Sample records for file transfer protocol

  1. Argonne integrated heterogeneous file transfer network

    SciTech Connect (OSTI)

    Schofield, J.

    1984-01-01T23:59:59.000Z

    This presentation describes the computing environment at Argonne National Laboratory and the actions underway to implement a coherent hierarchy of computing systems connected through a heterogeneous file transfer network. A major goal of the Computing Services Division is to integrate heterogeneous computing elements incrementally into a nework, with the goal of having everything somehow connected to everything else. Using standard IBM networking protocols, we have already built a full-function computer-to-computer file transfer network of IBM and DEC VAX systems. Currently, the users on the IBM MVS and VM/CMS systems can use standard IBM commands to send files and mail to DEC VAX users and output devices, and they can receive files from the DEC VAX's as if they had been sent from other IBM systems; similarly, the DEC VAX users can use standard DEC commands to send files and mail to IBM users and output devices, and they can receive files from the IBM systems as if they had been sent from other DEC VAX systems. In fact, the VAXes can exchange files and mail among themselves via the IBM NJE-based network without the need for DECnet links between the VAXes. Because this integrated heterogeneous file transfer network uses the standard IBM peer-to-peer communications protocol, all of the Laboratory's IBM and DEC computers easily communicate with the approximately 170 other computers in the Bitnet university network. Plans call for further integration of existing HP 3000 systems and future word processing systems such as Exxon, NBI, or Wang; we believe it is vitally important to provide smooth paths into this network for users of personal desktop computers. 17 references.

  2. GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through Wireless

    E-Print Network [OSTI]

    Yu, Chansu

    1 GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through WirelessSachin Hirve April 30, 2008April 30, 2008 Contents:Contents: What is Software Radio?What is Software Radio? USRPUSRP ­­ MultiMulti--functional hardwarefunctional hardware GNU RadioGNU Radio Previous Work

  3. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14T23:59:59.000Z

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  4. Instructions for transmitting Collector files to KFS In order for a department's KFS Collector file to be processed, departments must transfer the file to an

    E-Print Network [OSTI]

    Stephens, Graeme L.

    Instructions for transmitting Collector files to KFS In order for a department's KFS Collector file. The name of the KFS Collector file transferred to the Information Systems server by each department should in .xml. Once a department's Collector file has been processed by KFS it will be removed from

  5. Three Tier Encryption Algorithm For Secure File Transfer

    E-Print Network [OSTI]

    Balakrishnan, Bhargav

    2011-01-01T23:59:59.000Z

    This encryption algorithm is mainly designed for having a secure file transfer in the low privilege servers and as well as in a secured environment too. This methodology will be implemented in the data center and other important data transaction sectors of the organisation where the encoding process of the software will be done by the database administrator or system administrators and his trusted clients will have decoding process of the software. This software will not be circulated to the unauthorised customers.

  6. Incorporation of analgesics into rodent embryo transfer protocols: assessing the effects on reproductive outcomes

    E-Print Network [OSTI]

    Burckhardt, Heather Ann

    2009-05-15T23:59:59.000Z

    Approved by: Chair of Committee, Melanie M. Ihrig Committee Members, Ann B. Kier Jane C. Welsh Head of Department, Gerald R. Bratton December 2006 Major Subject: Laboratory Animal Medicine iii ABSTRACT Incorporation... of Analgesics into Rodent Embryo Transfer Protocols: Assessing the Effects on Reproductive Outcomes. (December 2006) Heather Ann Burckhardt, B.S., Texas A&M University Chair of Advisory Committee: Dr. Melanie M. Ihrig Surgical embryo transfer...

  7. Microsoft PowerPoint - File Transfer-Turner

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighand Retrievals fromprocessEstimating forcloudTomTransfer Best Practices

  8. Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer

    E-Print Network [OSTI]

    Christoph Kurz; Michael Schug; Pascal Eich; Jan Huwer; Philipp Mller; Jrgen Eschner

    2014-10-10T23:59:59.000Z

    A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit, and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80/s successful state transfer events out of 18,000/s repetitions.

  9. Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2006-06-19T23:59:59.000Z

    We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...

  10. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2007-02-16T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

  11. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2006-06-20T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

  12. Design of the PSi Header Processor for Xpress Transfer Protocol(XTP)

    E-Print Network [OSTI]

    Rayaprolu, Murthy S.

    1992-01-01T23:59:59.000Z

    dual-pipeline scheme has been designed to handle variable length packets. The shoter packets follow pipeline Pl, and the longer packets follow pipeline P2. Also, all packets belonging to the same Connection Processors as those following P2 also... follow P2 irrespective of their length. In all, there are seven processing stages(processing elements) in the designed header processor. The first stage, which interfaces with the adjacent protocol layers, is common to both pipelines. In pipeline Pl...

  13. Design of the PSi Header Processor for Xpress Transfer Protocol(XTP)

    E-Print Network [OSTI]

    Rayaprolu, Murthy S.

    1992-01-01T23:59:59.000Z

    dual-pipeline scheme has been designed to handle variable length packets. The shoter packets follow pipeline Pl, and the longer packets follow pipeline P2. Also, all packets belonging to the same Connection Processors as those following P2 also... follow P2 irrespective of their length. In all, there are seven processing stages(processing elements) in the designed header processor. The first stage, which interfaces with the adjacent protocol layers, is common to both pipelines. In pipeline Pl...

  14. An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment

    SciTech Connect (OSTI)

    Hake, K.A.

    1990-11-01T23:59:59.000Z

    This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

  15. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnetEffective safety ...Mediator Effects

  16. MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

    E-Print Network [OSTI]

    Yoo, Seung-mok

    2012-01-01T23:59:59.000Z

    the measured energy consumptions during one data transfertransmission, and energy consumption for the data transferand the energy consumption depends on the data transfer

  17. ANJE5.40. VAX VMS IBM NJE Protocol Emulator

    SciTech Connect (OSTI)

    Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

    1990-06-01T23:59:59.000Z

    The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

  18. 988 IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 11, NOVEMBER 2005 Modeling TCP Long File Transfer Latency over

    E-Print Network [OSTI]

    Kansas, University of

    . However, TCP connections may be running over a multilink connection that aggregates the bandwidth latency for a long transfer. The performance model is experimentally evaluated by running TCP over MLPPP connections is predicted using the proposed model by varying the call drop rate and the packet loss

  19. Euclid File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  20. Formatting conventions and variable storage are given below for transfer files from Nigel Badnell's dielectronic calculations. Data for an ion is specified by the isoelectronic sequence

    E-Print Network [OSTI]

    Badnell's dielectronic calculations. Data for an ion is specified by the isoelectronic sequence.BADNELL.LIKE() where is the recombining isoelectronic sequence symbol is the specific recombining ion : name meaning SEQ sequence identifier (two characters) IZ0 nuclear charge ADFID ADAS data file type code

  1. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  2. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget »Travel andFifth Annual RadWasteFileFileFile

  3. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems NERSC File Systems Overview NERSC file systems can be divided into two categories: local and global. Local file systems are only accessible on a single platform, providing...

  4. Franklin File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance...

  5. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  6. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget »Travel andFifth Annual RadWasteFileFile

  7. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  8. USDOE Technology Transfer, Responses to the Notice of Inquiry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About the National Labs Designated User Facilities TECH TRANSFER AGREEMENTS (CRADA) Cooperative Research and Development Agreement (PDF file | Word doc) User Agreement -...

  9. Data & File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC File Systems HPSS Data Archive IO Resources for Scientific Applications at NERSC Optimizing IO performance on the Lustre file system IO Formats...

  10. FERC Filing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederal Columbia River RiskFatigueFERC-Filing Sign

  11. FERC Filing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederal Columbia River RiskFatigueFERC-Filing

  12. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T' j-jE:, ,, TO: FILE

  13. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T' j-jE:, ,, TO: FILE3

  14. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget »Travel andFifth Annual RadWasteFile Systems

  15. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget »Travel andFifth Annual RadWasteFile

  16. IBM NJE protocol emulator for VAX/VMS

    SciTech Connect (OSTI)

    Engert, D.E.

    1981-01-01T23:59:59.000Z

    Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

  17. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnetEffective safety ...Mediator

  18. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  19. Numerical Methods & .m Files

    E-Print Network [OSTI]

    1910-70-10T23:59:59.000Z

    Save this file as a .m file with the SAME name as your function. The above example would be saved as fcn1.m. You can check if your function has been saved...

  20. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. (Cincinnati Univ., OH (United States))

    1992-10-01T23:59:59.000Z

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  1. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  2. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  3. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  4. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  5. Remote File PC Users Guide

    E-Print Network [OSTI]

    University of Technology, Sydney

    UTS: ITD Remote File Access 2010 PC Users Guide V3.0 #12;UTS:ITD Remote File Access: PC Users Guide Part III: Accessing Remote File Access 8 Part IV: Using Remote File Access 14 Part V: FAQ 25 #12;UTS:ITD Remote File Access: PC Users Guide v3.0 2010 3 1. What is Remote File Access? UTS Remote File Access

  6. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  7. UNIX file permissions

    E-Print Network [OSTI]

    ... out sensitive information (like promotion documents and qualifier exams). ... about security, you will want to change your "umask" line in your .cshrc file.

  8. Computationally Secure Oblivious Transfer Moni Naor y Benny Pinkas z

    E-Print Network [OSTI]

    Computationally Secure Oblivious Transfer #3; Moni Naor y Benny Pinkas z Abstract We describe a new Information Retrieval (PIR) protocol to a Symmetric PIR (SPIR) protocol without increasing the number security de#12;nitions. Section 2 presents protocols for 1-out-of-N and k-out-of-N OT. Section 3 presents

  9. ELCAP Data Assembly and Conversion Project: Report on File Contents

    E-Print Network [OSTI]

    ................................................................................................................7 PNNL Data Files.........................................................................................................................................9 PNNL Site Files.SASLIB.XPT.....................................................................................................................................14 PNNL AVAX Files

  10. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15T23:59:59.000Z

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  11. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  12. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  13. BPA files reciprocity tariff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 12 BONNEVILLE POWER ADMINISTRATION FOR IMMEDIATE RELEASE Friday, March 30, 2012 CONTACT: Doug Johnson, 503-230-5840 or 503-230-5131 BPA files reciprocity tariff Portland, Ore. -...

  14. LONG TERM FILE MIGRATION - PART II: FILE REPLACEMENT ALGORITHMS

    E-Print Network [OSTI]

    Jay Smith, Alan

    2011-01-01T23:59:59.000Z

    MIGRATION PART II: FILE REPLACEMENT ALGORITHMS Alan Jaymay vary even though replacement fi~~d the pa~ameter value PIe N - P ;, RT I r:. fILE REPLACEMENT ALGORITHMS. I.lan ~1ar

  15. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  16. A Protocol for Disaster Data Evacuation Tilmann Rabl, Florian Stegmaier, Mario Dller, and The Tong Vang

    E-Print Network [OSTI]

    Hammerton, James

    send proto- col (DFSP), a new bulk data transfer protocol. It employs striping to dynamic intermediate is im- portant. Therefore, an enhanced version, the Dynamic Fast Send Protocol (DFSP), has been implemented which over- comes the identified weaknesses. DFSP comprises a novel Copyright is held

  17. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual Wastewater...

  18. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  19. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  20. rfs Remote File System Softwarepraktikum fur Fortgeschrittene

    E-Print Network [OSTI]

    rfs Remote File System Softwarepraktikum fur Fortgeschrittene Parallele und Verteilte Systeme. Overview 5 2.1. Remote File System Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2. Remote File System Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3. Global Remote

  1. How to use the m-files

    E-Print Network [OSTI]

    shaoh

    2008-11-05T23:59:59.000Z

    How to use the m- files? There is a basic idea of using m-files in Matlab. That is : the m-files written by you ( and you want to use it ) should be in the current...

  2. The Umbrella File System: Storage Management Across Heterogeneous Devices

    E-Print Network [OSTI]

    Garrison, John Allen

    2011-08-08T23:59:59.000Z

    coherent directory structure for users. Particular files are directed to appropriate underlying file systems by intercepting system calls connecting the Virtual File System (VFS) to the underlying file systems. Files are evaluated by a policy module...

  3. JPEG File Interchange Format

    E-Print Network [OSTI]

    Hamilton, Eric

    2004-03-30T23:59:59.000Z

    interchange format compressed image representation PC or Mac or Unix workstation compatible Standard color space: one or three components. For three components, YCbCr (CCIR 601-256 levels) APP0 marker used to specify Units, X pixel density, Y pixel... by the Macintosh but not by PCs or workstations. JPEG File Interchange Format, Version 1.02 2 Standard color space The color space to be used is YCbCr as defined by CCIR 601 (256 levels). The RGB components calculated by linear conversion from YCbCr shall...

  4. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9 SeptemberSettingUncertainties ElitzaSignon File

  5. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout Us / OurPast EventsFile

  6. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling CorpNewCF INDUSTRIES,L? .-IGYS IDCSTEJ: FILE

  7. TO: FILE FROM: SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T'ncZl' lO--23,TO: FILE

  8. TO: FILE MEMORANDUM

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T'ncZl'FILE MEMORANDUM

  9. Franklin File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget(DANCE) TargetForms &FrancisEmailFile

  10. Euclid File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /Email Announcements Archive Email AnnouncementsFile

  11. Design and simulation of Header Processor for Xpress Transfer Protocol

    E-Print Network [OSTI]

    Chandangoudar, Girish R.

    1993-01-01T23:59:59.000Z

    designed to meet the needs of high-speed networks. This research focuses on the hardware imple- mentation of XTP. Different hardware architectures for XTP are presented. A dual- pipelined XTP Header Processor is explained. To overcome many... of the problems associated with the dual-pipelined XTP Header Processor, a single-pipelined XTP Header Processor is proposed, Different design issues snd implementation techniques for the single-pipelined Header Processor are explained. Simulation models...

  12. Design and simulation of Header Processor for Xpress Transfer Protocol

    E-Print Network [OSTI]

    Chandangoudar, Girish R.

    1993-01-01T23:59:59.000Z

    designed to meet the needs of high-speed networks. This research focuses on the hardware imple- mentation of XTP. Different hardware architectures for XTP are presented. A dual- pipelined XTP Header Processor is explained. To overcome many... of the problems associated with the dual-pipelined XTP Header Processor, a single-pipelined XTP Header Processor is proposed, Different design issues snd implementation techniques for the single-pipelined Header Processor are explained. Simulation models...

  13. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  14. Globus Online File Transfer - NERSC Tutorial - March 8, 2011

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal Heat Pump Basics31/2007Global health response

  15. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  16. PSiL?LC: an architecture for logical link control protocol processing

    E-Print Network [OSTI]

    Mak, Albert Ho Kee

    1992-01-01T23:59:59.000Z

    in relation to the MAC frame SAP & Link Station association Message transfer in a Connect in operation The PSi architecture The PSi LLC architecture LLC sub-layer implemented using Connection Processors Data path in PSi LLC, Simplified PSi LLC... in the protocol stack communicate by passing messages via specific Service Access Points (SAPs). Communications between two neighboring layers are transparent to the two layers above and below [2]. The aim of the OSI protocol is to provide an open environment...

  17. Save PDF files as Word documents You can save a PDF file as a Word document, even if the file was originally created in a

    E-Print Network [OSTI]

    Segraves, Kari A.

    Save PDF files as Word documents You can save a PDF file as a Word document, even if the file to save. 2. Choose File > Save As > Microsoft Word > Word Document. The Word Document command saves File > Save As > Microsoft Word > Word 97-2003 Document to save a DOC file. Tip: If you want to save

  18. MEMORANDU TO: FILE FHOM: SUBJECT:

    Office of Legacy Management (LM)

    TO: FILE FHOM: SUBJECT: Curre"t: Ll&k&&d l- ; if yes, date contacted 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample &...

  19. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  20. Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems

    E-Print Network [OSTI]

    Andrew, Lachlan

    Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems}@swin.edu.au Abstract--Network induced energy consumption is a significant fraction of all ICT energy consumption. It is shown that using peer-to-peer and naively minimizing the transfer time results in energy consumption

  1. iTOUGH2 Universal Optimization Using the PEST Protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.

    2010-07-01T23:59:59.000Z

    iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  2. Confidential Continuous Variable Direct Communication Protocol by Using Fock-Coherent Entangled States

    E-Print Network [OSTI]

    Soudeh Jahanshahi; Soroosh Alighanbari; Alireza Bahrampour; Mohammad Hossein Zandi

    2015-02-02T23:59:59.000Z

    We propose a scheme for the secure direct communication based on the entangled phase-coherent states, which shows an elevated level of confidentiality. The protocol gives a simultaneous security control for every bit of transferred information. The security-check-per-bit is provided by sending an additional mode to prove the legitimate parties' authenticity. Other benefit include increased transfer rate, since a separate control sequences is unnecessary. We study the security of the scheme for both ideal and realistic quantum channel. The protocol shows a robust security and prepares 50% probability to detect the presence of the eavesdropper.

  3. Data file management in the DIII-D data acquisition and analysis computer systems

    SciTech Connect (OSTI)

    McHarg, B.B. Jr.

    1989-11-01T23:59:59.000Z

    DIII-D is a large tokamak plasma physics and fusion energy research experiment funded by the Department of Energy. Each shot of the experiment results in data files containing between 20 and 30 Mbytes of data. These shots occur about once every 10 minutes with 40 to 50 shots per operating day. Over 1.2 gigabytes have been acquired in one daily session. Most of this data is acquired by MODCOMP Classic computers and is transferred via a Network Systems Hyperchannel to the DIII-D DEC VAX cluster system which is connected via Ether-net to the User Service Center DEC VAX cluster system. Some other data is acquired by local MicroVAX based plasma diagnostic systems and is transferred via DECnet to the DIII-D cluster. A substantial part of these VAX cluster systems is devoted to handling the large data files so as to maintain availability of the data for users, provide for shot archiving and shot restoration capabilities, and at the same time allow for new data to be received into the systems. Many of these tasks are carried out in near real time in sequence with a tokamak shot while other tasks are performed periodically throughout operations or during off hours. These tasks include disk space management, data archiving to 6250 and/or 8 mm tape drives, data file migration from the DIII-D cluster to the User Service Center cluster, data file compression, and network wide data file access. 11 refs., 2 figs.

  4. How to batch upload video files with Unison How to batch upload video files with Unison

    E-Print Network [OSTI]

    Benos, Panayiotis "Takis"

    How to batch upload video files with Unison How to batch upload video files with Unison There are two different ways to upload already existing video files into Unison: Upload from the New Session page (only allows one video file to be uploaded at a time) Launching the editor in Composer (allows

  5. DataMover: robust terabyte-scale multi-file replication overwide-area networks

    SciTech Connect (OSTI)

    Sim, Alex; Gu, Junmin; Shoshani, Arie; Natarajan, Vijaya

    2004-04-05T23:59:59.000Z

    Typically, large scientific datasets (order of terabytes) are generated at large computational centers, and stored on mass storage systems. However, large subsets of the data need to be moved to facilities available to application scientists for analysis. File replication of thousands of files is a tedious, error prone, but extremely important task in scientific applications. The automation of the file replication task requires automatic space acquisition and reuse, and monitoring the progress of staging thousands of files from the source mass storage system, transferring them over the network, archiving them at the target mass storage system or disk systems, and recovering from transient system failures. We have developed a robust replication system, called DataMover, which is now in regular use in High-Energy-Physics and Climate modeling experiments. Only a single command is necessary to request multi-file replication or the replication of an entire directory. A web-based tool was developed to dynamically monitor the progress of the multi-file replication process.

  6. A Protocol For Cooling and Controlling Composite Systems by Local Interactions

    E-Print Network [OSTI]

    Daniel Burgarth; Vittorio Giovannetti

    2008-11-14T23:59:59.000Z

    We discuss an explicit protocol which allows one to externally cool and control a composite system by operating on a small subset of it. The scheme permits to transfer arbitrary and unknown quantum states from a memory on the network ("upload access") as well as the inverse ("download access"). In particular it yields a method for cooling the system.

  7. File:Rules and Regulations for the Management and Control of...

    Open Energy Info (EERE)

    Facebook icon Twitter icon File:Rules and Regulations for the Management and Control of Designated Ground Water.pdf Jump to: navigation, search File File history File...

  8. File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air...

    Open Energy Info (EERE)

    icon File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements.pdf Jump to: navigation, search File File history File...

  9. File:Texas NOI for Storm Water Discharges Associated with Construction...

    Open Energy Info (EERE)

    NOI for Storm Water Discharges Associated with Construction Activities (TXR150000).pdf Jump to: navigation, search File File history File usage Metadata File:Texas NOI for Storm...

  10. File:App Commercial Leases and Easements or Amendment or Residential...

    Open Energy Info (EERE)

    App Commercial Leases and Easements or Amendment or Residential Coastal Easements HOA.pdf Jump to: navigation, search File File history File usage Metadata File:App Commercial...

  11. Transfer information remotely via noise entangled coherent channels

    E-Print Network [OSTI]

    A. El Allati; N. Metwally; Y. Hassouni

    2010-02-11T23:59:59.000Z

    In this contribution, a generalized protocol of quantum teleportation is suggested to investigate the possibility of remotely transfer unknown multiparities entangled coherent state. A theoretical technique is introduced to generate maximum entangled coherent states which are used as quantum channels. We show that the mean photon number plays a central role on the fidelity of the transferred information. The noise parameter can be considered as a control parameter only for small values of the mean photon number.

  12. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07T23:59:59.000Z

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  13. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security The library is open only to members of Brasenose; strangers are not to be admitted. Eating, drinking (with the exception of water) and smoking are strictly forbidden. Library the library. Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  14. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTESTPATH PROTOCOLS for TIMEDEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  15. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  16. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  17. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  18. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  19. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  20. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  1. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et tudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  2. Transfer of Spatial Reference Frame Using Singlet States and Classical Communication

    E-Print Network [OSTI]

    Thomas B. Bahder

    2014-08-27T23:59:59.000Z

    A simple protocol is described for transferring spatial direction from Alice to Bob (two spatially separated observers) up to inversion. The two observers are assumed to share quantum singlet states and classical communication. The protocol assumes that Alice and Bob have complete free will (measurement independence) and is based on maximizing the Shannon mutual information between Alice and Bob's measurement outcomes. Repeated use of this protocol for each spatial axis of Alice allows transfer of a complete 3-dimensional reference frame, up to inversion of each of the axes. The technological complexity of this protocol is similar to that needed for BB84 quantum key distribution, and hence is much simpler to implement than recently proposed schemes for transmission of reference frames. A second protocol based on a Bayesian formalism is also presented.

  3. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02T23:59:59.000Z

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  4. Fast population transfer engineering of three-level systems

    E-Print Network [OSTI]

    Xi Chen; J. G. Muga

    2012-07-12T23:59:59.000Z

    We design, by invariant-based inverse engineering, resonant laser pulses to perform fast population transfers in three-level systems. The efficiency and laser intensities are examined for different protocols. The energy cost to improve the fidelity is quantified. The laser intensities can be reduced by populating the intermediate state and by multi-mode driving.

  5. GDCT Initialization File [gdct.ini] Format Specification Guide

    E-Print Network [OSTI]

    Rosebrugh, Robert

    GDCT Initialization File [gdct.ini] Format Specification Guide Written By: Jeremy Bradbury June 22, 2000 Below is the layout of the gdct.ini file. It is important to note the following: · If the gdct.ini to represent that a file does not exist under the "Recent Files" section of the gdct.ini file. [Internal

  6. Unix/Linux Command Reference .com File Commands

    E-Print Network [OSTI]

    Reluga, Tim

    word in the current line Ctrl+U erases the whole line Ctrl+R type to bring up a recent commandUnix/Linux Command Reference .com File Commands ls directory listing ls -al formatted listing output the contents of file head file output the first 10 lines of file tail file output the last 10

  7. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  8. FileName//FileDate//PNNL-SA-##### DPA Calculational Methodologies Used in Fission

    E-Print Network [OSTI]

    McDonald, Kirk

    FileName//FileDate//PNNL-SA-##### DPA Calculational Methodologies Used in Fission and Fusion Reactor Materials Applications David Wootan - david.wootan@pnnl.gov, 1-509-372-6865 Radiation Damage

  9. Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File

    E-Print Network [OSTI]

    Sokol, Dina

    Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File To save | New | Source File. d. In the new window, right-click and select Paste. e. Then select "File | Save as" to save and name the file. i. In the window that pops up, the bottom fill-in box is labelled "Save as type

  10. Transferring Data at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Transferring Data Advice and Overview NERSC provides many facilities for storing data and performing analysis. However, transfering data - whether over the wide area network...

  11. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation ProtectionRaising funds forAdvancedAdvancedReading File

  12. User's guide to PROTOCOL, a numerical simulator for the dissolution reactions of inorganic solids in aqueous solutions

    SciTech Connect (OSTI)

    Pickrell, G.; Jackson, D.D.

    1984-10-01T23:59:59.000Z

    This report provides a user's manual for PROTOCOL, a comprehensive coupled kinetic/equilibrium computer program for analyzing the dissolution reactions of solids with aqueous solutions, specifically applied to the potential corrosion of vitrified nuclear waste by groundwater. The capabilities and available options are summarized as well as instructions for setting up and running problems. Also described in this report and included in the PROTOCOL software package are MASTER, a master file of species thermodynamic data, MANEQL, a preprocessor program and POSTP, a postprocessor. POSTP provides offline plotting using the CRAY-1 DISSPLA 9.0 graphics library. PROTOCOL is operational on the CDC-7600 and CRAY-1 computers at the Lawrence Livermore National Laboratory. 7 references, 10 figures, 2 tables.

  13. NERSC Online Training May 3: Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Online Training May 3: Navigating NERSC File Systems NERSC Online Training May 3: Navigating NERSC File Systems April 26, 2011 by Richard Gerber A NERSC training event, "Navigating...

  14. DOE Successfully Resolves Three Enforcement Cases and Files Yet...

    Office of Environmental Management (EM)

    Successfully Resolves Three Enforcement Cases and Files Yet Another DOE Successfully Resolves Three Enforcement Cases and Files Yet Another September 29, 2010 - 5:24pm Addthis The...

  15. File:Notice of Termination for Authorization under TPDES General...

    Open Energy Info (EERE)

    | Sign Up Search File Edit History Facebook icon Twitter icon File:Notice of Termination for Authorization under TPDES General Permit TXR150000.pdf Jump to: navigation,...

  16. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  17. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  18. POLICIES AND PROCEDURES ELECTRONIC THESES AND DISSERTATIONS

    E-Print Network [OSTI]

    Scott, Robert A.

    . Submissions can be made from anywhere in the world via the World Wide Web and the file transfer protocol (FTP format. PDF stands for Portable Document Format. A file created in a standard word processing software

  19. UBC Subject File Collection / UBC Archives (collector)

    E-Print Network [OSTI]

    Handy, Todd C.

    UBC Subject File Collection / UBC Archives (collector) Compiled by Max Steiner (2005) Revised Description o Title / Dates of Creation / Physical Description o Collector's Biographical Sketch o Scope Files Collection / UBC Archives (collector). 1915-2000. 10.8 m of textual materials. Collector

  20. Contributing Storage using the Transparent File System

    E-Print Network [OSTI]

    Berger, Emery

    Contributing Storage using the Transparent File System JAMES CIPAR and MARK D. CORNER and EMERY D barrier to the adoption of contributory storage systems is that contributing a large quantity of local--all of the currently available space-- without impacting the performance of ordinary file access operations. We show

  1. Common File Formats in Rosetta Steven Combs

    E-Print Network [OSTI]

    Meiler, Jens

    different ways Command Line Fixbb.release database -s 1thfD.pdb ex1 ex2 packing.942 19.190 1.00 8.50 P Ligand lines Atom # Atom name Residue name Chain ID Residue # Xcoord Ycoord Zcoord occupancy Bfactor Element name Atom lines #12;Silent Files Specify by in:file:silent and out

  2. TO: FILE FROM: I SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T'ncZl' lO--23,TO: FILE

  3. File:State protocol agreement oct2009.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEuropeStrat.pdf Jump to:student-HS.pdf JumpSkystream specsState

  4. ITC Filing of Operational Protocols - August 9, 2011 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To:Department ofOralGovernmentStandards for Packaged TerminalITThese

  5. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  6. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  7. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  8. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    SciTech Connect (OSTI)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01T23:59:59.000Z

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  9. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  10. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  11. An Analysis of Web File Sizes: New Methods and Models

    E-Print Network [OSTI]

    Wolfe, Patrick J.

    An Analysis of Web File Sizes: New Methods and Models A Thesis presented by Brent Tworetzky consider such models and how to improve their fits. This thesis contributes to file size research-improved file size estimations over type-blind models. We therefore present a range of useful new file size

  12. FILE USAGE RECOMMENDATIONS OCTOBER 31, 2013 | PAGE: 1 AVAILABLE LOGOS

    E-Print Network [OSTI]

    Aronov, Boris

    FILE USAGE RECOMMENDATIONS OCTOBER 31, 2013 | PAGE: 1 AVAILABLE LOGOS EPS JPG PNG LONG LOGO_long_white.png STACKED LOGO engineering_stacked_color.eps engineering_stacked_color.jpg engineering O R - Recommended File Type O - Optional File Type Which file to use Logo formats are available

  13. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  14. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  15. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  16. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  17. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  18. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghurajiConventionalMississippi"site. If youEIA-906 & EIA-920,Condensate,Electric Power

  19. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghurajiConventionalMississippi"site. If youEIA-906 & EIA-920,Condensate,Electric PowerElectric

  20. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghurajiConventionalMississippi"site. If youEIA-906 & EIA-920,Condensate,Electric

  1. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghurajiConventionalMississippi"site. If youEIA-906 &

  2. FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling CorpNew 1325.8.Enaineer;/:4,4 (;%hEROF'

  3. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. DepartmentOregon826Industrial Plants Excluding

  4. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. DepartmentOregon826Industrial Plants ExcludingCoke

  5. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. DepartmentOregon826Industrial Plants

  6. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. DepartmentOregon826Industrial

  7. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S.

  8. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S.3,"Alabama","Alabama","Electric Power

  9. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S.3,"Alabama","Alabama","Electric

  10. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1

  11. HEAT TRANSFER FLUIDS

    E-Print Network [OSTI]

    Lenert, Andrej

    2012-01-01T23:59:59.000Z

    The choice of heat transfer fluids has significant effects on the performance, cost, and reliability of solar thermal systems. In this chapter, we evaluate existing heat transfer fluids such as oils and molten salts based ...

  12. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Heat Transfer Guest Editorial

    E-Print Network [OSTI]

    Kandlikar, Satish

    Journal of Heat Transfer Guest Editorial We are indeed delighted in bringing out this special issue was showcased in diverse areas such as traditional heat and mass transfer, lab-on-chip, sensors, biomedical applica- tions, micromixers, fuel cells, and microdevices. Selected papers in the field of heat transfer

  14. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget »Travel andFifth Annual RadWasteFileFileFileO

  15. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  16. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  17. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  18. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  19. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  20. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  1. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  2. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  3. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  4. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  5. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  6. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  7. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12T23:59:59.000Z

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  8. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19T23:59:59.000Z

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  9. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  10. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  11. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  12. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  13. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  14. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  15. Introduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File

    E-Print Network [OSTI]

    The library was completely overhauled It now provides consistently named functions and data types The commentsIntroduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File System Softwarepraktikum fur Fortgeschrittene Michael Kuhn Parallele und

  16. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  17. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2 Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3 Ravi Sandhu

  18. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2 Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3 Ravi Sandhu 2000

  19. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2 Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3 Ravi Sandhu

  20. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Fuel transfer system

    DOE Patents [OSTI]

    Townsend, H.E.; Barbanti, G.

    1994-03-01T23:59:59.000Z

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool. 6 figures.

  2. NFS File Handle Security Avishay Traeger, Abhishek Rai, Charles P. Wright, and Erez Zadok

    E-Print Network [OSTI]

    Zadok, Erez

    a file han- dle. When an NFS client performs an operation, it passes the file handle to the server, which decodes the file han- dle to determine what object the file handle refers to. Since NFS is a stateless

  3. HIGEE Mass Transfer

    E-Print Network [OSTI]

    Mohr, R. J.; Fowler, R.

    HIGEE MASS TRANSFER R.J. Mohr and R. Fowler GLITSCH, INC. Dallas, Texas ABSTRACT Distillation, absorption, and gas stripping have traditionally been performed in tall columns utilizing trays or packing. Columns perform satisfactorily... transfer system which utilizes a rotating bed of packing to achieve high efficiency separations, and consequent reduction in size and weight. INTRODUCTION HIGEE is probably one of the most interesting developments in mass transfer equipment made...

  4. Quantum-state transfer in spin chains via isolated resonance of terminal spins

    E-Print Network [OSTI]

    Kamil Korzekwa; Pawe? Machnikowski; Pawe? Horodecki

    2014-06-03T23:59:59.000Z

    We propose a quantum-state transfer protocol in a spin chain that requires only the control of the spins at the ends of the quantum wire. The protocol is to a large extent insensitive to inhomogeneity caused by local magnetic fields and perturbation of exchange couplings. Moreover, apart from the free evolution regime, it allows one to induce an adiabatic spin transfer, which provides the possibility of performing the transfer on demand. We also show that the amount of information leaking into the central part of the chain is small throughout the whole transfer process (which protects the information sent from being eavesdropped) and can be controlled by the magnitude of the external magnetic field.

  5. MATERIALS TRANSFER AGREEMENT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MTAXX-XXX 1 MATERIAL TRANSFER AGREEMENT for Manufacturing Demonstration Facility and Carbon Fiber Technology Facility In order for the RECIPIENT to obtain materials, the RECIPIENT...

  6. Tunable transfer | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 29, 2013 Scientists gain first quantitative insights into electron transfer from minerals to microbes Scientists have gained the first quantitative insights into electron...

  7. Technology Transfer Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Research Projects Agency-Energy (ARPA-E) Oil & Gas Technology Transfer Initiatives USEFUL LINKS Association of University Technology Managers (AUTM) Federal Laboratory...

  8. Bus transfer analysis

    SciTech Connect (OSTI)

    Weronick, R.; Hassan, I.D. [Raytheon Engineers and Constructors, Lyndhurst, NJ (United States)

    1996-11-01T23:59:59.000Z

    This paper discusses bus transfer schemes and the methodology used in modeling and analysis. Due to the unavailability of generic acceptance criteria, simulations were performed to analyze the actual fast bus transfer operations at four operating nuclear power generating stations. Sample simulation results illustrating the transient variations in motors currents and torques are included. The analyses were performed to ensure that motors and other rotating parts are not subjected to excessive or accumulated stresses caused by bus transfer operations. A summary of the experience gained in the process of performing this work and suggested bus transfer acceptance criteria are also presented.

  9. Facility Survey & Transfer

    Broader source: Energy.gov [DOE]

    As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

  10. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  11. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  12. How-to: Use EMSL's Aurora File System | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    How-to: Use EMSL's Aurora File System How-to: Use EMSL's Aurora File System Synopsis The Aurora archive system is used for long-term storage of data collected by EMSL instuments,...

  13. "Annual Electric Power Industry Report (EIA-861 data file)

    Gasoline and Diesel Fuel Update (EIA)

    FILES Electric power sales, revenue, and energy efficiency Form EIA-861 detailed data files Release Date for 2013: February 19, 2015 Next Release date: October 2015 Annual data for...

  14. Data Files Monthly Natural Gas Gross Production Report

    Gasoline and Diesel Fuel Update (EIA)

    Data Files Data Files 1 EIA Best Estimate of Gross Withdrawals: Combination of historical production data from the Natural Gas Annual and current estimates based on data from the...

  15. Duplicate File Names-A Novel Steganographic Data Hiding Technique

    E-Print Network [OSTI]

    Wu, Jie

    or a terrorist plot. None-the-less, these files can also be potentially dangerous viruses, malware, child porn

  16. POSITION DESCRIPTION 2012 TRANSFER MENTOR

    E-Print Network [OSTI]

    POSITION DESCRIPTION 2012 TRANSFER MENTOR TRANSFER MENTOR AS A STAFF MEMBER Thank you for your interest in the Transfer Mentor position with Orientation and Transition Programs' (OTP) Transfer Mentoring Program. The Transfer Mentor (TM) is a member of the Orientation and Transition Programs' staff

  17. Patent subsidy and patent filing in China By Zhen Lei

    E-Print Network [OSTI]

    Sekhon, Jasjeet S.

    Patent subsidy and patent filing in China By Zhen Lei , Zhen Sun, and Brian Wright Department of patent subsidy policies on patent filings in Chi- na. China had rapid growth in patenting in recent years and became the number one in patent filings in 2011. We study five neighboring cities in Jiangsu province

  18. File Popularity Characterisation. Chris Roadknight, Ian Marshall and Deborah Vearer

    E-Print Network [OSTI]

    Marshall, Ian W.

    , BAE 97]. Caches can bring files nearer the client (with a possible reduction in latency), reduce load curve, which plots the number of requests for each file against the file's popularity ranking. It is often said that this popularity curve follows Zipf's law, Popularity = K* ranking-a , with a being close

  19. The Future of the Andrew File System

    ScienceCinema (OSTI)

    None

    2011-04-25T23:59:59.000Z

    The talk will discuss the ten operational capabilities that have made AFS unique in the distributed file system space and how these capabilities are being expanded upon to meet the needs of the 21st century. Derrick Brashear and Jeffrey Altman will present a technical road map of new features and technical innovations that are under development by the OpenAFS community and Your File System, Inc. funded by a U.S. Department of Energy Small Business Innovative Research grant. The talk will end with a comparison of AFS to its modern days competitors.

  20. Janus: Automatic Ontology Builder from XSD Files

    E-Print Network [OSTI]

    Bedini, Ivan; Gardarin, Georges

    2010-01-01T23:59:59.000Z

    The construction of a reference ontology for a large domain still remains an hard human task. The process is sometimes assisted by software tools that facilitate the information extraction from a textual corpus. Despite of the great use of XML Schema files on the internet and especially in the B2B domain, tools that offer a complete semantic analysis of XML schemas are really rare. In this paper we introduce Janus, a tool for automatically building a reference knowledge base starting from XML Schema files. Janus also provides different useful views to simplify B2B application integration.

  1. A Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    -- Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In additionA Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks J. Jobin, for many sensor network applications, timeliness of data delivery at a sink that collects and interprets

  2. Technology transfer 1994

    SciTech Connect (OSTI)

    Not Available

    1994-01-01T23:59:59.000Z

    This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

  3. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  4. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  5. Friction Stir Welding Download the files fswss.txt and fswdyn.txt from the course website. These files contain

    E-Print Network [OSTI]

    Landers, Robert G.

    Friction Stir Welding QUESTION 1 Download the files fswss.txt and fswdyn.txt from the course website. These files contain experimental data from a friction stir welding process of 6061 aluminum 0 2 1 0 F z b z b d z z a z a + = + + (3) #12;Friction Stir Welding QUESTION 2 Download the files

  6. Summary of EPIC-2001 Rain Map Files EPIC Rainmap files were generated using all surveillance scans (3 tilt, full PPI)

    E-Print Network [OSTI]

    Rutledge, Steven

    information about the rain map cartesian grid and data values of radar reflectivity (dBZ) and rain rate (mm hrSummary of EPIC-2001 Rain Map Files EPIC Rainmap files were generated using all surveillance scans of the surveillance radar scan in UTC. The gif file (1) shows a 1-km height map (CAPPI) of rainfall intensity (mm hr-1

  7. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelire; R. Lauro; J. Ruggiero; J. -L. Le Gout

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  8. HEAT AND MOISTURE TRANSFER THROUGH CLOTHING

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01T23:59:59.000Z

    R. C. Eberhart (ed), Heat transfer in medicine and biology.between convective heat transfer and mass transferConvective and radiative heat transfer coefficients for

  9. Heat and moisture transfer through clothing

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01T23:59:59.000Z

    R. C. Eberhart (ed), Heat transfer in medicine and biology.Convective and radiative heat transfer coefficients forbetween convective heat transfer and mass transfer

  10. Ames Lab 101: Technology Transfer

    ScienceCinema (OSTI)

    Covey, Debra

    2012-08-29T23:59:59.000Z

    Ames Laboratory Associate Laboratory Director, Sponsored Research Administration, Debra Covey discusses technology transfer. Covey also discusses Ames Laboratory's most successful transfer, lead-free solder.

  11. Transfer reactions at ATLAS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    64 Ni+ 64 Ni Strong entrance-channel dependence of fusion enhancement Beckerman et al., PRL 45, 1472 (1980), PRC 25, 837 (1982) Coupling of transfer channels, in addition to...

  12. Seer: An analysis package for LHCO files

    E-Print Network [OSTI]

    Martin, Travis A W

    2015-01-01T23:59:59.000Z

    Seer is a multipurpose package for performing trigger, signal determination and cuts of an arbitrary number of collider processes stored in the LHCO file format. This article details the use of Seer, including the necessary details for users to customize the code for investigating new kinematic variables.

  13. Consanguine Calculations Input File: blood.in

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 of 20 Problem A+ Consanguine Calculations Input File: blood.in Every person's blood has 2 markers in a particular ABO blood type for that person. Combination ABO Blood Type AA A AB AB AO A BB B BO B OO O Likewise, every person has two alleles for the blood Rh factor, represented by the characters + and -. Someone who

  14. Historical_Habitats File Geodatabase Feature Class

    E-Print Network [OSTI]

    Historical_Habitats File Geodatabase Feature Class Tags Historical ecology, Ventura, Oxnard View, Meiners Oaks, Camarillo, Somis, Ventura River, Santa Clara River, Calleguas Creek, Santa Paula Springs, Ormond Beach, Mandalay Beach, Pierpont Bay, McGrath Lake, Ventura County, Los Angeles County

  15. DEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS

    E-Print Network [OSTI]

    for the program is provided by the following agencies: Department of Energy, Mines and Resources (Canada) Deutsche&M University, as an account of work performed under the international Ocean Drilling Program which is managedDEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS Ocean Drilling Program Texas A&M University Technical

  16. A Review of Perfect State Transfer and its Application as a Constructive Tool

    E-Print Network [OSTI]

    Alastair Kay

    2010-06-16T23:59:59.000Z

    We review the subject of perfect state transfer; how one designs the (fixed) interactions of a chain of spins so that a quantum state, initially inserted on one end of the chain, is perfectly transferred to the opposite end in a fixed time. The perfect state transfer systems are then used as a constructive tool to design Hamiltonian implementations of other primitive protocols such as entanglement generation and signal amplification in measurements, before showing that, in fact, universal quantum computation can be implemented in this way.

  17. Design and Implementation of a Metadata-rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2010-01-19T23:59:59.000Z

    Despite continual improvements in the performance and reliability of large scale file systems, the management of user-defined file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and semantic metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, user-defined attributes, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS incorporates Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the de facto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  18. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  19. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  20. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  1. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 l total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  2. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  3. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  4. Resources, framing, and transfer p. 1 Resources, framing, and transfer

    E-Print Network [OSTI]

    Hammer, David

    Resources, framing, and transfer p. 1 Resources, framing, and transfer David Hammer Departments. #12;Resources, framing, and transfer p. 2 Resources, framing, and transfer David Hammer, Andrew Elby of activating resources, a language with an explicitly manifold view of cognitive structure. In this chapter, we

  5. Solving iTOUGH2 simulation and optimization problems using the PEST protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.; Zhang, Y.

    2011-02-01T23:59:59.000Z

    The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstrate the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.

  6. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  7. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  8. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  9. Protocols for the Equitable Assessment of Marine Energy Converters

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  10. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  11. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  12. AMS-TeX Source file

    E-Print Network [OSTI]

    We measure success in the following descending order: 1. ..... Massachusetts 1981 B-G Becker,James C. and Gottlieb, Daniel H. Vector fields and transfers 72

  13. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  14. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  15. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  16. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  17. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  18. Quick Start The various sample data files after expansion (use Zip)

    E-Print Network [OSTI]

    library (49 signature files and 1 library list file, all in ASCII, 300 KB). Duncan Knob.sdf Lidar full wave form SDF file (60 MB). Duncan Knob.idx Required index file for Duncan Knob.sdf (4.5 MB). sbet_mission 1.out Smoothed Best Estimate of Trajectory file. Needed for Duncan Knob.sdf (98 MB). Immediate

  19. March 24, 2008 ADBS: Storage 1 Disk Storage, Basic File Structures, and

    E-Print Network [OSTI]

    Adam, Salah

    March 24, 2008 ADBS: Storage 1 Disk Storage, Basic File Structures, and Hashing. #12;March 24, 2008 ADBS: Storage 2 Chapter Outline The Storage Hierarchy How Far is Your Data Disk Storage Devices Records Blocking Files of Records Unordered Files Ordered Files Hashed Files RAID Technology Storage Area Network

  20. Error Detection and Error Classification: Failure Awareness in Data Transfer Scheduling

    SciTech Connect (OSTI)

    Louisiana State University; Balman, Mehmet; Kosar, Tevfik

    2010-10-27T23:59:59.000Z

    Data transfer in distributed environment is prone to frequent failures resulting from back-end system level problems, like connectivity failure which is technically untraceable by users. Error messages are not logged efficiently, and sometimes are not relevant/useful from users point-of-view. Our study explores the possibility of an efficient error detection and reporting system for such environments. Prior knowledge about the environment and awareness of the actual reason behind a failure would enable higher level planners to make better and accurate decisions. It is necessary to have well defined error detection and error reporting methods to increase the usability and serviceability of existing data transfer protocols and data management systems. We investigate the applicability of early error detection and error classification techniques and propose an error reporting framework and a failure-aware data transfer life cycle to improve arrangement of data transfer operations and to enhance decision making of data transfer schedulers.

  1. Applied heat transfer

    SciTech Connect (OSTI)

    Ganapathy, V.

    1982-01-01T23:59:59.000Z

    Heat transfer principles are discussed with emphasis on the practical aspects of the problems. Correlations for heat transfer and pressure drop from several worldwide sources for flow inside and outside of tubes, including finned tubes are presented, along with design and performance calculations of heat exchangers economizers, air heaters, condensers, waste-heat boilers, fired heaters, superheaters, and boiler furnaces. Vibration analysis for tube bundles and heat exchangers are also discussed, as are estimating gas-mixture properties at atmospheric and elevated pressures and life-cycle costing techniques. (JMT)

  2. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31T23:59:59.000Z

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  3. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  4. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  5. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  7. Design of the PSI connection processor for the Xpress transfer protocol

    E-Print Network [OSTI]

    Brudeseth, Rolf

    1994-01-01T23:59:59.000Z

    their interaction and execution. The implementation in the Verilog Hardware Description Language may be used to obtain an area estimate of the Connection Processor. To my parents Liv and TorbjIsrn whose support made this all possible. to my sister T, inda... Upper Layer IIeader Processor Connection Prores or Chips Connection I socessors QQQ OQO OOQ OOO OQQ QQQ Output Processor to t, o Lower Layer Upper Layer Fig. 1. PSi Template Architecture duties of the Output Processor are, based on the output...

  8. Analysis and behavioral modeling of the Finite State Machines of the Xpress Transfer Protocol

    E-Print Network [OSTI]

    Madduri, Venkateswara Rao

    1994-01-01T23:59:59.000Z

    REO) HOST A [B, A, K, R )(DATA, A A Release KA [A, B, KA', R A](CNTL Untnt) Relense KB [A, B, KAL R A](CNTL, WCLDSE, RCLOS)t END) Fig. 17. Unidirectional graceful closing (with error) of connection. E. Flow Control The XTP data, output is regulated... with the given service access point to the link layer and the given transport service access point for the session layer (create- context(tsap, lsap)). It also generates signal(e New context) for all the other FSMs of the XTP. When a First packet is received...

  9. Design of the PSI connection processor for the Xpress transfer protocol

    E-Print Network [OSTI]

    Brudeseth, Rolf

    1994-01-01T23:59:59.000Z

    is retransrrrittcd data should uot preclude it frour checking whether tire remote application also has lost any data. It should not be the responsibility of the Input State Mact&inc Lo execute thc retcasecontezt. function. The state machine should signal the Wr&tc...

  10. Analysis and behavioral modeling of the Finite State Machines of the Xpress Transfer Protocol

    E-Print Network [OSTI]

    Madduri, Venkateswara Rao

    1994-01-01T23:59:59.000Z

    OF THE 3. 4 SPECIFICATION OF THE XTP FINITE STATE MACHINES . A. XTP Context Manager State Machine B. XTP Output State Machine C. XTP Sync State Machine. D. XTP Rate Control State Machine E. XTP Control-Send State Machine. . . F. XTP Input State... control parameters 26 II XTP context manager state transition table[12]. III XTP output state machine transition table [12]. IV XTP sync state machine transition table[12]. 40 V XTP rate control state machine transition table[12]. VI XTP control...

  11. An ObjectOriented Implementation of the Xpress Transfer Protocol 1

    E-Print Network [OSTI]

    Strayer, William Timothy

    , and CRADA No. 1136 between Sandia National Laboratories and AT&T Bell Labs. #12; This paper discusses

  12. An Object-Oriented Implementation of the Xpress Transfer Protocol1

    E-Print Network [OSTI]

    Strayer, William Timothy

    , and CRADA No. 1 136 between Sandia National Laboratories and AT&T Bell Labs. #12;This paper discusses

  13. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  14. File:03ORENoncompetitiveGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File history File

  15. Three Dimensional Radiative Transfer

    E-Print Network [OSTI]

    Tom Abel

    2000-05-09T23:59:59.000Z

    Radiative Transfer (RT) effects play a crucial role in the thermal history of the intergalactic medium. Here I discuss recent advances in the development of numerical methods that introduce RT to cosmological hydrodynamics. These methods can also readily be applied to time dependent problems on interstellar and galactic scales.

  16. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  17. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  18. CARTOGRAPHIC BASE FILES AT LAWRENCE BERKELEY LABORATORY: 1978. INVENTORY

    E-Print Network [OSTI]

    Burkhart, B.R.

    2011-01-01T23:59:59.000Z

    BERKELEY LABORATORY: 1978 INVENTORY f(ECEfVED tAWRENCE!FILES AT LAWRENCE BERKELEY LABORATORY: 1978 INVENTORY B. R.1979 ABSTRACT This inventory describes the cartographic base

  19. Scalable Parallel File System for Data and Metadata-intensive...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Host: Rob Ross A critical purpose for parallel file systems used in high performance computing is to capture quickly and durably hold checkpoints of long running massive...

  20. File:03ORCEncroachment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File history File usage File:03ORCEncroachment.pdf

  1. Urban Sewage Delivery Heat Transfer System (2): Heat Transfer

    E-Print Network [OSTI]

    Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

    2006-01-01T23:59:59.000Z

    The thimble delivery heat-transfer (TDHT) system is one of the primary modes to utilize the energy of urban sewage. Using the efficiency-number of transfer units method ( ), the heat-transfer efficiencies of the parallel-flow and reverse-flow TDTH...

  2. Urban Sewage Delivery Heat Transfer System (2): Heat Transfer

    E-Print Network [OSTI]

    Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

    2006-01-01T23:59:59.000Z

    The thimble delivery heat-transfer (TDHT) system is one of the primary modes to utilize the energy of urban sewage. Using the efficiency-number of transfer units method ( ), the heat-transfer efficiencies of the parallel-flow and reverse-flow TDTH...

  3. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Hanson, Steven CJ

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  4. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    SciTech Connect (OSTI)

    Hanson, Steven CJ

    2013-03-07T23:59:59.000Z

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  5. Faculty Positions Heat Transfer and

    E-Print Network [OSTI]

    Faculty Positions Heat Transfer and Thermal/Energy Sciences Naval Postgraduate School Monterey-track faculty position at the assistant professor level in the areas of Heat Transfer and Thermal/Fluid Sciences

  6. QER- Comment of Energy Transfer

    Broader source: Energy.gov [DOE]

    From: Lee Hanse Executive Vice President Interstate Energy Transfer Mobile - 210 464 2929 Office - 210 403 6455

  7. Plastic container bagless transfer

    DOE Patents [OSTI]

    Tibrea, Steven L.; D'Amelio, Joseph A.; Daugherty, Brent A.

    2003-11-18T23:59:59.000Z

    A process and apparatus are provided for transferring material from an isolated environment into a storage carrier through a conduit that can be sealed with a plug. The plug and conduit can then be severed to provide a hermetically sealed storage carrier containing the material which may be transported for storage or disposal and to maintain a seal between the isolated environment and the ambient environment.

  8. Mass transfer andMass transfer and Mass transfer andMass transfer and

    E-Print Network [OSTI]

    Zevenhoven, Ron

    't be determined A correlation for Sherwood number (Sh) based on di i l l i b d l i Sh diff idimensional analysis for mass transfer with convection: I l f d fl d b (l b l ) Internal forced flow: inside a tube (laminar A in fluid medium B in a flow with characteristic velocity and size characteristic d: kA = f(d, w, (= fluid

  9. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  10. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  11. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  12. 3.0 Exporting Models Save model as OBJ file

    E-Print Network [OSTI]

    Gordon, Scott

    3.0 Exporting Models Save model as OBJ file: o Make sure that the model, and the UV-unwrapping, are open and displayed. o File Export wavefront.obj o Navigate to desired directory (remember that single RETURN to accept the name (or use the Export Wavefront button in the upper right) o Click on the Export

  13. Energy Efficient Prefetching with Buffer Disks for Cluster File Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

  14. Harvard Library: FY2011 Volumes, Records, Titles, and Digital Files

    E-Print Network [OSTI]

    Harvard Library: FY2011 Volumes, Records, Titles, and Digital Files Total Expenditures *Digital Millions Fiscal Year Volumes Bibliographic Records Titles Files in DRS* $0 $10 $20 $30 $40 $50 $60 $70 $80 a coordinated management structure and increasingly focus resources on the opportunities presented by new

  15. DOCTORAL STUDENTS FILING CHECKLIST Consider Your Dissertation Content

    E-Print Network [OSTI]

    Jacobs, Lucia

    DOCTORAL STUDENTS FILING CHECKLIST Consider Your Dissertation Content Does your dissertation before you file. PLAN AHEAD! Check Your Committee Log in to GLOW and verify your dissertation committee-3 business days for your dissertation to be reviewed. Be patient! Complete the Additional Forms o Survey

  16. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEuropeStrat.pdf Jump to: navigation, search File

  17. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) HarmonicbetandEnergy 2010 A selectionFile Storage and

  18. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid Turner David3Depth ProfilefromRefinement |File

  19. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation,Size of this preview:File EditSW NOI

  20. File:Coordination.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation,Size of this preview:File EditSW NOICoordination.pdf Jump

  1. Transportation and Energy Use Data Files

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota"YearProductionShaleInput Product:InputData Files

  2. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution AndControllingCool MagneticCoos BayCore File Settings

  3. Single File Line, Please! | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz9Morgan McCorkleSingin' in the Rain NewsSingle File

  4. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:Power LPInformationCashtonGo Back to PVMagnetotellurics asFiles

  5. Franklin File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget(DANCE) TargetForms &FrancisEmailFile storage

  6. Storing files in a parallel computing system based on user-specified parser function

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Manzanares, Adam; Torres, Aaron

    2014-10-21T23:59:59.000Z

    Techniques are provided for storing files in a parallel computing system based on a user-specified parser function. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a parser from the distributed application for processing the plurality of files prior to storage; and storing one or more of the plurality of files in one or more storage nodes of the parallel computing system based on the processing by the parser. The plurality of files comprise one or more of a plurality of complete files and a plurality of sub-files. The parser can optionally store only those files that satisfy one or more semantic requirements of the parser. The parser can also extract metadata from one or more of the files and the extracted metadata can be stored with one or more of the plurality of files and used for searching for files.

  7. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  8. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  9. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  10. U.S. Geological Survey Open-File Report 02328 Geological Survey of Canada Open File 4350

    E-Print Network [OSTI]

    Goldfinger, Chris

    U.S. Geological Survey Open-File Report 02­328 Geological Survey of Canada Open File 4350 August, University of Victoria, P.O. Box 3055, STN CSC, Victoria, BC, V8W 3P6, Canada #12;ISBN: 0 of Canada and the University of Victoria. This meeting was held at the University of Victoria's Dunsmuir

  11. An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model

    E-Print Network [OSTI]

    C. Erven; Nelly Huei Ying Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

    2014-05-18T23:59:59.000Z

    Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

  12. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  13. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  14. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  15. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  16. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  17. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  18. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  19. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  20. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  1. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  2. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  3. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  4. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  5. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  6. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  7. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  8. Wireless Power Transfer

    ScienceCinema (OSTI)

    None

    2013-11-19T23:59:59.000Z

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  9. Wireless Power Transfer

    SciTech Connect (OSTI)

    None

    2013-07-22T23:59:59.000Z

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  10. Manipulator mounted transfer platform

    DOE Patents [OSTI]

    Dobbins, James C. (Idaho Falls, ID); Hoover, Mark A. (Idaho Falls, ID); May, Kay W. (Idaho Falls, ID); Ross, Maurice J. (Pocatello, ID)

    1990-01-01T23:59:59.000Z

    A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

  11. Data Transfer and Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDanielDTN Data Transfer Nodes

  12. Technology Transfer Reporting Form

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy-Technology TransferThis

  13. 11. Working with files in Rhythmyx Lee Bryant v1.3 | 18/06/10

    E-Print Network [OSTI]

    Doran, Simon J.

    11. Working with files in Rhythmyx Lee Bryant v1.3 | 18/06/10 Part One: Uploading a file Lee Bryant v1.3 Part Two: Inserting a link to a file on a page Objectives To insert a link to the file

  14. File system, SaveRestore and Sequencer for LINAC2, DESY2, PETRA3 and FLASH,

    E-Print Network [OSTI]

    File system, SaveRestore and Sequencer for LINAC2, DESY2, PETRA3 and FLASH, a status report Jrgen 4 #12;Basic principle of "Machine file system" disk save rings linacs `set points' `read-back' values position Quads position Beam etc. machine file restore More features: compare: between file

  15. DATA META FILE 2004 This file describes the instrumentation, field setup, and quality control procedures

    E-Print Network [OSTI]

    Minnesota, University of

    and analyses were supported by the Office of Science (BER), U.S. Department of Energy, Grant No. DE-FG02-03ER - - - 2 DOY - - - 3 DDOY - - - 4 Time (hour/minute) - - - 5 Solar radiation (K) W/m2 Eppley PSP 3.7 m 6 be approximated from the incoming global solar radiation signal by dividing by a factor of 2.1. Data Files

  16. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  17. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  18. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  19. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  20. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  1. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  2. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  3. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  4. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  5. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  6. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Michael Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  7. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  8. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  9. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    hop wireless adhoc networks, designing energyefficient rout ing protocols is critical since nodes are power be mobile, demanding the energyefficient routing protocol to be fully distributed and adaptive spect to endtoend energyefficient routes. Finally, preliminary simulation results are presented

  10. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  11. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  12. Comparison of leading parallel NAS file systems on commodity hardware

    SciTech Connect (OSTI)

    Hedges, R; Fitzgerald, K; Gary, M; Stearman, D M

    2010-11-08T23:59:59.000Z

    High performance computing has experienced tremendous gains in system performance over the past 20 years. Unfortunately other system capabilities, such as file I/O, have not grown commensurately. In this activity, we present the results of our tests of two leading file systems (GPFS and Lustre) on the same physical hardware. This hardware is the standard commodity storage solution in use at LLNL and, while much smaller in size, is intended to enable us to learn about differences between the two systems in terms of performance, ease of use and resilience. This work represents the first hardware consistent study of the two leading file systems that the authors are aware of.

  13. File:01WAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual1WAALandUsePlanning.pdf Jump to: navigation, search File File history File usage

  14. File:02SiteConsiderations (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual1WAALandUsePlanning.pdf Jump to: navigation, search File File history File

  15. File:03TXAStateGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File history File3TXAStateGeothermalLease.pdf Jump

  16. File:03TXBLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File history File3TXAStateGeothermalLease.pdf

  17. File:06UTATransportation.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf JumpUTATransportation.pdf Jump to: navigation, search File File history File usage

  18. File:06UTBStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf JumpUTATransportation.pdf Jump to: navigation, search File File history File

  19. File:NREL-asia-dir.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to:ar-80m.pdf Jump to: navigation, search File File history File

  20. Technology transfer | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technology transfer Technology Development and Commercialization at Argonne Read more about Technology Development and Commercialization at Argonne New Director to lead Technology...

  1. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  2. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  3. Technology transfer 1995

    SciTech Connect (OSTI)

    Not Available

    1995-01-01T23:59:59.000Z

    Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

  4. Heat transfer probe

    DOE Patents [OSTI]

    Frank, Jeffrey I.; Rosengart, Axel J.; Kasza, Ken; Yu, Wenhua; Chien, Tai-Hsin; Franklin, Jeff

    2006-10-10T23:59:59.000Z

    Apparatuses, systems, methods, and computer code for, among other things, monitoring the health of samples such as the brain while providing local cooling or heating. A representative device is a heat transfer probe, which includes an inner channel, a tip, a concentric outer channel, a first temperature sensor, and a second temperature sensor. The inner channel is configured to transport working fluid from an inner inlet to an inner outlet. The tip is configured to receive at least a portion of the working fluid from the inner outlet. The concentric outer channel is configured to transport the working fluid from the inner outlet to an outer outlet. The first temperature sensor is coupled to the tip, and the second temperature sensor spaced apart from the first temperature sensor.

  5. General Relativistic Radiative Transfer

    E-Print Network [OSTI]

    S. Knop; P. H. Hauschildt; E. Baron

    2006-11-30T23:59:59.000Z

    We present a general method to calculate radiative transfer including scattering in the continuum as well as in lines in spherically symmetric systems that are influenced by the effects of general relativity (GR). We utilize a comoving wavelength ansatz that allows to resolve spectral lines throughout the atmosphere. The used numerical solution is an operator splitting (OS) technique that uses a characteristic formal solution. The bending of photon paths and the wavelength shifts due to the effects of GR are fully taken into account, as is the treatment of image generation in a curved spacetime. We describe the algorithm we use and demonstrate the effects of GR on the radiative transport of a two level atom line in a neutron star like atmosphere for various combinations of continuous and line scattering coefficients. In addition, we present grey continuum models and discuss the effects of different scattering albedos on the emergent spectra and the determination of effective temperatures and radii of neutron star atmospheres.

  6. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  7. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  8. APPLICATION FOR ASSISTANCE EE File xxx STAFF TRAINING & DEVELOPMENT FUND

    E-Print Network [OSTI]

    Martin, Jeff

    APPLICATION FOR ASSISTANCE EE File xxx STAFF TRAINING & DEVELOPMENT FUND Program Information debited account number and amount). Employee Name: ______________________________________ Group: AESES xxx / IUOE xxx / CMP xxx Department: __________________________________________ Dept. Account

  9. APPLICATION FOR ASSISTANCE EE File xxx STAFF TRAINING & DEVELOPMENT FUND

    E-Print Network [OSTI]

    Martin, Jeff

    APPLICATION FOR ASSISTANCE EE File xxx STAFF TRAINING & DEVELOPMENT FUND Program Information Information Employee Name: __________________________________ Group: AESES xxx / IUOE xxx / CMP xxx Department: ______________________________________ Program Type: Seminar xxx / Webinar xxx / Workshop xxx / Conference xxx / Non-Credit Course xxx

  10. Deploying Server-side File System Monitoring at NERSC

    E-Print Network [OSTI]

    Uselton, Andrew

    2009-01-01T23:59:59.000Z

    Deploying Server-side File System Monitoring at NERSC Andrewcenter was equipped with the server-side I/O monitoringfor observing and recording server-side per- formance

  11. An evaluated neutronic data file for elemental cobalt

    SciTech Connect (OSTI)

    Guenther, P.; Lawson, R.; Meadows, J.; Sugimoto, M.; Smith, A.; Smith, D.; Howerton, R.

    1988-08-01T23:59:59.000Z

    A comprehensive evaluated neutronic data file for elemental cobalt is described. The experimental data base, the calculational methods, the evaluation techniques and judgments, and the physical content are outlined. The file contains: neutron total and scattering cross sections and associated properties, (n,2n) and (n,3n) processes, neutron radiative capture processes, charged-particle-emission processes, and photon-production processes. The file extends from 10/sup /minus/5/ eV to 20 MeV, and is presented in the ENDF/B-VI format. Detailed attention is given to the uncertainties and correlations associated with the prominent neutron-induced processes. The numerical contents of the file have been transmitted to the National Nuclear Data Center, Brookhaven National Laboratory. 143 refs., 16 figs., 5 tabs.

  12. administrative files collection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resources - Use of Peer-to-Peer File Sharing Software Page 1 of 3 Software Approved October 24, 2006 Revised April 27, 2010 Revised February 10, 2012 Revised August 14, 2013...

  13. File:TCEQ Map.pdf | Open Energy Information

    Open Energy Info (EERE)

    to view the file as it appeared at that time. DateTime Thumbnail Dimensions User Comment current 09:11, 10 July 2013 Thumbnail for version as of 09:11, 10 July 2013 1,275 ...

  14. Proposed database model and file structures for arthropod collection management

    E-Print Network [OSTI]

    Mathis, Wayne N.

    Proposed database model and file structures for arthropod collection management Ronald A for taxonomic analysis or behavioral, physiological, and ecological information. The database model described how specific computerization projects can be related to each other. The proposed database model

  15. COMPUTER APPLICATIONS IN THE GEOSCIENCES For this lab, you will practice editing image files in Adobe Photoshop and construct a

    E-Print Network [OSTI]

    Smith-Konter, Bridget

    "Save Target As" (PCs) or "Save Image As" (Macs). Save the file to your Lab3 folder on \\\\geobase a different editing technique and save to a different file type (ex., .jpg, .ps, .tiff, .pdf,) . Image 1 it to the appropriate location. Save your image as a jPEG file. Go to File Save As. Name your file Image_1

  16. File:03UTBStateEasementProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File

  17. Federating LHCb datasets using the DIRAC File catalog

    E-Print Network [OSTI]

    Haen, Christophe; Frank, Markus; Tsaregorodtsev, Andrei

    2015-01-01T23:59:59.000Z

    In the distributed computing model of LHCb the File Catalog (FC) is a central component that keeps track of each file and replica stored on the Grid. It is federating the LHCb data files in a logical namespace used by all LHCb applications. As a replica catalog, it is used for brokering jobs to sites where their input data is meant to be present, but also by jobs for finding alternative replicas if necessary. The LCG File Catalog (LFC) used originally by LHCb and other experiments is now being retired and needs to be replaced. The DIRAC File Catalog (DFC) was developed within the framework of the DIRAC Project and presented during CHEP 2012. From the technical point of view, the code powering the DFC follows an Aspect oriented programming (AOP): each type of entity that is manipulated by the DFC (Users, Files, Replicas, etc) is treated as a separate 'concern' in the AOP terminology. Hence, the database schema can also be adapted to the needs of a Virtual Organization. LHCb opted for a highly tuned MySQL datab...

  18. WeatherMaker: Weather file conversion and evaluation

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1999-07-01T23:59:59.000Z

    WeatherMaker is a weather-data utility for use with the ENERGY-10 design-tool computer program. The three main features are: Convert--Weather files can be converted from one format to another. For example, a TMY2 format file can be converted to an ENERGY-10 binary file that can be used in a simulation. This binary file can then be converted to a text format that allows it to be read and/or manipulated in WordPad or Excel. Evaluate--ENERGY-10 weather files can be studied in great detail. There are 8 graphical displays of the data that provide insight into the data, and a summary tables that presents results calculated from the hourly data. Adjust--Hourly temperature data can be adjusted starting with hourly data from a nearby TMY2 site. Dry-bulb and wet-bulb temperatures are adjusted up or down as required to match given monthly statistics. This feature can be used to generate weather files for any of 3,958 sites in the US where such monthly statistics are tabulated. The paper shows a variety of results, explains the methods used, and discusses the rationale for making the adjustments. It is anticipated that WeatherMaker will be released by the time of the ASES Solar 99 conference.

  19. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  20. Proton-Coupled Electron Transfer

    SciTech Connect (OSTI)

    Weinberg, Dave; Gagliardi, Christopher J.; Hull, Jonathan F; Murphy, Christine Fecenko; Kent, Caleb A.; Westlake, Brittany C.; Paul, Amit; Ess, Daniel H; McCafferty, Dewey Granville; Meyer, Thomas J

    2012-01-01T23:59:59.000Z

    Proton-Coupled Electron Transfer (PCET) describes reactions in which there is a change in both electron and proton content between reactants and products. It originates from the influence of changes in electron content on acid?base properties and provides a molecular-level basis for energy transduction between proton transfer and electron transfer. Coupled electron?proton transfer or EPT is defined as an elementary step in which electrons and protons transfer from different orbitals on the donor to different orbitals on the acceptor. There is (usually) a clear distinction between EPT and H-atom transfer (HAT) or hydride transfer, in which the transferring electrons and proton come from the same bond. Hybrid mechanisms exist in which the elementary steps are different for the reaction partners. EPT pathways such as PhO/PhOH exchange have much in common with HAT pathways in that electronic coupling is significant, comparable to the reorganization energy with H{sub DA} ~ ?. Multiple-Site Electron?Proton Transfer (MS-EPT) is an elementary step in which an electron?proton donor transfers electrons and protons to different acceptors, or an electron?proton acceptor accepts electrons and protons from different donors. It exploits the long-range nature of electron transfer while providing for the short-range nature of proton transfer. A variety of EPT pathways exist, creating a taxonomy based on what is transferred, e.g., 1e{sup -}/2H{sup +} MS-EPT. PCET achieves redox potential leveling between sequential couples and the buildup of multiple redox equivalents, which is of importance in multielectron catalysis. There are many examples of PCET and pH-dependent redox behavior in metal complexes, in organic and biological molecules, in excited states, and on surfaces. Changes in pH can be used to induce electron transfer through films and over long distances in molecules. Changes in pH, induced by local electron transfer, create pH gradients and a driving force for long-range proton transfer in Photosysem II and through other biological membranes. In EPT, simultaneous transfer of electrons and protons occurs on time scales short compared to the periods of coupled vibrations and solvent modes. A theory for EPT has been developed which rationalizes rate constants and activation barriers, includes temperature- and driving force (?G)-dependences implicitly, and explains kinetic isotope effects. The distance-dependence of EPT is dominated by the short-range nature of proton transfer, with electron transfer being far less demanding.Changes in external pH do not affect an EPT elementary step. Solvent molecules or buffer components can act as proton donor acceptors, but individual H2O molecules are neither good bases (pK{sub a}(H{sub 3}O{sup +}) = ?1.74) nor good acids (pK{sub a}(H{sub 2}O) = 15.7). There are many examples of mechanisms in chemistry, in biology, on surfaces, and in the gas phase which utilize EPT. PCET and EPT play critical roles in the oxygen evolving complex (OEC) of Photosystem II and other biological reactions by decreasing driving force and avoiding high-energy intermediates.

  1. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  2. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  3. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  4. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  5. adoptively transferred indium-111: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Afshin J. 140 Mass transfer andMass transfer and Mass transfer andMass transfer and Fossil Fuels Websites Summary: eknik Mass transfer andMass transfer and arationste Mass...

  6. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  7. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  8. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muoz, Francesc

    and Francesc D. Mu~noz-Escoi Instituto Tecnologico de Informatica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  9. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  11. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  12. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  13. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  14. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  15. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  16. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  17. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  18. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  19. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  20. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  1. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  2. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  3. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  4. Technology Transfer for Brownfields Redevelopment Project | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Technology Transfer for Brownfields Redevelopment Project Technology Transfer for Brownfields Redevelopment Project The U.S. Department of Energy has provided six computers to...

  5. Knowledge Capture and Transfer Program

    Broader source: Energy.gov [DOE]

    The Office of Learning and Workforce Development is working with Heads of Departmental Elements, DOE senior leaders and subject-matter-experts to capture and transfer the knowledge and experiences...

  6. Preparing for Transfer Biological Engineering

    E-Print Network [OSTI]

    Walter, M.Todd

    Environmental Engineering Game Design Industrial Systems & Information Technology Information Science MaterialsPreparing for Transfer Majors: Biological Engineering Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering

  7. Spring 2014 Heat Transfer -2

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 Heat Transfer - 2 A thin electronic chip is in the shape of a square wafer, b = 1 cm surface of the chip with a heat transfer coefficient of h = 100 W/m2 -K. Assume the chip has a uniform per side with a mass of m = 0.3 grams and specific heat of C = 103 J/kg-K. The chip is mounted

  8. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  9. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  10. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  11. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  12. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  13. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  14. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  15. January 9, 2014 10:13 WSPC/INSTRUCTION FILE ppl-benoit Parallel Processing Letters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    January 9, 2014 10:13 WSPC/INSTRUCTION FILE ppl-benoit Parallel Processing Letters c World (2013)" DOI : 10.1142/S0129626413400033 #12;January 9, 2014 10:13 WSPC/INSTRUCTION FILE ppl-benoit 2

  16. June 11, 2010 12:24 WSPC/INSTRUCTION FILE PPL Parallel Processing Letters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    June 11, 2010 12:24 WSPC/INSTRUCTION FILE PPL Parallel Processing Letters c World Scientific Processing Letters 20, 4 (2010) 307-324" #12;June 11, 2010 12:24 WSPC/INSTRUCTION FILE PPL 2 Parallel

  17. TABLEFS: Embedding a NoSQL Database Inside the Local File System

    E-Print Network [OSTI]

    monolithic database management system (DBMS) bundles [31]. 1 Background Even in the era of big data, most local file systems [34]. Embedded Databases File system metadata is structured data, a natural fit

  18. Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0

    SciTech Connect (OSTI)

    Stoller-Navarro Joint Venture

    2004-06-24T23:59:59.000Z

    This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

  19. A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features

    E-Print Network [OSTI]

    Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

    2014-09-06T23:59:59.000Z

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  20. Western Blot Protocol-de Lange Lab Western Blot Protocol (updated on 05/20/14)

    E-Print Network [OSTI]

    de Lange, Titia

    :10 with MillliQ water. Adjust pH to 8.3 (should be close) 10x Transfer Buffer Stock (1L) 30.3 g Tris Base 144 g) BioMax XAR Film (KODAK) Laemmli Sample Buffer Cell Extracts Cells can be directly lysed into 2x Laemmli Sample buffer (v.1 or v.2) as follows (not for ubiquitination): 1. Harvest cells by trypsinization

  1. Aquatic Toxicity Information Retrieval Data Base (ACQUIRE). Data file

    SciTech Connect (OSTI)

    Not Available

    1991-09-01T23:59:59.000Z

    The purpose of Acquire is to provide scientists and managers quick access to a comprehensive, systematic, computerized compilation of aquatic toxicity data. Scientific papers published both nationally and internationally on the toxicity of chemicals to aquatic organisms and plants are collected and reviewed for ACQUIRE. Independently compiled data files that meet ACQUIRE parameter and quality assurance criteria are also included. Selected toxicity test results and related testing information for any individual chemical from laboratory and field aquatic toxicity effects are included for tests with freshwater and marine organisms. The total number of data records in ACQUIRE is now over 105,300. This includes data from 6000 references, for 5200 chemicals and 2400 test species. A major data file, Acute Toxicity of Organic Chemicals (ATOC), has been incorporated into ACQUIRE. The ATOC file contains laboratory acute test data on 525 organic chemicals using juvenile fathead minnows.

  2. Nanoscale heat transfer - from computation to experiment

    E-Print Network [OSTI]

    Luo, Tengfei

    2013-04-09T23:59:59.000Z

    Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

  3. Inventory Routing and On-line Inventory Routing File Format M. Sevaux1,2

    E-Print Network [OSTI]

    Brest, Université de

    Inventory Routing and On-line Inventory Routing File Format M. Sevaux1,2 M. J. Geiger1 1 Helmut needs in the Inventory Routing Problem types. Instead of creating a new file format or putting ASCII is an extension of the TSPLIB file format description proposed in [1] to be used for the Inventory Routing Problem

  4. Calibration File Manager Morgan Burke Ver. 2.2 1993 Oct 1

    E-Print Network [OSTI]

    CFM Calibration File Manager Morgan Burke Ver. 2.2 1993 Oct 1 1. Introduction What is CFM? CFM, short for Calibration File Manager, is a relational database developed by Brookhaven Experiment 787 to keep track of large numbers of data files containing calibration and related information for a high

  5. Understanding Pollution Dynamics in P2P File Sharing , Junghoo Cho

    E-Print Network [OSTI]

    Cho, Junghoo "John"

    Understanding Pollution Dynamics in P2P File Sharing Uichin Lee , Min Choi , Junghoo Cho , M. Y,cho,medy,gerla}@cs.ucla.edu, min@kaist.ac.kr ABSTRACT Pollution in P2P file sharing occurs when a large number of decoy files that pollution dynamics are closely related to user behavior. Therefore, we first conduct a human subject study

  6. Canister Transfer System Description Document

    SciTech Connect (OSTI)

    NONE

    2000-10-12T23:59:59.000Z

    The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane/hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

  7. CANISTER TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-23T23:59:59.000Z

    The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

  8. Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer

    SciTech Connect (OSTI)

    David Hamilton

    2004-12-31T23:59:59.000Z

    The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

  9. EVALUATED NUCLEAR STRUCTURE DATA FILE AND RELATED PRODUCTS.

    SciTech Connect (OSTI)

    TULI,J.K.

    2004-09-26T23:59:59.000Z

    The Evaluated Nuclear Structure Data File (ENSDF) is a leading resource for the experimental nuclear data. It is maintained and distributed by the National Nuclear Data Center, Brookhaven National Laboratory. The file is mainly contributed to by an international network of evaluators under the auspice of the International Atomic Energy Agency. The ENSDF is updated, generally by mass number, i.e., evaluating together all isobars for a given mass number. If, however, experimental activity in an isobaric chain is limited to a particular nuclide then only that nuclide is updated. The evaluations are published in the journal Nuclear Data Sheets, Academic Press, a division of Elsevier.

  10. Deploying Server-side File System Monitoring at NERSC

    SciTech Connect (OSTI)

    Uselton, Andrew

    2009-05-01T23:59:59.000Z

    The Franklin Cray XT4 at the NERSC center was equipped with the server-side I/O monitoring infrastructure Cerebro/LMT, which is described here in detail. Insights gained from the data produced include a better understanding of instantaneous data rates during file system testing, file system behavior during regular production time, and long-term average behaviors. Information and insights gleaned from this monitoring support efforts to proactively manage the I/O infrastructure on Franklin. A simple model for I/O transactions is introduced and compared with the 250 million observations sent to the LMT database from August 2008 to February 2009.

  11. File:LongValley Strat.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEuropeStrat.pdf Jump to: navigation, search File File history

  12. File:MacGyver windmills.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEuropeStrat.pdf Jump to: navigation, search File File

  13. File:03IDELicenseAgreement.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual1WAALandUsePlanning.pdfIDELicenseAgreement.pdf Jump to: navigation, search File File

  14. File:03UTCStateEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to: navigation, search File File3UTCStateEncroachmentOverview.pdf Jump to:

  15. File:05NVBSundryNotice (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to:-FD-a -NVBSundryNotice (2).pdf Jump to: navigation, search File File

  16. File:06IDCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf Jump to:-FD-aIDCDrinkingWaterPermit.pdf Jump to: navigation, search File File

  17. File:06UTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf JumpUTATransportation.pdf Jump to: navigation, search File File history

  18. File:0708pmtgpres.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf JumpUTATransportation.pdf Jump to: navigation, search File File

  19. File:08FDCNIETCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File historyFDCNIETCProcess.pdf Jump to:

  20. File:08HIABulkTransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File historyFDCNIETCProcess.pdf Jump

  1. File:08HIATransmissionLineApproval.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File historyFDCNIETCProcess.pdf

  2. File:08IDAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File

  3. File:08MTATransmission (3).pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File08MTATransmission (3).pdf Jump to:

  4. File:08NVATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File08MTATransmission (3).pdf Jump

  5. File:08TXATransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation, search File File08MTATransmission

  6. File:EIA-MTB-GAS.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to: navigation,Size ofMTB-GAS.pdf Jump to: navigation, search File File

  7. File:NREL-asia-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to:ar-80m.pdf Jump to: navigation, search File File history

  8. File:NREL-asia-tilt.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to:ar-80m.pdf Jump to: navigation, search File File historytilt.pdf Jump

  9. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to:ar-80m.pdf Jump to: navigation, search File File

  10. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01T23:59:59.000Z

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  11. Journal of Heat Transfer1999 JHT Heat Transfer Gallery Department of Mechanical 8. Aerospace Engineering

    E-Print Network [OSTI]

    Kihm, IconKenneth David

    Journal of Heat Transfer1999 JHT Heat Transfer Gallery S. M. You Department of Mechanical 8 Transfer Visualization Committee organized two photo gallery sessions in 1998. The International Heat Transfer Photo Gallery was held at the l la' International Heat Transfer Conference (IHTC) in Kyongju

  12. Shear Transformation Zones: State Determined or Protocol Dependent?

    E-Print Network [OSTI]

    Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

    2014-08-18T23:59:59.000Z

    The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

  13. Streaming multimedia over WMSNs: an online multipath routing protocol

    E-Print Network [OSTI]

    Medjiah, Samir; Asgari, Abolghasem Hamid

    2012-01-01T23:59:59.000Z

    Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.

  14. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  15. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  16. Protocol development for evaluation of commercial catalytic cracking catalysts

    SciTech Connect (OSTI)

    Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

    1988-09-01T23:59:59.000Z

    A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

  17. Radiative transfer in molecular lines

    E-Print Network [OSTI]

    A. Asensio Ramos; J. Trujillo Bueno; J. Cernicharo

    2001-02-15T23:59:59.000Z

    The highly convergent iterative methods developed by Trujillo Bueno and Fabiani Bendicho (1995) for radiative transfer (RT) applications are generalized to spherical symmetry with velocity fields. These RT methods are based on Jacobi, Gauss-Seidel (GS), and SOR iteration and they form the basis of a new NLTE multilevel transfer code for atomic and molecular lines. The benchmark tests carried out so far are presented and discussed. The main aim is to develop a number of powerful RT tools for the theoretical interpretation of molecular spectra.

  18. Energy Transfer | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energyof 2005 at Iowa WindUnion7Transfer Energy Transfer Below

  19. Sun's Network File System (NFS) One of the first uses of distributed client/server computing was

    E-Print Network [OSTI]

    Sheridan, Jennifer

    34 Sun's Network File System (NFS) One of the first uses of distributed client/server computing of data across clients. Thus, if 1 #12;2 SUN'S NETWORK FILE SYSTEM (NFS) you access a file on one machine-DUSSEAU #12;SUN'S NETWORK FILE SYSTEM (NFS) 3 even; in the best such case, no network traffic need be gener

  20. Exhibit 7 Filing of Patent Applications Classified Subject Matter UT-B Contracts Div ex7-july10.doc

    E-Print Network [OSTI]

    Pennycook, Steve

    Exhibit 7 Filing of Patent Applications Classified Subject Matter UT-B Contracts Div July 2010 Page 1 of ex7-july10.doc Exhibit 7 Ref: FAR 52.227-10 (Dec 2007) FILING OF PATENT APPLICATIONS - CLASSIFIED SUBJECT MATTER (July 2010) (a) Before filing or causing to be filed a patent application

  1. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  2. January 2001 Open File Report 2001-0027 O

    E-Print Network [OSTI]

    Patterson, William P.

    January 2001 Open File Report 2001-0027 O DESKTOP DATABASE COMPILATION OF SACS UNIT INFORMATION, 2001). Acknowledgements for use of this database should refer to the "SACS database compilation prepared by the Council for Geoscience, Pretoria; as documented by Eglington et al. (2001)". This open

  3. Filing Holes in Complex Surfaces Using Volumetric Diffusion

    E-Print Network [OSTI]

    Kazhdan, Michael

    Method for Building Complex Models From range Images, '96) Applies line of sight constraints based components Complex hole geometry Construction of an arbitrary mesh can result in non-manifold surfaceFiling Holes in Complex Surfaces Using Volumetric Diffusion J. Davis, S. Marschner, M. Garr and M

  4. Population Files for use with CAP88 at Los Alamos

    SciTech Connect (OSTI)

    McNaughton, Michael W [Los Alamos National Laboratory; Brock, Burgandy R [Los Alamos National Laboratory

    2012-07-10T23:59:59.000Z

    CAP88 (Clean Air Act Assessment Package 1988) is a computer model developed for the US Environmental Protection Agency to assess the potential dose from radionuclide emissions to air and to demonstrate compliance with the Clean Air Act. It has options to calculate either individual doses, in units of mrem, or a collective dose, also called population dose, in units of person-rem. To calculate the collective dose, CAP88 uses a population file such as LANL.pop, that lists the number of people in each sector (N, NNE, NE, etc.) as a function of distance (1 to 2 km, etc.) out to a maximum radius of 80 km. Early population files are described in the Los Alamos National Laboratory (LANL) Environmental Reports for 1985 (page 14) and subsequent years. LA-13469-MS describes a population file based on the 1990 census. These files have been updated several times, most recently in 2006 for CAP88 version 3. The 2006 version used the US census for 2000. The present paper describes the 2012 updates, using the 2010 census.

  5. Efficient Private File Retrieval by Combining ORAM and PIR

    E-Print Network [OSTI]

    Efficient Private File Retrieval by Combining ORAM and PIR Travis Mayberry Erik-Oliver Blass Agnes ORAMs which have worst-case communication complexity linear in their capacity and block size. PIR on the server. This paper presents Path-PIR, a hybrid ORAM construction, using techniques from PIR

  6. Ubiquitous Media Agents for Managing Personal Multimedia Files

    E-Print Network [OSTI]

    Liu, Wenyin

    1 Ubiquitous Media Agents for Managing Personal Multimedia Files Liu Wenyin, Zheng Chen, Fan Lin personalized semantic indices of multimedia data on behalf of the user whenever and wherever he/she accesses/uses these multimedia data. The sources of these semantic descriptions are the textual context of the same documents

  7. TIGER:Thermal-Aware File Assignment in Storage Clusters

    E-Print Network [OSTI]

    Qin, Xiao

    energy efficiency of data centers housing storage clusters. Disks have non-negligible thermal impactTIGER:Thermal-Aware File Assignment in Storage Clusters Ajit Chavan, Xunfei Jiang, Mohemmad I/O performance. I. INTRODUCTION Thermal management for power-dense storage clusters can address cooling problems

  8. Comparison-based File Server Verification Yuen-Lin Tan

    E-Print Network [OSTI]

    Comparison-based File Server Verification Yuen-Lin Tan , Terrence Wong, John D. Strunk, Gregory R. Ganger Carnegie Mellon University Abstract Comparison-based server verification involves testing a server by comparing its responses to those of a refer- ence server. An intermediary, called a "server Tee," in

  9. Truffles --Secure File Sharing With Minimal System Administrator Intervention

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Truffles -- Secure File Sharing With Minimal System Administrator Intervention Peter Reiher Thomas sharing between arbitrary users at arbitrary sites connected by a network. Truffles is an interesting the potential of greatly increasing the workload of system administrators, if the services are not designed

  10. Availability in the Sprite Distributed File System John Ousterhout

    E-Print Network [OSTI]

    Baker, Mary G.

    Availability in the Sprite Distributed File System Mary Baker John Ousterhout Computer Science faults means recovering from them quickly. Our position is that performance and availability server recovery is the most cost-effective way of providing such availability. Mechanisms used

  11. VAX/VMS file protection on the KSV VAXes

    SciTech Connect (OSTI)

    Not Available

    1989-03-01T23:59:59.000Z

    This manual is a guide to use of the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. KSV VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection.

  12. Harvard Library: FY2010 Volumes, Records, Titles, and Digital Files

    E-Print Network [OSTI]

    Harvard Library: FY2010 Volumes, Records, Titles, and Digital Files Total Expenditures *Digital Repository Service SOURCE: HARVARD LIBRARY OFFICE OF THE EXECUTIVE DIRECTOR 0.00 2.00 4.00 6.00 8.00 10.00 12 Collections Costs Staffing Costs Operations Harvard's library system now includes more than 70 separate

  13. Quality Assurance Procedures for ModCat Database Code Files

    SciTech Connect (OSTI)

    Siciliano, Edward R.; Devanathan, Ram; Guillen, Zoe C.; Kouzes, Richard T.; Schweppe, John E.

    2014-04-01T23:59:59.000Z

    The Quality Assurance procedures used for the initial phase of the Model Catalog Project were developed to attain two objectives, referred to as basic functionality and visualization. To ensure the Monte Carlo N-Particle model input files posted into the ModCat database meet those goals, all models considered as candidates for the database are tested, revised, and re-tested.

  14. Samples of Drug Testing Language Memorandum for Human Resources File

    E-Print Network [OSTI]

    Almor, Amit

    Samples of Drug Testing Language Memorandum for Human Resources File DATE: TO: Employee FROM: Supervisor RE: Drug Testing As you know, the position that you have been selected for requires that you pass a pre-employment drug and alcohol test. In addition to the pre-employment test, you will also be subject

  15. Decoherence problem in quantum state transfer via an engineered spin chain

    E-Print Network [OSTI]

    Lan Zhou; Jing Lu; Tao Shi; C. P. Sun

    2006-08-17T23:59:59.000Z

    A perfect quantum state transfer(QST) has been shown in an engineered spin chain with "always-on interaction". Here, we consider a more realistic problem for such a protocol, the quantum decoherence induced by a spatially distributed environment, which is universally modeled as a bath of harmonic oscillators. By making use of the irreducible tensor method in angular momentum theory, we investigate the effect of decoherence on the efficiency of QST for both cases at zero and finite temperatures. We not only show the generic exponential decay of QST efficiency as the number of sites increase, but also find some counterintuitive effect, the QST can be enhanced as temperature increase.

  16. Mass Transfer from Giant Donors

    E-Print Network [OSTI]

    Pavlovskii, K

    2014-01-01T23:59:59.000Z

    The stability of mass transfer in binaries with convective giant donors remains an open question in modern astrophysics. There is a significant discrepancy between what the existing methods predict for a response to mass loss of the giant itself, as well as for the mass transfer rate during the Roche lobe overflow. Here we show that the recombination energy in the superadiabatic layer plays an important and hitherto unaccounted-for role in he donor's response to mass loss, in particular on its luminosity and effective temperature. Our improved optically thick nozzle method to calculate the mass transfer rate via $L_1$ allows us to evolve binary systems for a substantial Roche lobe overflow. We propose a new, strengthened criterion for the mass transfer instability, basing it on whether the donor experiences overflow through its outer Lagrangian point. We find that with the new criterion, if the donor has a well-developed outer convective envelope, the critical initial mass ratio for which a binary would evolv...

  17. Spring 2014 Heat Transfer -1

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 1 Heat Transfer - 1 Consider a cylindrical nuclear fuel rod of length L and diameter df the fuel rod, and the volumetric generation rate is known to vary sinusoidally with distance along the rod to exist between the surface of the rod and the water. Axial conduction can be neglected in rod and fluid

  18. Entrepreneurial separation to transfer technology.

    SciTech Connect (OSTI)

    Fairbanks, Richard R.

    2010-09-01T23:59:59.000Z

    Entrepreneurial separation to transfer technology (ESTT) program is that entrepreneurs terminate their employment with Sandia. The term of the separation is two years with the option to request a third year. Entrepreneurs are guaranteed reinstatement by Sandia if they return before ESTT expiration. Participants may start up or helpe expand technology businesses.

  19. Submersible canned motor transfer pump

    DOE Patents [OSTI]

    Guardiani, Richard F. (Ohio Township, Allegheny County, PA); Pollick, Richard D. (Sarver, PA); Nyilas, Charles P. (Monroeville, PA); Denmeade, Timothy J. (Lower Burrell, PA)

    1997-01-01T23:59:59.000Z

    A transfer pump used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass therethrough, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank.

  20. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  1. Geo energy research and development: technology transfer

    SciTech Connect (OSTI)

    Traeger, R.K.

    1982-03-01T23:59:59.000Z

    Sandia Geo Energy Programs related to geothermal, coal, oil and gas, and synfuel resources have provided a useful mechanism for transferring laboratory technologies to private industry. Significant transfer of hardware, computer programs, diagnostics and instrumentation, advanced materials, and in situ process understanding has occurred through US/DOE supported programs in the past five years. The text briefly reviews the technology transfer procedures and summarizes 32 items that have been transferred and another 20 technologies that are now being considered for possible transfer to industry. A major factor in successful transfer has been personal interactions between Sandia engineers and the technical staff from private industry during all aspects of the technology development.

  2. Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks

    E-Print Network [OSTI]

    Turgut, Damla

    of a crisis. Our protocol does not rely on critical infrastructure. It is designed to be spectrally efficient then present the link rendezvous process in detail. At the heart of this process is an attention signal, inability to scale to meet the capacity demands of the crisis, and in some instances, difficulty

  3. Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    and energy consumption by up to three times compared to Deluge. These improvements are most prominent of these factors on the protocol's behavior. Moreover, we compare Typhoon's performance to that of Deluge--the de times faster than Deluge in sparse and lossy networks. This paper has five sections. We summarize

  4. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  5. How to Use Bitcoin to Design Fair Protocols Iddo Bentov

    E-Print Network [OSTI]

    How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

  6. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  7. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  8. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 1632 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  9. Reducing Transaction Abort Rates with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muoz, Francesc

    D. Mu~noz-Escoi Instituto Tecnologico de Informatica Universidad Politecnica de Valencia 46022 Valencia (SPAIN) {emiedes,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/22 E.Miedes,F.D.Mu~noz-Escoi Transaction Abort Rates with Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  10. GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning

    E-Print Network [OSTI]

    Movileanu, Liviu

    GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

  11. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  12. Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc.

    E-Print Network [OSTI]

    1 Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc. Refrigerator Description Refrigerator recycling programs are designed to save energy through the removal of old-but- operable refrigerators from service. By offering free pick-up, providing incentives, and disseminating

  13. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  14. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  15. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  16. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770-2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770- 2) both assume that the two parties who wish to establish centre). 1 #12; In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC 11770

  17. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 117702, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770 2) both assume that the two parties who wish to establish centre). 1 #12; . In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC

  18. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert-hop network topology were conducted using three wireless sensor net- work traffic patterns (broadcast which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most

  19. Routing protocol for anycast communications in a wireless sensor network

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Routing protocol for anycast communications in a wireless sensor network Nancy El Rachkidy. 1 Introduction In the past few years, wireless sensor networks have been used in several moni University Complexe scientifique des Cezeaux, 63177 Aubi`ere cedex, France Abstract. In wireless sensor

  20. PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks Chieh-Yih Wan Dept. of Electrical class of reliable data applications emerging in wireless sensor networks. For example, currently sensor of sensors in wireless sensor networks on the fly (e.g., during disaster recovery). Due to the application

  1. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  2. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    is given. Next, the current eorts of the automotive industry on middleware technologies which mayA Review of Embedded Automotive Protocols Nicolas Navet 1 , Franoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst

  3. LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note

    E-Print Network [OSTI]

    Raizada, Manish N.

    LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

  4. The COMPOW Protocol for Power Control in Ad Hoc Networks

    E-Print Network [OSTI]

    Kawadia, Vikas

    .S Sreenivas and P.R. Kumar The Power Control problem How do we choose the right transmit power level Power;3 Affects battery life Higher power transmission is unnecessary if the receiver is close of links is critical Find a way to ensure bidirectionality without breaking existing protocols

  5. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  6. Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"

    E-Print Network [OSTI]

    Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

    2014-04-28T23:59:59.000Z

    In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

  7. Survivability validation protocol issues for a system-of-systems

    SciTech Connect (OSTI)

    Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

    1993-08-01T23:59:59.000Z

    This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

  8. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  9. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  10. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  11. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  12. Energy Aware Implementation of an Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Brown, Timothy X.

    Energy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B in Telecommunications Department of InterDisciplinary Telecommunications 2003 #12;This thesis entitled: Energy Aware mentioned discipline. #12;iii Scriptor, Shweta Bhandare (M.S., Telecommunications) Energy Aware

  13. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07T23:59:59.000Z

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  14. Lightweight Protocol Suite for Wireless Sensor Networks: Design and Evaluation

    E-Print Network [OSTI]

    Huang, Changcheng

    , China Graduate School of the Chinese Academy of Sciences, Beijing, 100049, China E-mail: {chenhaiming phenomena [1]. Forecasting its wide application in both civilian and industrial fields, more and more are on the networking issues and energy consumption problems. To date, lots of efficient protocols have been proposed

  15. A proposed protocol for remote control of automated assessment devices

    SciTech Connect (OSTI)

    Kissock, P.S. [AlliedSignal FM and T/NM, Albuquerque, NM (United States); Pritchard, D.A. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31T23:59:59.000Z

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices.

  16. A Program Logic for Verifying Secure Routing Protocols

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    protocol implementations; and thus, both verifica- tion and empirical evaluation of secure routing based on SANDLog specification and ran the code in simulation. 1 Introduction In recent years, we have, evaluated primarily experimentally, and their security properties shown via informal reasoning. Existing

  17. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  18. Group transfer and electron transfer reactions of organometallic complexes

    SciTech Connect (OSTI)

    Atwood, J.D.

    1994-12-01T23:59:59.000Z

    During 1994, despite the disruptions, the authors have made progress in several aspects of their research on electron transfer reactions between organometallic complexes. This summary covers three areas that are relatively complete: (1) reactions between metal carbonyl anions and metal carbonyl halides, (2) reactions of hydrido- and alkyl-containing anions (RFe(CO){sup {minus}}{sub 4} and RW (CO){sub 5}{sup {minus}}) with metal carbonyl cations and (3) reactions of a seventeen-electron complex (Cp{asterisk}Cr(CO){sub 3}{lg_bullet}) with metal carbonyl derivatives. Two areas of examination that have just begun (possible carbene transfer and the possible role of metal carbonyl anions in carbon-hydrogen bond activation) will also be described.

  19. ASSEMBLY TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-26T23:59:59.000Z

    The Assembly Transfer System (ATS) receives, cools, and opens rail and truck transportation casks from the Carrier/Cask Handling System (CCHS). The system unloads transportation casks consisting of bare Spent Nuclear Fuel (SNF) assemblies, single element canisters, and Dual Purpose Canisters (DPCs). For casks containing DPCs, the system opens the DPCs and unloads the SNF. The system stages the assemblies, transfer assemblies to and from fuel-blending inventory pools, loads them into Disposal Containers (DCs), temporarily seals and inerts the DC, decontaminates the DC and transfers it to the Disposal Container Handling System. The system also prepares empty casks and DPCs for off-site shipment. Two identical Assembly Transfer System lines are provided in the Waste Handling Building (WHB). Each line operates independently to handle the waste transfer throughput and to support maintenance operations. Each system line primarily consists of wet and dry handling areas. The wet handling area includes a cask transport system, cask and DPC preparation system, and a wet assembly handling system. The basket transport system forms the transition between the wet and dry handling areas. The dry handling area includes the dry assembly handling system, assembly drying system, DC preparation system, and DC transport system. Both the wet and dry handling areas are controlled by the control and tracking system. The system operating sequence begins with moving transportation casks to the cask preparation area. The cask preparation operations consist of cask cavity gas sampling, cask venting, cask cool-down, outer lid removal, and inner shield plug lifting fixture attachment. Casks containing bare SNF (no DPC) are filled with water and placed in the cask unloading pool. The inner shield plugs are removed underwater. For casks containing a DPC, the cask lid(s) is removed, and the DPC is penetrated, sampled, vented, and cooled. A DPC lifting fixture is attached and the cask is placed into the cask unloading pool. In the cask unloading pool the DPC is removed from the cask and placed in an overpack and the DPC lid is severed and removed. Assemblies are removed from either an open cask or DPC and loaded into assembly baskets positioned in the basket staging rack in the assembly unloading pool. A method called ''blending'' is utilized to load DCs with a heat output of less than 11.8 kW. This involves combining hotter and cooler assemblies from different baskets. Blending requires storing some of the hotter fuel assemblies in fuel-blending inventory pools until cooler assemblies are available. The assembly baskets are then transferred from the basket staging rack to the assembly handling cell and loaded into the assembly drying vessels. After drying, the assemblies are removed from the assembly drying vessels and loaded into a DC positioned below the DC load port. After installation of a DC inner lid and temporary sealing device, the DC is transferred to the DC decontamination cell where the top area of the DC, the DC lifting collar, and the DC inner lid and temporary sealing device are decontaminated, and the DC is evacuated and backfilled with inert gas to prevent prolonged clad exposure to air. The DC is then transferred to the Disposal Container Handling System for lid welding. In another cask preparation and decontamination area, lids are replaced on the empty transportation casks and DPC overpacks, the casks and DPC overpacks are decontaminated, inspected, and transferred to the Carrier/Cask Handling System for shipment off-site. All system equipment is designed to facilitate manual or remote operation, decontamination, and maintenance. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks and DPCs. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal WHB support systems.

  20. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06T23:59:59.000Z

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.