functions for a physical system are described herein. The physical system is one of an electrical system, a mechanical system, an electromechanical system, an electrochemical system, or an electromagnetic system. A netlist in the form of a matrix comprises data that is indicative of elements in the physical system, values for the elements in the physical system, and structure of the physical system. Transfer functions for the physical system are computed based upon the netlist.

  4. Spring 2014 Heat Transfer -2

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 Heat Transfer - 2 A thin electronic chip is in the shape of a square wafer, b = 1 cm surface of the chip with a heat transfer coefficient of h = 100 W/m2 -K. Assume the chip has a uniform per side with a mass of m = 0.3 grams and specific heat of C = 103 J/kg-K. The chip is mounted

  5. A FAST MENTAL POKER PROTOCOL TZER-JEN WEI AND LIH-CHUNG WANG

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a fast and secure mental poker protocol. It is twice as fast as similar protocols, namely Barnett, 27, 28, 29], see [7] for a survey). Barnett-Smart's protocol is proposed in 2003 ([3]). It canGamal-based version. Castell-Roca's protocol is proposed in 2004 ([7]). It is similar to Barnett-Smart, but faster

  6. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  7. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  8. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  9. Storing files in a parallel computing system based on user-specified parser function

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Manzanares, Adam; Torres, Aaron

    2014-10-21

    Techniques are provided for storing files in a parallel computing system based on a user-specified parser function. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a parser from the distributed application for processing the plurality of files prior to storage; and storing one or more of the plurality of files in one or more storage nodes of the parallel computing system based on the processing by the parser. The plurality of files comprise one or more of a plurality of complete files and a plurality of sub-files. The parser can optionally store only those files that satisfy one or more semantic requirements of the parser. The parser can also extract metadata from one or more of the files and the extracted metadata can be stored with one or more of the plurality of files and used for searching for files.

  10. Western Blot Protocol-de Lange Lab Western Blot Protocol (updated on 05/20/14)

    E-Print Network [OSTI]

    de Lange, Titia

    :10 with MillliQ water. Adjust pH to 8.3 (should be close) 10x Transfer Buffer Stock (1L) 30.3 g Tris Base 144 g) BioMax XAR Film (KODAK) Laemmli Sample Buffer Cell Extracts Cells can be directly lysed into 2x Laemmli Sample buffer (v.1 or v.2) as follows (not for ubiquitination): 1. Harvest cells by trypsinization

  11. TIGER:Thermal-Aware File Assignment in Storage Clusters

    E-Print Network [OSTI]

    Qin, Xiao

    TIGER:Thermal-Aware File Assignment in Storage Clusters Ajit Chavan, Xunfei Jiang, Mohemmad I/O performance. I. INTRODUCTION Thermal management for power-dense storage clusters can address cooling problems. The following three factors make thermal-aware file assign- ment desirabe and practical for storage clusters

  12. Energy Efficient Prefetching with Buffer Disks for Cluster File Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

  13. Replication in the Harp File System Barbara Liskov

    E-Print Network [OSTI]

    Liskov, Barbara

    many failures the file server with a small uninterruptible power supply (UPS) that is intended) after provide a strong semantics for file operations: each opera a power failure; the server uses, monitored by the Office of Naval Research under volatile memory at several nodes. It survives a power

  14. Access Your Files | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposalsAboutAcceleratingthYour Files Access

  15. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit the followingConcentratingPortalCool MagneticCopper Palladium-Core File

  16. TO: FILE MEHClRANDUM ALTERNATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM:

  17. Form:MapFile | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport JumpFlowood,PevafersaMapFile Jump to: navigation, search

  18. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB Packet HanfordDOEDanielDeSmall Business ForumDesignerFile System

  19. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji Is JustFile

  20. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji Is JustFile

  1. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO File storage

  2. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO File

  3. Parallel File Systems at HPC Centers: Usage,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| Department ofStephen PSeptember|March Study Could Lead toFile

  4. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam: Energyarea, California | OpenHeliotronicsManaging files Jump

  5. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County,Camilla, Georgia:Geothermal Regulatory RoadmapISGANLEDSMap Files Jump

  6. Help:Uploading Files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTLTechnology Srl JumpSubObjects JumpUploading Files

  7. FY 16-17 ASC Utility Filings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013 FY6-17-ASC-Utility-Filings

  8. Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0

    SciTech Connect (OSTI)

    Stoller-Navarro Joint Venture

    2004-06-24

    This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

  9. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  10. Nanoscale heat transfer - from computation to experiment

    E-Print Network [OSTI]

    Luo, Tengfei

    2013-04-09

    Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

  11. Protocol: Rat Cardiac CINE with Tagging, Page 1 of 4 Author: rgb 3/16/2012 Protocol: Rat Cardiac CINE with Tagging

    E-Print Network [OSTI]

    California at San Diego, University of

    the heart at isocenter. Water Phantom Place a 15 mL tube containing water and sealed with a screw top.5 mm 5cmx5cm 15 min Protocol Steps 1. Set up the physio equipment. Follow the instructions below. See the "Positioning" section below. 4. Protocol directory. The protocols can be loaded from

  12. New York City Paid Time Off and Sick Leave Protocol The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This

    E-Print Network [OSTI]

    New York City Paid Time Off and Sick Leave Protocol 1. Scope The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This protocol applies only to employees of Carnegie Mellon University who work at least eighty (80) hours per calendar year within the City of New York, NY

  13. CANISTER TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-23

    The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

  14. Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer

    SciTech Connect (OSTI)

    David Hamilton

    2004-12-31

    The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

  15. A Five-Year Study of File-System Metadata Nitin Agrawal

    E-Print Network [OSTI]

    Swift, Michael

    in file size, file age, file-type frequency, directory size, namespace structure, file-system population that explains the namespace structure and the distribution of directory sizes. We find significant temporal by mass-emailing a scanning pro- gram to Microsoft's employees, and we had a 22% par- ticipation rate

  16. A FiveYear Study of FileSystem Metadata Nitin Agrawal

    E-Print Network [OSTI]

    Swift, Michael

    in file size, file age, filetype frequency, directory size, namespace structure, filesystem population that explains the namespace structure and the distribution of directory sizes. We find significant temporal by massemailing a scanning pro gram to Microsoft's employees, and we had a 22% par ticipation rate

  17. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  18. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  19. A complete Randomized Benchmarking Protocol accounting for Leakage Errors

    E-Print Network [OSTI]

    T. Chasseur; F. K. Wilhelm

    2015-07-09

    Randomized Benchmarking allows to efficiently and scalably characterize the average error of an unitary 2-design such as the Clifford group $\\mathcal{C}$ on a physical candidate for quantum computation, as long as there are no non-computational leakage levels in the system. We investigate the effect of leakage errors on Randomized Benchmarking induced from an additional level per physical qubit and provide a modified protocol that allows to derive reliable estimates for the error per gate in their presence. We assess the variance of the sequence fidelity corresponding to the number of random sequences needed for valid fidelity estimation. Our protocol allows for gate dependent error channels without being restricted to perturbations. We show that our protocol is compatible with Interleaved Randomized Benchmarking and expand to benchmarking of arbitrary gates. This setting is relevant for superconducting transmon qubits, among other systems.

  20. Local quantum protocols for separable measurements with many parties

    E-Print Network [OSTI]

    Scott M. Cohen

    2013-03-20

    In a recent paper \\cite{mySEPvsLOCC}, we showed how to construct a quantum protocol for implementing a bipartite, separable quantum measurement using only local operations on subsystems and classical communication between parties (LOCC) within any fixed number of rounds of communication, whenever such a protocol exists. Here, we generalize that construction to one that applies for any number of parties. One important observation is that the construction automatically determines the ordering of the parties' measurements, overcoming a significant apparent difficulty in designing protocols for more than two parties. We also present various other results about LOCC, including showing that if, in any given measurement operator of the separable measurement under consideration, the local parts for two different parties are rank-1 operators that are not repeated in any other measurement operator of the measurement, then this separable measurement cannot be exactly implemented by LOCC in any finite number of rounds.

  1. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chevassut, Olivier [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-11-12

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  2. Journal of Heat Transfer1999 JHT Heat Transfer Gallery Department of Mechanical 8. Aerospace Engineering

    E-Print Network [OSTI]

    Kihm, IconKenneth David

    Journal of Heat Transfer1999 JHT Heat Transfer Gallery S. M. You Department of Mechanical 8 Transfer Visualization Committee organized two photo gallery sessions in 1998. The International Heat Transfer Photo Gallery was held at the l la' International Heat Transfer Conference (IHTC) in Kyongju

  3. Radiative transfer in decomposed domains

    E-Print Network [OSTI]

    T. Heinemann; W. Dobler; A. Nordlund; A. Brandenburg

    2005-11-09

    An efficient algorithm for calculating radiative transfer on massively parallel computers using domain decomposition is presented. The integral formulation of the transfer equation is used to divide the problem into a local but compute-intensive part for calculating the intensity and optical depth integrals, and a nonlocal part for communicating the intensity between adjacent processors. The waiting time of idle processors during the nonlocal communication part does not have a severe impact on the scaling. The wall clock time thus scales nearly linearly with the inverse number of processors.

  4. Fast protocols for local implementation of bipartite nonlocal unitaries

    E-Print Network [OSTI]

    Li Yu; Robert B. Griffiths; Scott M. Cohen

    2012-01-06

    In certain cases the communication time required to deterministically implement a nonlocal bipartite unitary using prior entanglement and LOCC (local operations and classical communication) can be reduced by a factor of two. We introduce two such "fast" protocols and illustrate them with various examples. For some simple unitaries, the entanglement resource is used quite efficiently. The problem of exactly which unitaries can be implemented by these two protocols remains unsolved, though there is some evidence that the set of implementable unitaries may expand at the cost of using more entanglement.

  5. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  6. Microsoft Word - 2015 Attachment P Filing Letter.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    its Oversupply Management Protocol (OMP) satisfies the comparability and undue discrimination standards of section 211A of the Federal Power Act. 1 Bonneville is making this...

  7. Comparison of leading parallel NAS file systems on commodity hardware

    SciTech Connect (OSTI)

    Hedges, R; Fitzgerald, K; Gary, M; Stearman, D M

    2010-11-08

    High performance computing has experienced tremendous gains in system performance over the past 20 years. Unfortunately other system capabilities, such as file I/O, have not grown commensurately. In this activity, we present the results of our tests of two leading file systems (GPFS and Lustre) on the same physical hardware. This hardware is the standard commodity storage solution in use at LLNL and, while much smaller in size, is intended to enable us to learn about differences between the two systems in terms of performance, ease of use and resilience. This work represents the first hardware consistent study of the two leading file systems that the authors are aware of.

  8. File:03IDGTermEasement.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale,3IDGTermEasement.pdf Jump to: navigation, search File File history File usage Metadata

  9. File:04TXAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File usage

  10. File:04UTAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File

  11. File:05AKADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File-FD-a -5-FD-b

  12. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFile Edit

  13. File:01LandUseOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFile

  14. RandFile package for Mathematica for accessing file-based sources of randomness

    E-Print Network [OSTI]

    J. A. Miszczak; M. Wahl

    2015-03-15

    We present a package for Mathematica computer algebra system which allows the exploitation of local files as sources of random data. We provide the description of the package and illustrate its usage by showing some examples. We also compare the provided functionality with alternative sources of randomness, namely a built-in pseudo-random generator and the package for accessing hardware true random number generators.

  15. Saving Your Data (Data Transfer) Transfer Raw Data to Another Computer

    E-Print Network [OSTI]

    California at San Diego, University of

    Saving Your Data (Data Transfer) Transfer Raw Data to Another Computer 1. Open a terminal 2 the Data Manager window 2. Right click the scan you want to save or the whole study and select "Transfer

  16. Transfer Factors for Contaminant Uptake

    E-Print Network [OSTI]

    of supply, upon written request as follows: Address: U.S. Nuclear Regulatory Commission OfficeTransfer Factors for Contaminant Uptake by Fruit and Nut Trees Office of Nuclear Regulatory; licensee event reports; and Commission papers and their attachments. NRC publications in the NUREG series

  17. Spring 2014 Heat Transfer -1

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 1 Heat Transfer - 1 Consider a cylindrical nuclear fuel rod of length L and diameter df and the tube at a rate m , and the outer surface of the tube is well insulated. Heat generation occurs within. The specific heat of water pc , and the thermal conductivity of the fuel rod fk are constants. The system

  18. A critical look at methods for calculating charge transfer couplings fast and accurately

    E-Print Network [OSTI]

    Ramos, Pablo; Pavanello, Michele

    2015-01-01

    We present here a short and subjective review of methods for calculating charge transfer couplings. Although we mostly focus on Density Functional Theory, we discuss a small subset of semiempirical methods as well as the adiabatic-to-diabatic transformation methods typically coupled with wavefunction-based electronic structure calculations. In this work, we will present the reader with a critical assessment of the regimes that can be modeled by the various methods their strengths and weaknesses. In order to give a feeling about the practical aspects of the calculations, we also provide the reader with a practical protocol for running coupling calculations with the recently developed FDE-ET method.

  19. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  20. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  1. Development and Validation of a Simple Protocol To Rapidly

    E-Print Network [OSTI]

    pollutants in waste air biofilters. The protocol involves the determination of two pollutant concentration with low concentrations of pollutants. Biofilters work by passing humidified polluted air through a bed > aromatics > alkanes. An attempt was made to correlate the pollutant elimination with Henry's coefficient

  2. Security Analysis of an Open Car Immobilizer Protocol Stack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    --apply the principle of open evaluation. A recent example is the specification of an open security protocol stack in principle be deployed on any suitable type of transponder chip. In this paper we re-evaluate the security] and the KeeLoq algo- rithm used in remote control systems [8] demonstrate the risks of this security

  3. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  4. Simplified VO M&V Protocol Simplified Voltage Optimization (VO)

    E-Print Network [OSTI]

    modeling is mentioned, it refers to using industry accepted distribution system power flow simulation tools the verification process. Calculations of all system improvements (reduction of line losses and no-load lossesSimplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification

  5. A Practical Hybrid-ARQ Protocol Using Noncoherent Orthogonal Modulation

    E-Print Network [OSTI]

    Valenti, Matthew C.

    requests. The proposed protocol is suitable for IEEE 802.15.4/Zigbee networks using commodity off networks that follow the Bluetooth standard or sensor networks that follow the IEEE 802.15.4/Zigbee. For instance, Bluetooth uses nonorthogonal binary Gaussian fre- quency shift keying (GFSK) while Zigbee uses 16

  6. Automating the Sandia Advanced Interoperability Test Protocols Jay Johnson1

    E-Print Network [OSTI]

    systems) interoperability and electrical behavior functionality as specified by the IEC technical reportAutomating the Sandia Advanced Interoperability Test Protocols Jay Johnson1 and Bob Fox2 1 Sandia -- As the penetration of non-dispatchable renewable energy increases around the world, there is greater need to have

  7. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  8. Fast Automatic Synthesis of Security Protocols Using Backward Search

    E-Print Network [OSTI]

    Foley, Simon

    backward. ---Sir Arthur Conan Doyle (Sherlock Holmes), A Study in Scarlet, 1887. Categories and Subject]: Protocol Verifica­ tion; K.6.5 [Security and Protection]: Authentication; D.2.4 [Software­ veloped such as [5, 10, 9, 19, 17, 22]. However, little work has been carried out on systematic approaches

  9. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    Mitchell, Chris

    ] as the 2nd edition of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks] is different to the Cheng- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  10. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of ISO/IEC 11770-2. In mid 2008, Mathuria and Sriram [19] described new type attacks on both mechanism- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack' refers proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  11. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  12. Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    E-Print Network [OSTI]

    Merro, Massimo

    , temperature); they are used as embedded systems (e.g., biomedical sensor engineering, smart homes) or mobile sensor networks. A simulation theory is developed to compare probabilistic protocols that have similar are usually based on discrete-event simulators (e.g., ns-2, Opnet and Glomosim). However, different simulators

  13. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  14. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  15. Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement Organization and oversee the field testing of the draft Regional Supplement. Field testing will be done in cooperation, the District coordinator will provide team members with an introduction to the Regional Supplement

  16. Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement Organization of field the field testing of the draft Regional Supplement. Field testing will be done in cooperation with regional, the District coordinator will provide team members with an introduction to the Regional Supplement

  17. Combining algorithms for deciding knowledge in security protocols #

    E-Print Network [OSTI]

    Doyen, Laurent

    protocols requires a precise un­ derstanding of the attacker knowledge. Two standard notions are usu­ ally ?? E and the ACI Jeunes Chercheurs JC9005. #12; completely unrealistic to require that the Boolean true and some standard bisimulation conditions. Both of these relations rel

  18. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABANorder cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  19. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  20. Communication-Efficient Private Protocols for Longest Common Subsequence

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark, gondree, mohassel}@cs.ucdavis.edu Abstract. We design communication efficient two-party and multi Russians" algorithmic de- sign. This result is the first improvement to the communication complex- ity

  1. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    E-Print Network [OSTI]

    Barrash, Warren

    An interactive Bayesian geostatistical inverse protocol for hydraulic tomography Michael N. Fienen April 2008; published 25 July 2008. [1] Hydraulic tomography is a powerful technique for characterizing, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose

  2. Completely positive classical structures and sequentializable quantum protocols

    E-Print Network [OSTI]

    Chris Heunen; Sergio Boixo

    2012-10-02

    We study classical structures in various categories of completely positive morphisms: on sets and relations, on cobordisms, on a free dagger compact category, and on Hilbert spaces. As an application, we prove that quantum maps with commuting Kraus operators can be sequentialized. Hence such protocols are precisely as robust under general dephasing noise when entangled as when sequential.

  3. Parallel and Concurrent Security of the HB and HB + Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ## Abstract Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB + protocol is proven secure against active computationallyintensive to be utilized. With this motivation in mind, Juels and Weis [20] --- building upon work

  4. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  5. Publickey cryptography and password protocols Shai Halevi \\Lambda

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this scenario, and show that the security of these protocols can be formally proven based on standard in situations where the client's machine does not have the means to validate the server's public key. Public devices. \\Lambda IBM T.J.Watson Research Center, PO Box 704, Yorktown Heights, New York 10598, USA Email

  6. The Accelerated Ring Protocol: Ordered Multicast for Modern Data Centers

    E-Print Network [OSTI]

    Amir, Yair

    performance in 1- Gig and 10-Gig networks. We also implemented the full protocol in the open-source Spread Toolkit and evaluated its performance relative to the previous version of the toolkit in a 1-Gig local area network, virtualized 1-Gig local area settings, and a 10-Gig local area network. The results

  7. Analysing the PGM Protocol with UPPAAL Batrice Brard Patricia Bouyer

    E-Print Network [OSTI]

    Doyen, Laurent

    the probability of negative acknowledgements (NAK) implosion and the load of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference, which turns out not to be always verified but to depend on the values of several parameters that we

  8. Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk1 , Stephan, or reuse of any copyrighted component of this work in other works. Abstract. Efficiency is the bottleneck adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting

  9. Abstraction and Implementation of a Lightweight Distributed Termination Protocol

    E-Print Network [OSTI]

    Dobson, Simon

    Abstraction and Implementation of a Lightweight Distributed Termination Protocol D.M. Goodeve , C, University of Leeds, UK Department of Computer Science, Trinity College Dublin, Eire Abstract Termination synchronisation on this state costly. Many parallel applica- tions are structured such that termination occurs

  10. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Design an anycast WSN for a wind turbine SHM application that is very energy efficient. meets reliability for turbine structural health monitoring Are composed of sensor nodes Are very resource constrained

  11. Scaling security in pairing-based protocols Michael Scott

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scaling security in pairing-based protocols Michael Scott School of Computing Dublin City potential advantage in smart-card and embedded applications security can be scaled up while continuing been addressed by Koblitz and Menezes [18] and Granger, Page and Smart [15]. As will be seen our

  12. EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Durresi, Arjan

    EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks Sasanka Madiraju Cariappa in an intelligent manner. We study the concept of energy fairness in routing in Sensor Networks so as to increase to route data based on the residual energy of the nodes. This algorithm divides the network into different

  13. An Energy-Aware Simulation Model and Transaction Protocol

    E-Print Network [OSTI]

    Pedram, Massoud

    functioning in a real world environment ! We study the effects of redistributing energy on the two network ! Communication energy: power consumption for SR transmission and reception ! Data transmission energy1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution

  14. TCP over Wireless Multi-hop Protocols: Simulation and Experiments

    E-Print Network [OSTI]

    Wang, Lan

    TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive http://www.cs.ucla.edu/NRL/wireless Abstract In this study we investigate the interaction between TCP

  15. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  16. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  17. Packet Drop Avoidance for High-speed network transmission protocol

    SciTech Connect (OSTI)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  18. BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects

    E-Print Network [OSTI]

    BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects Title: Principal) Study subjects: A total of _____ subjects were enrolled since the last report to the IRB. Since initial study approval on _____________ a total of _____ subjects have been enrolled in this study and ____ have

  19. ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ungerer, Theo

    of California, Irvine, USA, Phone: (949) 824-8720, email: nader@uci.edu mode. The energy cost rises enormouslyESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer and Nader Bagherzadeh Abstract--Most wireless sensor networks rely on battery energy. In applications

  20. Interactions Among Ionospheric Propagation, HF Modems, and Data Protocols

    E-Print Network [OSTI]

    Johnson, Eric E.

    Mexico State University Abstract The well-known challenges in using the ionospheric skywave channel to Internet-style network- and ap- plication-layer protocols, which have been designed with reliable, high that will form the basis of reliable Internet operation via next-generation HF radio networks. Introduction

  1. ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson

    E-Print Network [OSTI]

    Johnson, Eric E.

    ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson New Mexico State University ABSTRACT The explosion of interest in using Internet-style applica- tions over wireless links prompts investigation links with Internet-style workloads. The investigation is focused on high-frequency radio links

  2. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    A Review of Embedded Automotive Protocols Nicolas Navet 1 , Franoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

  3. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  4. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  5. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  6. C++11 header files appear missing on Edison

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aborted for test.cxx (code 4) edison03: > This is because the installed Intel compilers rely upon the GNU header files for C++11 support, while the default SLES version of...

  7. A Multilevel File System for High Assurancey Cynthia E. Irvine

    E-Print Network [OSTI]

    A Multilevel File System for High Assurancey Cynthia E. Irvine Computer Science Department Naval to provide an interface which is both \\friendly" and exible, and relies entirely upon the high assur- ance

  8. "Annual Electric Power Industry Report (EIA-861 data file)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    In 2013, demand-side management data started being collected as energy efficiency and demand response data. Retail Sales, Customer Sited is a new file; this data was previously...

  9. The Umbrella File System: Storage Management Across Heterogeneous Devices

    E-Print Network [OSTI]

    Garrison, John Allen

    2011-08-08

    With the advent of Flash based solid state devices (SSDs), the differences in physical devices used to store data in computers are becoming more and more pronounced. Effectively mapping the differences in storage devices to the files...

  10. Annual Electric Generator data - EIA-860 data file

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    in the file are wholly-owned by their operator). 61EnviroAssocYyyyy Contains boiler association data for the environmental equipment data collected on the Form EIA-860....

  11. ASSEMBLY TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-26

    The Assembly Transfer System (ATS) receives, cools, and opens rail and truck transportation casks from the Carrier/Cask Handling System (CCHS). The system unloads transportation casks consisting of bare Spent Nuclear Fuel (SNF) assemblies, single element canisters, and Dual Purpose Canisters (DPCs). For casks containing DPCs, the system opens the DPCs and unloads the SNF. The system stages the assemblies, transfer assemblies to and from fuel-blending inventory pools, loads them into Disposal Containers (DCs), temporarily seals and inerts the DC, decontaminates the DC and transfers it to the Disposal Container Handling System. The system also prepares empty casks and DPCs for off-site shipment. Two identical Assembly Transfer System lines are provided in the Waste Handling Building (WHB). Each line operates independently to handle the waste transfer throughput and to support maintenance operations. Each system line primarily consists of wet and dry handling areas. The wet handling area includes a cask transport system, cask and DPC preparation system, and a wet assembly handling system. The basket transport system forms the transition between the wet and dry handling areas. The dry handling area includes the dry assembly handling system, assembly drying system, DC preparation system, and DC transport system. Both the wet and dry handling areas are controlled by the control and tracking system. The system operating sequence begins with moving transportation casks to the cask preparation area. The cask preparation operations consist of cask cavity gas sampling, cask venting, cask cool-down, outer lid removal, and inner shield plug lifting fixture attachment. Casks containing bare SNF (no DPC) are filled with water and placed in the cask unloading pool. The inner shield plugs are removed underwater. For casks containing a DPC, the cask lid(s) is removed, and the DPC is penetrated, sampled, vented, and cooled. A DPC lifting fixture is attached and the cask is placed into the cask unloading pool. In the cask unloading pool the DPC is removed from the cask and placed in an overpack and the DPC lid is severed and removed. Assemblies are removed from either an open cask or DPC and loaded into assembly baskets positioned in the basket staging rack in the assembly unloading pool. A method called ''blending'' is utilized to load DCs with a heat output of less than 11.8 kW. This involves combining hotter and cooler assemblies from different baskets. Blending requires storing some of the hotter fuel assemblies in fuel-blending inventory pools until cooler assemblies are available. The assembly baskets are then transferred from the basket staging rack to the assembly handling cell and loaded into the assembly drying vessels. After drying, the assemblies are removed from the assembly drying vessels and loaded into a DC positioned below the DC load port. After installation of a DC inner lid and temporary sealing device, the DC is transferred to the DC decontamination cell where the top area of the DC, the DC lifting collar, and the DC inner lid and temporary sealing device are decontaminated, and the DC is evacuated and backfilled with inert gas to prevent prolonged clad exposure to air. The DC is then transferred to the Disposal Container Handling System for lid welding. In another cask preparation and decontamination area, lids are replaced on the empty transportation casks and DPC overpacks, the casks and DPC overpacks are decontaminated, inspected, and transferred to the Carrier/Cask Handling System for shipment off-site. All system equipment is designed to facilitate manual or remote operation, decontamination, and maintenance. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks and DPCs. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal WHB support systems.

  12. ReadMe file: A user's guide for the vitality model parameter fitting routine and the S-Plus functions contained in file VitalityModelFitting.ssc.

    E-Print Network [OSTI]

    Washington at Seattle, University of

    ReadMe file: A user's guide for the vitality model parameter fitting routine and the S-Plus functions contained in file VitalityModelFitting.ssc. The VitalityModelFitting.ssc file contains all functions necessary to run the MLE parameter fitting routine for the vitality-based survival model

  13. File:03MTCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale,3IDGTermEasement.pdf Jump to: navigation, search File File

  14. File:05DrillingPermittingOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File

  15. File:Archaeological Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File history

  16. File:Archaeology excavation permit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File

  17. Chemistry Transfer Evaluations Before requesting a transfer evaluation, please look up your courses on the UO Transfer Credit

    E-Print Network [OSTI]

    Cina, Jeff

    Chemistry Transfer Evaluations Before requesting a transfer evaluation, please look up your courses://registrar.uoregon.edu/current_students/transfer-articulation If your Chemistry courses have not been evaluated, or if you feel the evaluation is not correct, then fill out this form and bring it and the associated documents to a Chemistry advisor. Name

  18. Dynamic collision reduction protocol for ultra-wide bandwidth multiple access networks

    E-Print Network [OSTI]

    Tomezak, Gregory John, 1980-

    2004-01-01

    In this thesis, we provide a cross-layer analysis of the throughput of the dynamic collision reduction (DCR) protocol, a multiple access protocol that requires frame synchronization. At the physical-layer, we develop the ...

  19. On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

  20. Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair NXP Semiconductors, Leuven, Belgium, ventzislav.nikov@nxp.com, marc.vauclair@nxp.com Abstract. Distance-bounding protocols

  1. A Backup Route Aware Routing Protocol Fast Recovery from Transient Routing Failures

    E-Print Network [OSTI]

    Gao, Lixin

    in experimental studies [14], [15]. Border Gateway Protocol (BGP), a path vector protocol for interdomain routing al [4] propose a solution using pre-established protection tunnels to reroute traffic during failures

  2. Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D

    2003-01-01

    Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc

  3. Benthic Community Assessment Rapid Bioassessment Protocol: Benthic Macroinvertebrates (EPA 1989, 1999) .........................665

    E-Print Network [OSTI]

    Pitt, Robert E.

    Macroinvertebrates (EPA 1989, 1999) .........................665 Sample Collection ......................................................................................................................................690 RAPID BIOASSESSMENT PROTOCOL: BENTHIC MACROINVERTEBRATES (EPA 1989, 1999) As with the habitat is presented below. However, the Rapid Bioassessment Protocols (RBP) outlined by the U.S. EPA (EPA 1989, 1999

  4. The influence of purification protocol and pH on tomato spotted wilt virions

    E-Print Network [OSTI]

    Shimek, Christina Marie

    1993-01-01

    particles within the final pellet, an immunosorbent electron microscopy (ISEM) assay was performed on the purified virons obtained from each of the protocols. When the pH level was varied using protocol B, the purified virions were observed without...

  5. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...

  6. Federating LHCb datasets using the DIRAC File catalog

    E-Print Network [OSTI]

    Haen, Christophe; Frank, Markus; Tsaregorodtsev, Andrei

    2015-01-01

    In the distributed computing model of LHCb the File Catalog (FC) is a central component that keeps track of each file and replica stored on the Grid. It is federating the LHCb data files in a logical namespace used by all LHCb applications. As a replica catalog, it is used for brokering jobs to sites where their input data is meant to be present, but also by jobs for finding alternative replicas if necessary. The LCG File Catalog (LFC) used originally by LHCb and other experiments is now being retired and needs to be replaced. The DIRAC File Catalog (DFC) was developed within the framework of the DIRAC Project and presented during CHEP 2012. From the technical point of view, the code powering the DFC follows an Aspect oriented programming (AOP): each type of entity that is manipulated by the DFC (Users, Files, Replicas, etc) is treated as a separate 'concern' in the AOP terminology. Hence, the database schema can also be adapted to the needs of a Virtual Organization. LHCb opted for a highly tuned MySQL datab...

  7. Design and Implementation of Ceph: A Scalable Distributed File System

    SciTech Connect (OSTI)

    Weil, S A; Brandt, S A; Miller, E L; Long, D E; Maltzahn, C

    2006-04-19

    File system designers continue to look to new architectures to improve scalability. Object-based storage diverges from server-based (e.g. NFS) and SAN-based storage systems by coupling processors and memory with disk drives, delegating low-level allocation to object storage devices (OSDs) and decoupling I/O (read/write) from metadata (file open/close) operations. Even recent object-based systems inherit decades-old architectural choices going back to early UNIX file systems, however, limiting their ability to effectively scale to hundreds of petabytes. We present Ceph, a distributed file system that provides excellent performance and reliability with unprecedented scalability. Ceph maximizes the separation between data and metadata management by replacing allocation tables with a pseudo-random data distribution function (CRUSH) designed for heterogeneous and dynamic clusters of unreliable OSDs. We leverage OSD intelligence to distribute data replication, failure detection and recovery with semi-autonomous OSDs running a specialized local object storage file system (EBOFS). Finally, Ceph is built around a dynamic distributed metadata management cluster that provides extremely efficient metadata management that seamlessly adapts to a wide range of general purpose and scientific computing file system workloads. We present performance measurements under a variety of workloads that show superior I/O performance and scalable metadata management (more than a quarter million metadata ops/sec).

  8. WeatherMaker: Weather file conversion and evaluation

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1999-07-01

    WeatherMaker is a weather-data utility for use with the ENERGY-10 design-tool computer program. The three main features are: Convert--Weather files can be converted from one format to another. For example, a TMY2 format file can be converted to an ENERGY-10 binary file that can be used in a simulation. This binary file can then be converted to a text format that allows it to be read and/or manipulated in WordPad or Excel. Evaluate--ENERGY-10 weather files can be studied in great detail. There are 8 graphical displays of the data that provide insight into the data, and a summary tables that presents results calculated from the hourly data. Adjust--Hourly temperature data can be adjusted starting with hourly data from a nearby TMY2 site. Dry-bulb and wet-bulb temperatures are adjusted up or down as required to match given monthly statistics. This feature can be used to generate weather files for any of 3,958 sites in the US where such monthly statistics are tabulated. The paper shows a variety of results, explains the methods used, and discusses the rationale for making the adjustments. It is anticipated that WeatherMaker will be released by the time of the ASES Solar 99 conference.

  9. Direct transfer of graphene onto flexible substrates

    E-Print Network [OSTI]

    Araujo, Paulo Antonio Trinidade

    In this paper we explore the direct transfer via lamination of chemical vapor deposition graphene onto different flexible substrates. The transfer method investigated here is fast, simple, and does not require an intermediate ...

  10. NERSC HPSS Bandwidth and Transfer Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Aggregate Transfer Bandwidth This graph shows the aggregate transfer rate to the storage systems as a function of time of day. The red line is the peak bandwidth observed within...

  11. Engineering nanocarbon interfaces for electron transfer

    E-Print Network [OSTI]

    Hilmer, Andrew J. (Andrew Joseph)

    2013-01-01

    Electron-transfer reactions at nanometer-scale interfaces, such as those presented by single-walled carbon nanotubes (SWCNTs), are important for emerging optoelectronic and photovoltaic technologies. Electron transfer also ...

  12. Power transfer through strongly coupled resonances

    E-Print Network [OSTI]

    Kurs, Andr

    2007-01-01

    Using self-resonant coils in a strongly coupled regime, we experimentally demonstrate efficient non-radiative power transfer over distances of up to eight times the radius of the coils. We use this system to transfer 60W ...

  13. Robust state transfer with high fidelity in spin-1/2 chains by Lyapunov control

    E-Print Network [OSTI]

    Z. C. Shi; X. L. Zhao; X. X. Yi

    2015-05-19

    Based on the Lyapunov control, we present a scheme to realize state transfer with high fidelity by only modulating the boundary spins in a quantum spin-1/2 chain. Recall that the conventional transmission protocols aim at nonstationary state (or information) transfer from the first spin to the end spin at a fixed time. The present scheme possesses the following advantages. First, the scheme does not require precise manipulations of the control time. Second, it is robust against uncertainties in the initial states and fluctuations in the control fields. Third, the controls are exerted only on the boundary sites of the chain. It works for variable spin-1/2 chains with different periodic structures and has good scalability. The feasibility to replace the control fields by square pules is explored, which simplifies the realization in experiments.

  14. Academic Knowledge Transfer in Social Networks

    E-Print Network [OSTI]

    Slater, Mark David

    2013-01-01

    4.3 Digital Library Requirements . . . . . . . . . . . 4.43.1.1 Digital Libraries . . . . . . . . . . . .A Prototype Personal Digital Library Knowledge Transfer

  15. Waste Feed Delivery Transfer System Analysis

    SciTech Connect (OSTI)

    JULYK, L.J.

    2000-05-05

    This document provides a documented basis for the required design pressure rating and pump pressure capacity of the Hanford Site waste-transfer system in support of the waste feed delivery to the privatization contractor for vitrification. The scope of the analysis includes the 200 East Area double-shell tank waste transfer pipeline system and the associated transfer system pumps for a11 Phase 1B and Phase 2 waste transfers from AN, AP, AW, AY, and A2 Tank Farms.

  16. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  17. A three-pass establishment protocol for real-time multiparty communication

    E-Print Network [OSTI]

    Yoon, Jaehee

    1996-01-01

    with a suite of simulation experiments which Compares the performance of our approach with that of other exisiting protocols....

  18. Submersible canned motor transfer pump

    DOE Patents [OSTI]

    Guardiani, R.F.; Pollick, R.D.; Nyilas, C.P.; Denmeade, T.J.

    1997-08-19

    A transfer pump is described which is used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass there through, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank. 17 figs.

  19. Enhanced heat transfer using nanofluids

    DOE Patents [OSTI]

    Choi, Stephen U. S. (Lisle, IL); Eastman, Jeffrey A. (Naperville, IL)

    2001-01-01

    This invention is directed to a method of and apparatus for enhancing heat transfer in fluids such as deionized water. ethylene glycol, or oil by dispersing nanocrystalline particles of substances such as copper, copper oxide, aluminum oxide, or the like in the fluids. Nanocrystalline particles are produced and dispersed in the fluid by heating the substance to be dispersed in a vacuum while passing a thin film of the fluid near the heated substance. The fluid is cooled to control its vapor pressure.

  20. Transferring to The University of New Mexico

    E-Print Network [OSTI]

    New Mexico, University of

    Transferring to The University of New Mexico From Central New Mexico College A Transfer Articulation Guide based on Central New Mexico Community College Catalog Year 2009 2011 Apply to UNM on-line at www.unm.edu #12;Transferring to The University of New Mexico from Central New Mexico Community College