National Library of Energy BETA

Sample records for ghg protocol program

  1. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

  2. INTERNET PROTOCOL DARPA INTERNET PROGRAM

    E-Print Network [OSTI]

    McBrien, Peter

    RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared Way Marina del Rey, California 90291 #12;#12;September 1981 Internet Protocol TABLE OF CONTENTS ...................................................... 9 3. SPECIFICATION ................................................... 11 3.1 Internet Header Format

  3. Voluntary Agreements for Energy Efficiency or GHG EmissionsReduction in Industry: An Assessment of Programs Around the World

    SciTech Connect (OSTI)

    Price, Lynn

    2005-06-01

    Voluntary agreements for energy efficiency improvement and reduction of energy-related greenhouse gas (GHG) emissions have been a popular policy instrument for the industrial sector in industrialized countries since the 1990s. A number of these national-level voluntary agreement programs are now being modified and strengthened, while additional countries--including some recently industrialized and developing countries--are adopting these type of agreements in an effort to increase the energy efficiency of their industrial sectors.Voluntary agreement programs can be roughly divided into three broad categories: (1) programs that are completely voluntary, (2) programs that use the threat of future regulations or energy/GHG emissions taxes as a motivation for participation, and (3) programs that are implemented in conjunction with an existing energy/GHG emissions tax policy or with strict regulations. A variety of government-provided incentives as well as penalties are associated with these programs. This paper reviews 23 energy efficiency or GHG emissions reduction voluntary agreement programs in 18 countries, including countries in Europe, the U.S., Canada, Australia, New Zealand, Japan, South Korea, and Chinese Taipei (Taiwan) and discusses preliminary lessons learned regarding program design and effectiveness. The paper notes that such agreement programs, in which companies inventory and manage their energy use and GHG emissions to meet specific reduction targets, are an essential first step towards GHG emissions trading programs.

  4. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George; Skoulaxinou, Sotiria; Gakis, Nikos; Katsouros, Vassilis; Georgopoulou, Elena

    2013-09-15

    Highlights: • The multi-objective multi-period optimization model. • The solution approach for the generation of the Pareto front with mathematical programming. • The very detailed description of the model (decision variables, parameters, equations). • The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the application of the model in a Greek region.

  5. Greenhouse Gas (GHG) Inventory City College of New York (CCNY)

    E-Print Network [OSTI]

    Sun, Yi

    Greenhouse Gas (GHG) Inventory Program City College of New York (CCNY) New York, New York September 2008 #12;13749/42550 Greenhouse Gas (GHG) Inventory Program Prepared for: City College of New York Township Line Road 2 Valley Square, Suite 120 Blue Bell, Pennsylvania 19422 #12;City College of New York

  6. International Experience with Key Program Elements of Industrial Energy Efficiency or Greenhouse Gas Emissions Reduction Target-Setting Programs

    E-Print Network [OSTI]

    Price, Lynn; Galitsky, Christina; Kramer, Klaas Jan

    2008-01-01

    Berkeley National Laboratory’s Energy Analysis Program forare often national-level energy or GHG programs that combinea national-level energy or GHG emissions mitigation program

  7. Wetlands Regional Monitoring Program Plan 2002 Part 2: Data Collection Protocols Sediment Contaminants

    E-Print Network [OSTI]

    Wetlands Regional Monitoring Program Plan 2002 Part 2: Data Collection Protocols Sediment Contaminants WRMP Version 1 June 2002 1 Data Collection Protocol Tidal Wetland Sediment Contamination Joshua N Concerns about intertidal sediment contamination are increasing in the Bay Area. There is concern

  8. GHG Management Institute GHG MRV Curriculum | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban TransportFortistarFuelCellsEtcSilicon Co LtdGEOGHD Inc Jump to:GHG

  9. Buildings GHG Mitigation Estimator Worksheet, Version 1

    Broader source: Energy.gov [DOE]

    Xcel document describes Version 1 of the the Buildings GHG Mitigation Estimator tool. This tool assists federal agencies in estimating the greenhouse gas mitigation reduction from implementing energy efficiency measures across a portfolio of buildings. It is designed to be applied to groups of office buildings, for example, at a program level (regional or site) that can be summarized at the agency level. While the default savings and cost estimates apply to office buildings, users can define their own efficiency measures, costs, and savings estimates for inclusion in the portfolio assessment. More information on user-defined measures can be found in Step 2 of the buildings emission reduction guidance. The output of this tool is a prioritized set of activities that can help the agency to achieve its greenhouse gas reduction targets most cost-effectively.

  10. 2011 Guidelines to Defra / DECC's GHG Conversion Factors for Company Reporting Produced by AEA for the Department of Energy and Climate Change (DECC)

    E-Print Network [OSTI]

    % conventional petrol and diesel (i.e. refined from crude oil). iii. The lifecycle emissions factors Scope 1 or Scope 3 as defined by the GHG Protocol (e.g. depends on ownership of vehicle stock

  11. Summary of Fast Pyrolysis and Upgrading GHG Analyses

    SciTech Connect (OSTI)

    Snowden-Swan, Lesley J.; Male, Jonathan L.

    2012-12-07

    The Energy Independence and Security Act (EISA) of 2007 established new renewable fuel categories and eligibility requirements (EPA 2010). A significant aspect of the National Renewable Fuel Standard 2 (RFS2) program is the requirement that the life cycle greenhouse gas (GHG) emissions of a qualifying renewable fuel be less than the life cycle GHG emissions of the 2005 baseline average gasoline or diesel fuel that it replaces. Four levels of reduction are required for the four renewable fuel standards. Table 1 lists these life cycle performance improvement thresholds. Table 1. Life Cycle GHG Thresholds Specified in EISA Fuel Type Percent Reduction from 2005 Baseline Renewable fuel 20% Advanced biofuel 50% Biomass-based diesel 50% Cellulosic biofuel 60% Notably, there is a specialized subset of advanced biofuels that are the cellulosic biofuels. The cellulosic biofuels are incentivized by the Cellulosic Biofuel Producer Tax Credit (26 USC 40) to stimulate market adoption of these fuels. EISA defines a cellulosic biofuel as follows (42 USC 7545(o)(1)(E)): The term “cellulosic biofuel” means renewable fuel derived from any cellulose, hemicellulose, or lignin that is derived from renewable biomass and that has lifecycle greenhouse gas emissions, as determined by the Administrator, that are at least 60 percent less than the baseline lifecycle greenhouse gas emissions. As indicated, the Environmental Protection Agency (EPA) has sole responsibility for conducting the life cycle analysis (LCA) and making the final determination of whether a given fuel qualifies under these biofuel definitions. However, there appears to be a need within the LCA community to discuss and eventually reach consensus on discerning a 50–59 % GHG reduction from a ? 60% GHG reduction for policy, market, and technology development. The level of specificity and agreement will require additional development of capabilities and time for the sustainability and analysis community, as illustrated by the rich dialogue and convergence around the energy content and GHG reduction of cellulosic ethanol (an example of these discussions can be found in Wang 2011). GHG analyses of fast pyrolysis technology routes are being developed and will require significant work to reach the levels of development and maturity of cellulosic ethanol models. This summary provides some of the first fast pyrolysis analyses and clarifies some of the reasons for differing results in an effort to begin the convergence on assumptions, discussion of quality of models, and harmonization.

  12. EPA-GHG Inventory Targeted Data Collection Strategies and Software...

    Open Energy Info (EERE)

    EPA-GHG Inventory Targeted Data Collection Strategies and Software Tools (Redirected from US EPA GHG Inventory Targeted Data Collection Strategies and Software Tools) Jump to:...

  13. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  14. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    emissions from purchased electricity, stationary combustion, refrigeration and air conditioning equipment, and several industrial sectors. References Retrieved from "http:...

  15. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    from purchased electricity, transport or mobile sources, refrigeration and air conditioning equipment, and several industrial sectors. References 1.0 1.1 "Stationary...

  16. The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...

    Open Energy Info (EERE)

    from stationary combustion, transport or mobile sources, refrigeration and air conditioning equipment, and several industrial sectors. References 1.0 1.1 "Electricity...

  17. The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeterInformation Policy andInstitute Jump to:

  18. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeterInformation Policy andInstitute Jump to:and Air Conditioning |

  19. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJ AutomationTexas/Wind Resources <forGerman WindCombustion | Open

  20. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJ AutomationTexas/Wind Resources <forGerman WindCombustion |

  1. Shale Gas Production: Potential versus Actual GHG Emissions

    E-Print Network [OSTI]

    O'Sullivan, Francis

    Estimates of greenhouse gas (GHG) emissions from shale gas production and use are controversial. Here we assess the level of GHG emissions from shale gas well hydraulic fracturing operations in the United States during ...

  2. Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)

    SciTech Connect (OSTI)

    Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

    2013-08-09

    The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

  3. Shale Gas Production: Potential versus Actual GHG Emissions

    E-Print Network [OSTI]

    Shale Gas Production: Potential versus Actual GHG Emissions Francis O'Sullivan and Sergey Paltsev://globalchange.mit.edu/ Printed on recycled paper #12;1 Shale Gas Production: Potential versus Actual GHG Emissions Francis O'Sullivan* and Sergey Paltsev* Abstract Estimates of greenhouse gas (GHG) emissions from shale gas production and use

  4. Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)

    SciTech Connect (OSTI)

    Wang, Na; Gorrissen, Willy J.

    2013-01-11

    The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

  5. Methodology for Estimating Reductions of GHG Emissions from Mosaic...

    Open Energy Info (EERE)

    Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Methodology for Estimating Reductions of...

  6. GBTL Workshop GHG Emissions | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the Bill Financing Tool Fits theSunShotB, Title III, Title VOpeningAttendeesGHG

  7. GHG Management Institute curriculum | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTL Solar JumpNetworkingGAOH OffshoreGHESolar JumpGHG

  8. Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs 

    E-Print Network [OSTI]

    Messenger, M.

    2007-01-01

    of the monitoring process. 22 International Performance Measurement and Verification Protocol Committee, Volume 1 Concepts and Options for Determining Energy and Water Savings : IPMVP Protocol series Revised.... 3 ASHRAE, Measurement of Energy and Demand Savings:ASHRAE guideline 14-2002 ( published in June of 2002) See chapter 6, Specific Approaches and IPMVP, Ibid, Volume 1 , Chapter 3, Basic Concepts Key Issue 3- Ensuring that the value...

  9. Energy and GHG Emissions in British Columbia 1990 -2010

    E-Print Network [OSTI]

    Pedersen, Tom

    Energy and GHG Emissions in British Columbia 1990 - 2010 Report Highlights John Nyboer and Maximilian Kniewasser Canadian Industrial Energy End-use Data and Analysis Centre (CIEEDAC) Simon Fraser for Climate Solutions 1 HIGHLIGHTS The Energy and GHG Emissions in British

  10. The Future Energy and GHG Emissions Impact of Alternative Personal

    E-Print Network [OSTI]

    The Future Energy and GHG Emissions Impact of Alternative Personal Transportation Pathways in China://globalchange.mit.edu/ Printed on recycled paper #12;The Future Energy and GHG Emissions Impact of Alternative Personal Paul N. Kishimoto, Sergey Paltsev and Valerie J. Karplus Report No. 231 September 2012 China Energy

  11. Regulation of GHG emissions from transportation fuels: Emission quota versus emission intensity standard

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01

    Derivation of average cost of emission reduction by blending?) and ? respectively. GHG emissions per unit of blend is, ?+ ?? i Reduction in GHG emissions with respect to unblended

  12. Non-Light Duty Energy and Greenhouse Gas (GHG) Emissions Accounting...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Non-Light Duty Energy and Greenhouse Gas (GHG) Emissions Accounting Tool (NEAT) for Long Term Energy and GHG Impacts Evaluation: Domestic Freight Component Documentation and User's...

  13. GREENHOUSE GAS (GHG) INVENTORY REPORT 20102011 Dalhousie Office of Sustainability

    E-Print Network [OSTI]

    Brownstone, Rob

    ..................................... 30 Appendix E: Canadian Default Factors for Calculating CO2 Emissions from Combustion of Natural Gas GREENHOUSE GAS (GHG) INVENTORY REPORT 20102011 Dalhousie Office of Sustainability ......................................................... 34 Appendix K: Fleet Vehicles on Campus .............

  14. Catalyst Paper No-Carb Strategy for GHG Reduction 

    E-Print Network [OSTI]

    McClain, C.; Robinson, J.

    2008-01-01

    The Catalyst Paper strategy to manage GHG exposure is a combination of energy reduction initiatives in manufacturing and the effective use of biomass and alternative fuels to produce mill steam and electricity from the powerhouse. The energy...

  15. Development and Update of Models for Long-Term Energy and GHG...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Update of Models for Long-Term Energy and GHG Impact Evaluation Development and Update of Models for Long-Term Energy and GHG Impact Evaluation 2013 DOE Hydrogen and Fuel Cells...

  16. CEQ Issues Revised Draft NEPA Guidance on GHG Emissions and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Revised Draft NEPA Guidance on GHG Emissions and Climate Change CEQ Issues Revised Draft NEPA Guidance on GHG Emissions and Climate Change March 3, 2015 - 10:37am Addthis CEQ...

  17. EIA: High Oil Prices, GHG Controls Would Help Clean Energy Grow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EIA: High Oil Prices, GHG Controls Would Help Clean Energy Grow EIA: High Oil Prices, GHG Controls Would Help Clean Energy Grow April 1, 2009 - 11:35am Addthis The growth of...

  18. What GHG Concentration Targets are Reachable in this Century?

    E-Print Network [OSTI]

    Paltsev, Sergey

    2013-07-26

    We offer simulations that help to understand the relationship between GHG emissions and concentrations, and the relative role of long-lived (e.g., CO2) and short-lived (e.g., CH4) emissions. We show that, absent technologies ...

  19. Regional GHG Emissions Stat s Greenhouse Gas and the Regional

    E-Print Network [OSTI]

    ,00070.0 Historical CO2 Emissions of the NW Power System CO2 Emissions Hydro Gen Fossil Fuel Gen (NG + Coal) Wind Gen6/5/2013 1 Regional GHG Emissions Stat s Greenhouse Gas and the Regional Power System Symposium power system All emissions are displayed in short tons (not metric tons) The Pacific Northwest (PNW

  20. UNFCCC-GHG Inventory Review Training Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (Utility Company) Jump to:TucsonLLC Jump to:UDIGEFproject(Redirected from

  1. UNFCCC-GHG Inventory Review Training Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (Utility Company) Jump to:TucsonLLC Jump to:UDIGEFproject(Redirected

  2. GHG Emissions from Hydropower Reservoirs The role of hydropower reservoirs in contributing to greenhouse gas (GHG) emissions is poorly

    E-Print Network [OSTI]

    GHG Emissions from Hydropower Reservoirs The role of hydropower reservoirs in contributing from tropical and boreal reservoirs are significant. In light of hydropower's potential role as a green to characterize carbon dioxide (CO2) and methane (CH4) emissions from hydropower reservoirs in the US Southeast

  3. Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol

    E-Print Network [OSTI]

    conversion to wood chips Due to funds from the emissions reduction units sell, under the Kyoto ProtocolPresentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol Andrey

  4. Reducing GHG emissions in the United States' transportation sector

    SciTech Connect (OSTI)

    Das, Sujit [ORNL; Andress, David A [ORNL; Nguyen, Tien [U.S. DOE

    2011-01-01

    Reducing GHG emissions in the U.S. transportation sector requires both the use of highly efficient propulsion systems and low carbon fuels. This study compares reduction potentials that might be achieved in 2060 for several advanced options including biofuels, hybrid electric vehicles (HEV), plug-in hybrid electric vehicles (PHEV), and fuel cell electric vehicles (FCEV), assuming that technical and cost reduction targets are met and necessary fueling infrastructures are built. The study quantifies the extent of the reductions that can be achieved through increasing engine efficiency and transitioning to low-carbon fuels separately. Decarbonizing the fuels is essential for achieving large reductions in GHG emissions, and the study quantifies the reductions that can be achieved over a range of fuel carbon intensities. Although renewables will play a vital role, some combination of coal gasification with carbon capture and sequestration, and/or nuclear energy will likely be needed to enable very large reductions in carbon intensities for hydrogen and electricity. Biomass supply constraints do not allow major carbon emission reductions from biofuels alone; the value of biomass is that it can be combined with other solutions to help achieve significant results. Compared with gasoline, natural gas provides 20% reduction in GHG emissions in internal combustion engines and up to 50% reduction when used as a feedstock for producing hydrogen or electricity, making it a good transition fuel for electric propulsion drive trains. The material in this paper can be useful information to many other countries, including developing countries because of a common factor: the difficulty of finding sustainable, low-carbon, cost-competitive substitutes for petroleum fuels.

  5. Quantitative Analysis of Biofuel Sustainability, Including Land Use Change GHG Emissions

    Office of Energy Efficiency and Renewable Energy (EERE)

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsQuantitative Analysis of Biofuel Sustainability, Including Land Use Change GHG EmissionsJennifer B....

  6. IGES GHG Calculator For Solid Waste | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNewTexas:HydrothermallyIFB Agro Industries Ltd Jump to:IGES GHG

  7. ECN GHG Marginal Abatement Cost curves (NAMAC) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:of the NationalDynetek Europe GmbH JumpE+CoTheECN GHG

  8. Selected GHG Emission Supply Curves | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to:Newberg,EnergyEastCarbonOpenSchulthess GroupSmart GridSeikoOpenBankGHG

  9. Abstract--Energy consumption and the concomitant Green House Gases (GHG) emissions of network infrastructures are

    E-Print Network [OSTI]

    Politčcnica de Catalunya, Universitat

    Abstract--Energy consumption and the concomitant Green House Gases (GHG) emissions of network on the overall power consumption and on the GHG emissions with just 25% of green energy sources. I. INTRODUCTION]. In the zero carbon approach, renewable (green) energy sources (e.g. sun, wind, tide) are employed and no GHGs

  10. INTEGRATING AGRICULTURAL AND FORESTRY GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS

    E-Print Network [OSTI]

    McCarl, Bruce A.

    INTEGRATING AGRICULTURAL AND FORESTRY GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS: DEVELOPING A FAMILY OF RESPONSE FUNCTIONS 1 of economy-wide analysis of greenhouse gas mitigation options can be found in a special issue of the Energy

  11. The Economic, Energy, and GHG Emissions Impacts of Proposed 20172025 Vehicle Fuel

    E-Print Network [OSTI]

    The Economic, Energy, and GHG Emissions Impacts of Proposed 2017­2025 Vehicle Fuel Economy in the passenger vehicle fleet to evaluate the economic, energy use, and greenhouse gas (GHG) emissions impacts analysis need to be related to the economic, technological, and political forces that drive emissions

  12. DRAFT VERSION September 6, 2009 1 1990 GHG Baseline for Building Energy Use

    E-Print Network [OSTI]

    Escher, Christine

    DRAFT VERSION ­ September 6, 2009 1 1990 GHG Baseline for Building Energy Use in the Oregon of 1990 building energy use and the associated greenhouse gas (GHG) emissions for Oregon University System's stated intent. Specifically, there is a focus on building energy use, the single largest source of direct

  13. Systematic Review and Harmonization of Life Cycle GHG Emission Estimates for Electricity Generation Technologies (Presentation)

    SciTech Connect (OSTI)

    Heath, G.

    2012-06-01

    This powerpoint presentation to be presented at the World Renewable Energy Forum on May 14, 2012, in Denver, CO, discusses systematic review and harmonization of life cycle GHG emission estimates for electricity generation technologies.

  14. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  15. GHG emission factors developed for the recycling and composting of municipal waste in South African municipalities

    SciTech Connect (OSTI)

    Friedrich, Elena Trois, Cristina

    2013-11-15

    Highlights: • GHG emission factors for local recycling of municipal waste are presented. • GHG emission factors for two composting technologies for garden waste are included. • Local GHG emission factors were compared to international ones and discussed. • Uncertainties and limitations are presented and areas for new research highlighted. - Abstract: GHG (greenhouse gas) emission factors for waste management are increasingly used, but such factors are very scarce for developing countries. This paper shows how such factors have been developed for the recycling of glass, metals (Al and Fe), plastics and paper from municipal solid waste, as well as for the composting of garden refuse in South Africa. The emission factors developed for the different recyclables in the country show savings varying from ?290 kg CO{sub 2} e (glass) to ?19 111 kg CO{sub 2} e (metals – Al) per tonne of recyclable. They also show that there is variability, with energy intensive materials like metals having higher GHG savings in South Africa as compared to other countries. This underlines the interrelation of the waste management system of a country/region with other systems, in particular with energy generation, which in South Africa, is heavily reliant on coal. This study also shows that composting of garden waste is a net GHG emitter, releasing 172 and 186 kg CO{sub 2} e per tonne of wet garden waste for aerated dome composting and turned windrow composting, respectively. The paper concludes that these emission factors are facilitating GHG emissions modelling for waste management in South Africa and enabling local municipalities to identify best practice in this regard.

  16. Should We Consider the CoBenefits of Agricultural GHG Levan Elbakidze, Bruce A. McCarl

    E-Print Network [OSTI]

    McCarl, Bruce A.

    agricultural management strategies are utilized to offset or reduce greenhouse gas (GHG) emissions discussed case where a coal fired electrical powerplant, which is allocated fewer emission permits than

  17. Transportation Energy Futures: Combining Strategies for Deep Reductions in Energy Consumption and GHG Emissions (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-03-01

    This fact sheet summarizes actions in the areas of light-duty vehicle, non-light-duty vehicle, fuel, and transportation demand that show promise for deep reductions in energy use. Energy efficient transportation strategies have the potential to simultaneously reduce oil consumption and greenhouse gas (GHG) emissions. The Transportation Energy Futures (TEF) project examined how the combination of multiple strategies could achieve deep reductions in GHG emissions and petroleum use on the order of 80%. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal was to help inform domestic decisions about transportation energy strategies, priorities, and investments, with an emphasis on underexplored opportunities. TEF findings reveal three strategies with the potential to displace most transportation-related petroleum use and GHG emissions: 1) Stabilizing energy use in the transportation sector through efficiency and demand-side approaches. 2) Using additional advanced biofuels. 3) Expanding electric drivetrain technologies.

  18. Idaho National Laboratory (INL) Site Greenhouse Gas (GHG) Monitoring Plan - 40 CFR 98

    SciTech Connect (OSTI)

    Deborah L. Layton; Kimberly Frerichs

    2011-12-01

    The purpose of this Greenhouse Gas (GHG) Monitoring Plan is to meet the monitoring plan requirements of Title 40 of the Code of Federal Regulations Part 98.3(g)(5). This GHG Monitoring Plan identifies procedures and methodologies used at the Idaho National Laboratory Site (INL Site) to collect data used for GHG emissions calculations and reporting requirements from stationary combustion and other regulated sources in accordance with 40 CFR 98, Subparts A and other applicable subparts. INL Site Contractors determined subpart applicability through the use of a checklist (Appendix A). Each facility/contractor reviews operations to determine which subparts are applicable and the results are compiled to determine which subparts are applicable to the INL Site. This plan is applicable to the 40 CFR 98-regulated activities managed by the INL Site contractors: Idaho National Laboratory (INL), Idaho Cleanup Project (ICP), Advanced Mixed Waste Treatment Project (AMWTP), and Naval Reactors Facilities (NRF).

  19. Idaho National Laboratory (INL) Site Greenhouse Gas (GHG) Monitoring Plan - 40 CFR 98

    SciTech Connect (OSTI)

    Deborah L. Layton; Kimberly Frerichs

    2010-07-01

    The purpose of this Greenhouse Gas (GHG) Monitoring Plan is to meet the monitoring plan requirements of Title 40 of the Code of Federal Regulations Part 98.3(g)(5). This GHG Monitoring Plan identifies procedures and methodologies used at the Idaho National Laboratory Site (INL Site) to collect data used for GHG emissions calculations and reporting requirements from stationary combustion and other regulated sources in accordance with 40 CFR 98, Subparts A and other applicable subparts. INL Site Contractors determined subpart applicability through the use of a checklist (Appendix A). Each facility/contractor reviews operations to determine which subparts are applicable and the results are compiled to determine which subparts are applicable to the INL Site. This plan is applicable to the 40 CFR 98-regulated activities managed by the INL Site contractors: Idaho National Laboratory (INL), Idaho Cleanup Project (ICP), Advanced Mixed Waste Treatment Project (AMWTP), and Naval Reactors Facilities (NRF).

  20. Assess and improve the national GHG inventory and other economic...

    Open Energy Info (EERE)

    Assess institutional framework for LEDS Financing Initiatives Toolkit Policy and Program Design Toolkit 3c.3. Assess in-depth contributions of selected scenarios to goals across...

  1. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    SciTech Connect (OSTI)

    Vine, E.; Sathaye, J.

    1997-12-01

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  2. Estimate of Fuel Consumption and GHG Emission Impact on an Automated Mobility District: Preprint

    SciTech Connect (OSTI)

    Chen, Yuche; Young, Stanley; Gonder, Jeff; Qi, Xuewei

    2015-12-11

    This study estimates the range of fuel and emissions impact of an automated-vehicle (AV) based transit system that services campus-based developments, termed an automated mobility district (AMD). The study develops a framework to quantify the fuel consumption and greenhouse gas (GHG) emission impacts of a transit system comprised of AVs, taking into consideration average vehicle fleet composition, fuel consumption/GHG emission of vehicles within specific speed bins, and the average occupancy of passenger vehicles and transit vehicles. The framework is exercised using a previous mobility analysis of a personal rapid transit (PRT) system, a system which shares many attributes with envisioned AV-based transit systems. Total fuel consumption and GHG emissions with and without an AMD are estimated, providing a range of potential system impacts on sustainability. The results of a previous case study based of a proposed implementation of PRT on the Kansas State University (KSU) campus in Manhattan, Kansas, serves as the basis to estimate personal miles traveled supplanted by an AMD at varying levels of service. The results show that an AMD has the potential to reduce total system fuel consumption and GHG emissions, but the amount is largely dependent on operating and ridership assumptions. The study points to the need to better understand ride-sharing scenarios and calls for future research on sustainability benefits of an AMD system at both vehicle and system levels.

  3. UBC Social, Ecological Economic Development Studies (SEEDS) Student Report GHG Emissions Data Tracker User Manual

    E-Print Network [OSTI]

    of a project/report." #12;GHG Emissions Data Tracker User Manual #12;Add/Edit vehicles Vehicles type addition will be saved automatically. Add Vehicles: Enter Vehicles name in the bottom most blank space and once you enter the first character it will create a new record in database. Edit Vehicles: Click on the text box that you

  4. GLOBAL EMISSIONS Greenhouse gas (GHG) emissions, largely carbon dioxide (CO2)

    E-Print Network [OSTI]

    Green, Donna

    GLOBAL EMISSIONS Greenhouse gas (GHG) emissions, largely carbon dioxide (CO2) from the combustion- related CO2 emissions have risen 130-fold since 1850--from 200 million tons to 27 billion tons a year--and are projected to rise another 60 percent by 2030 (see Figure 1).1 Most of the world's emissions come from

  5. TECHNICAL REPORTS The greenhouse gas (GHG) impact of composting a range

    E-Print Network [OSTI]

    Brown, Sally

    . For example, a facility that composts an equal mixture of manure, newsprint, and food waste could conserve are through CH4 avoidance when feedstocks are composted instead of landfilled (municipal solid wasteTECHNICAL REPORTS 1396 The greenhouse gas (GHG) impact of composting a range of potential

  6. Analyzing California's GHG Reduction Paths using CA-TIMES Energy System Model

    E-Print Network [OSTI]

    California at Davis, University of

    Analyzing California's GHG Reduction Paths using CA-TIMES Energy System Model Christopher Yang@ucdavis.edu NextSTEPS (Sustainable Transportation Energy Pathways) #12;CA-TIMES Model Overview · CA-TIMES is a bottom-up, linear optimization model of California's energy sectors ­ Technology and resources details

  7. Regulation of GHG emissions from transportation fuels: Emission quota versus emission intensity standard

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01

    relative to coal than base case IV: Transportation cost isCoal-based ethanol pro- 0.430 duction cost ($/liter) Ethanol transportation 0.050 cost -transportation 0.130 cost - road ($/liter) Energy used in biore?ning 13.85 (MJ/liter) GHG intensity of coal-

  8. Capturing Fugitives to Reduce DOE’s GHG Emissions

    Broader source: Energy.gov [DOE]

    Experts are hunting down fugitive carbon emissions from across 20 Energy Department laboratories, sites and program offices — and they’ve already prevented the release of more than 600,000 metric tons of CO2 equivalent since 2009 -- equal to taking 140,000 cars off the road for a year.

  9. Health Benefits of GHG Reduction | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-DoseOptions for Accidental Releases of LastProgramsHealth

  10. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil

  11. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  12. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  13. Carbon Trading Protocols for Geologic Sequestration

    E-Print Network [OSTI]

    Hoversten, Shanna

    2009-01-01

    EU ETS: European Union Emissions Trading System GHG: Greenstarts operating an emissions trading scheme (ETS) similarGovernments operating emissions trading systems face the

  14. Meeting State Carbon Emission Requirements through Industrial Energy Efficiency: The Southern California Gas Company’s Industrial End User Program

    SciTech Connect (OSTI)

    2010-06-25

    This case study describes the Southern California Gas Company’s Industrial End User program that helps large industrial customers increase energy efficiency and reduce energy use and GHG emissions.

  15. Transportation Energy Futures- Combining Strategies for Deep Reductions in Energy Consumption and GHG Emissions

    Broader source: Energy.gov [DOE]

    Transportation currently accounts for 71% of total U.S. petroleum use and 33% of the nation's total carbon emissions. The TEF project explores how combining multiple strategies could reduce GHG emissions and petroleum use by 80%. Researchers examined four key areas – lightduty vehicles, non-light-duty vehicles, fuels, and transportation demand – in the context of the marketplace, consumer behavior, industry capabilities, technology and the energy and transportation infrastructure. The TEF reports support DOE long-term planning. The reports provide analysis to inform decisions about transportation energy research investments, as well as the role of advanced transportation energy technologies and systems in the development of new physical, strategic, and policy alternatives.

  16. Life Cycle GHG Emissions from Conventional Natural Gas Power Generation: Systematic Review and Harmonization (Presentation)

    SciTech Connect (OSTI)

    Heath, G.; O'Donoughue, P.; Whitaker, M.

    2012-12-01

    This research provides a systematic review and harmonization of the life cycle assessment (LCA) literature of electricity generated from conventionally produced natural gas. We focus on estimates of greenhouse gases (GHGs) emitted in the life cycle of electricity generation from conventionally produced natural gas in combustion turbines (NGCT) and combined-cycle (NGCC) systems. A process we term "harmonization" was employed to align several common system performance parameters and assumptions to better allow for cross-study comparisons, with the goal of clarifying central tendency and reducing variability in estimates of life cycle GHG emissions. This presentation summarizes preliminary results.

  17. Mali-Reducing the GHG Impacts of Sustainable Intensification | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource HistoryScenarios TowardsInformation Reducing the GHG Impacts of Sustainable

  18. Application Protocols o Multimedia

    E-Print Network [OSTI]

    Biagioni, Edoardo S.

    Application Protocols o Telnet o FTP o WWW o SMTP o NNTP o IRC 7 #12; IRC o Internet Relay Chat o similar to telnet o chat

  19. Decontamination systems information and research program -- Literature review in support of development of standard test protocols and barrier design models for in situ formed barriers project

    SciTech Connect (OSTI)

    1994-12-01

    The US Department of Energy is responsible for approximately 3,000 sites in which contaminants such as carbon tetrachloride, trichlorethylene, perchlorethylene, non-volatile and soluble organic and insoluble organics (PCBs and pesticides) are encountered. In specific areas of these sites radioactive contaminants are stored in underground storage tanks which were originally designed and constructed with a 30-year projected life. Many of these tanks are now 10 years beyond the design life and failures have occurred allowing the basic liquids (ph of 8 to 9) to leak into the unconsolidated soils below. Nearly one half of the storage tanks located at the Hanford Washington Reservation are suspected of leaking and contaminating the soils beneath them. The Hanford site is located in a semi-arid climate region with rainfall of less than 6 inches annually, and studies have indicated that very little of this water finds its way to the groundwater to move the water down gradient toward the Columbia River. This provides the government with time to develop a barrier system to prevent further contamination of the groundwater, and to develop and test remediation systems to stabilize or remove the contaminant materials. In parallel to remediation efforts, confinement and containment technologies are needed to retard or prevent the advancement of contamination plumes through the environment until the implementation of remediation technology efforts are completed. This project examines the various confinement and containment technologies and protocols for testing the materials in relation to their function in-situ.

  20. GHG emission factors developed for the collection, transport and landfilling of municipal waste in South African municipalities

    SciTech Connect (OSTI)

    Friedrich, Elena; Trois, Cristina

    2013-04-15

    Highlights: ? An average GHG emission factor for the collection and transport of municipal solid waste in South Africa is calculated. ? A range of GHG emission factors for different types of landfills (including dumps) in South Africa are calculated. ? These factors are compared internationally and their implications for South Africa and developing countries are discussed . ? Areas for new research are highlighted. - Abstract: Greenhouse gas (GHG) emission factors are used with increased frequency for the accounting and reporting of GHG from waste management. However, these factors have been calculated for developed countries of the Northern Hemisphere and are lacking for developing countries. This paper shows how such factors have been developed for the collection, transport and landfilling of municipal waste in South Africa. As such it presents a model on how international results and methodology can be adapted and used to calculate country-specific GHG emission factors from waste. For the collection and transport of municipal waste in South Africa, the average diesel consumption is around 5 dm{sup 3} (litres) per tonne of wet waste and the associated GHG emissions are about 15 kg CO{sub 2} equivalents (CO{sub 2} e). Depending on the type of landfill, the GHG emissions from the landfilling of waste have been calculated to range from ?145 to 1016 kg CO{sub 2} e per tonne of wet waste, when taking into account carbon storage, and from 441 to 2532 kg CO{sub 2} e per tonne of wet waste, when carbon storage is left out. The highest emission factor per unit of wet waste is for landfill sites without landfill gas collection and these are the dominant waste disposal facilities in South Africa. However, cash strapped municipalities in Africa and the developing world will not be able to significantly upgrade these sites and reduce their GHG burdens if there is no equivalent replacement of the Clean Development Mechanism (CDM) resulting from the Kyoto agreement. Other low cost avenues need to be investigated to suit local conditions, in particular landfill covers which enhance methane oxidation.

  1. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  2. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  3. The Ecological Society of America wwwwww..ffrroonnttiieerrssiinneeccoollooggyy..oorrgg Emissions of the principal greenhouse gas (GHG), car-

    E-Print Network [OSTI]

    Battles, John

    ..ffrroonnttiieerrssiinneeccoollooggyy..oorrgg Emissions of the principal greenhouse gas (GHG), car- bon dioxide (CO2), are driven primarily by the burn accumulation in forests and CO2 emissions from tropical deforestation (Canadell and Raupach 2008). Particular fixation by plant photosynthesis) and heterotrophic res- piration (CO2 emission by non-photosynthetic organ

  4. Energy efficiency and the cost of GHG abatement: A comparison of bottom-up and hybrid models for the US

    E-Print Network [OSTI]

    Energy efficiency and the cost of GHG abatement: A comparison of bottom-up and hybrid models February 2011 Accepted 16 August 2011 Available online 17 September 2011 Keywords: Energy efficiency that a large potential for profitable energy efficiency exists in the US, and that substantial greenhouse gas

  5. Implications of changing natural gas prices in the United States electricity sector for SO and life cycle GHG emissions

    E-Print Network [OSTI]

    Jaramillo, Paulina

    Implications of changing natural gas prices in the United States electricity sector for SO 2 , NO X of changing natural gas prices in the United States electricity sector for SO2, NOX and life cycle GHG to projections of low natural gas prices and increased supply. The trend of increasing natural gas use

  6. UBC Social Ecological Economic Development Studies (SEEDS) Student Report Climate Action Partnership Contribution of Food GHG Emissions Reduction: Moving

    E-Print Network [OSTI]

    target: Ensure that 90% of UBC's food system waste can be composted or recycled by 2015. We reviewed Waste Management, UBC Food Services and the AMS Food and Beverage Partnership Contribution of Food GHG Emissions Reduction: Moving UBC Beyond Climate Neutral Jennifer Baum

  7. Wumpus Protocol Analysis

    E-Print Network [OSTI]

    White, Barbara Y.

    The goal of this research was to assist in the creation of a new, improved Wumpus advisor by taking protocols of ten people learning to play Wumpus with a human coach. It was hoped that by observing these subjects learn ...

  8. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  9. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  10. Development and Update of Models for Long-Term Energy and GHG Impact Evaluation

    Broader source: Energy.gov [DOE]

    2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting

  11. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect (OSTI)

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  12. Evolving Custom Communication Protocols

    E-Print Network [OSTI]

    Fernandez, Thomas

    Evolving Custom Communication Protocols by Wes Faler of Part-Time Scientists for 28C3, Berlin One-at-time simulation #12;Easy as 1...2...3... Parameter sweep int driver_movesPerTransaction[] = { 1, 20 }; int driver_wheelTicksPerCommand[] = { 512, 4096 }; int driver_commandsPerPacket[] = { 1, 25

  13. House Simulation Protocols Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols Report House Simulation Protocols Report Report cover Building America's House Simulation Protocols report is designed to assist researchers in tracking...

  14. Superior Energy Performance Certification Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance cm Certification Protocol December 7, 2012 D R A F T f o r R E V I E W Superior Energy Performance cm Certification Protocol 1 December 7, 2012 2012...

  15. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-08-05

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  16. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  17. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    electricity, stationary combustion, mobile combustion, refrigeration and air conditioning equipment, and several industrial sectors. References 1.0 1.1 "GHG...

  18. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working inProgramming Programming

  19. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working inProgrammingProgramming

  20. Thesis Research Protocol November 2013 1 Thesis Research Protocol

    E-Print Network [OSTI]

    van Vliet, Lucas J.

    Thesis Research Protocol November 2013 1 Thesis Research Protocol November 2013 Thesis Research Project The master's programme Industrial Ecology is completed by the Thesis Research Project (TRP Ecology. The Thesis Research Project is composed of two modules: a Thesis Preparation Module (6 EC

  1. Sex GENOTYPING PROTOCOL PCR PROTOCOL NAME: Sex1

    E-Print Network [OSTI]

    Shoubridge, Eric

    Sex GENOTYPING PROTOCOL GENE NAME: PCR PROTOCOL NAME: Sex1 PCR REAGENTS: 10X NEB THERMOPOL PCR) PRIMERS: Sex1 Forward (20uM Standard Working Concentration) Sex1 Reverse (20uM Standard Working CONDITIONS: Sex (or Sex1) 95 C for 3 min 95 C for 30 sec 60 C for 1 min 35 cycles

  2. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht, C. Metzger; Wilson, E.; Horowitz, S.

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program’s goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  3. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  4. Verifying a Simplified Fuel Oil Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, Hugh; Dentz, Jordan; Doty, Chris

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  5. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working inProgramming

  6. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  7. Towards a Wireless Building Management System Requiring no Change to Upper-layer Protocols

    E-Print Network [OSTI]

    Wang, Dan

    communications to support transmission, design protocols for sensor networking and conduct application that converts existing wired sensor network into wireless without changing upper layer protocols decent understanding on the design within a wireless sensor network, e.g., OS, programming languages

  8. Greenhouse Gas Management Program Overview (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2011-11-01

    Program fact sheet highlighting federal requirements for GHG emissions management, FEMP services to help agencies reduce emissions, and additional resources. The U.S. Department of Energy (DOE) Federal Energy Management Program (FEMP) assists Federal agencies with managing their greenhouse gas (GHG) emissions. GHG management entails measuring emissions and understanding their sources, setting a goal for reducing emissions, developing a plan to meet this goal, and implementing the plan to achieve reductions in emissions. FEMP provides the following services to help Federal agencies meet the requirements of inventorying and reducing their GHG emissions: (1) FEMP offers one-on-one technical assistance to help agencies understand and implement the Federal Greenhouse Gas Accounting and Reporting Guidance and fulfill their inventory reporting requirements. (2) FEMP provides training, tools, and resources on FedCenter to help agencies complete their annual inventories. (3) FEMP serves a leadership role in the interagency Federal Working Group on Greenhouse Gas Accounting and Reporting that develops recommendations to the Council on Environmental Quality (CEQ) for the Federal Greenhouse Gas Accounting and Reporting Guidance. (4) As the focus continues to shift from measuring emissions (completing inventories) to mitigating emissions (achieving reductions), FEMP is developing a strategic planning framework and resources for agencies to prioritize among a variety of options for mitigating their GHG emissions, so that they achieve their reduction goals in the most cost-effective manner. These resources will help agencies analyze their high-quality inventories to make strategic decisions about where to use limited resources to have the greatest impact on reducing emissions. Greenhouse gases trap heat in the lower atmosphere, warming the earth's surface temperature in a natural process known as the 'greenhouse effect.' GHGs include carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), perfluorocarbons (PFCs), hydrofluorocarbons (HFCs), and sulfur hexafluoride (SF{sub 6}). Human activities have caused a rapid increase in GHG concentrations. This rising level contributes to global climate change, which contributes to environmental and public health problems.

  9. Pilot application of PalmGHG, the RSPO greenhouse gas calculator for oil palm products , Chase L.D.C.b

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Pilot application of PalmGHG, the RSPO greenhouse gas calculator for oil palm products Bessou C, accounting in 2011 for 31.3% of the global oils and fats production (Oil World, 2012). About 10% of global production is certified by RSPO, the Roundtable on Sustainable Palm Oil (Oil World, 2012; RSPO, 2013). RSPO

  10. Project Information Form Project Title Program for Vehicle Regulatory Reform: Assessing Life Cycle-Based

    E-Print Network [OSTI]

    California at Davis, University of

    Project Information Form Project Title Program for Vehicle Regulatory Reform: Assessing Life Cycle vehicle production emissions and other life cycle emissions. Non- operation emissions are more dominant the need, effectiveness, and policy strategies for capturing life cycle vehicle emissions in LDV GHG

  11. SAMPLING AND ANALYSIS PROTOCOLS

    SciTech Connect (OSTI)

    Jannik, T; P Fledderman, P

    2007-02-09

    Radiological sampling and analyses are performed to collect data for a variety of specific reasons covering a wide range of projects. These activities include: Effluent monitoring; Environmental surveillance; Emergency response; Routine ambient monitoring; Background assessments; Nuclear license termination; Remediation; Deactivation and decommissioning (D&D); and Waste management. In this chapter, effluent monitoring and environmental surveillance programs at nuclear operating facilities and radiological sampling and analysis plans for remediation and D&D activities will be discussed.

  12. Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 Satellite Transport Protocol (STP): An SSCOP­based Transport Protocol for Datagram Satellite Networks Thomas R. Henderson * and Randy H. Katz University of California at Berkeley {tomh­based protocol, the Service Specific Connection Oriented Protocol (SSCOP), for use as a transport protocol

  13. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  14. Chemicals Sector (NAICS 325) Energy and GHG Combustion Emissions Profile, November 2012

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based Fuels|Programs |Chart of breakout of funds by majorEnergyChemicals39

  15. Expressive Analytical Model for Routing Protocols infor Routing Protocols in

    E-Print Network [OSTI]

    Julien, Christine

    Taesoo Jun Angela Dalton Sh h k B dShreeshankar Bodas Christine Julien Sriram Vishwanath TR-UTEDGE-2007 in Mobile Ad Hoc Networks Taesoo Jun, Angela Dalton, Shreeshankar Bodas, Christine Julien, and Sriram, sriram}@ece.utexas.edu Abstract--Many routing protocols exist for mobile ad hoc networks. To select

  16. Reviews and approves OG protocol Publishes New protocols, Revisions,

    E-Print Network [OSTI]

    Kay, Mark A.

    CIRB reviews/approves Study-Specific Worksheet; notifies researcher & local IRB of acceptance Confirms- Specific Worksheet Worksheet Acceptance (site accepted) New protocols Revisions Renewals DSMB rpts Local local site closure to Researcher and to local IRB Oncology Group (OG) Scientific review at CTEP takes

  17. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  18. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncoveredmore »that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.« less

  19. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    SciTech Connect (OSTI)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncovered that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.

  20. The Internet Backplane Protocol: A Study in Resource Sharing1 This work is supported by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of

    E-Print Network [OSTI]

    Plank, Jim

    of Energy Scientific Discovery through Advanced Computing Program under grant # DE-FC02-01ER25465 community in the next decade. Interoperability and scalability are necessary design goals for distributed systems based on resource sharing, but the two models we consider differ in the positions they take along

  1. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  2. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    April 2015 (Revision 1) - PROTOCOL - EA-30-02 Office of Environment, Safety and Health Assessments Protocol for Required Reading, April 2015 (Revision 1) - PROTOCOL -...

  3. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    SciTech Connect (OSTI)

    Boyer, Brian David; Stevens, Rebecca C; Uribe, Eva C; Sandoval, M Analisa; Valente, John N; Valente, John U; Jo, Jae H; Sellen, Joana

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak Ridge National Laboratory to cover the situations that these labs, which respectively represent nuclear weapons labs, nuclear energy labs, and science labs and environmental management sites, would encounter during a complementary access. Each of the three labs hosted a mock complementary access activity, which included mock inspectors from the BNL-LANL team. In addition to reviewing the draft declarations from each of the host labs, the BNL-LANL team conducted open source research in a manner similar to what IAEA inspectors would do to research the activities at a location and prepare questions for the location to answer and that would be the focus of a complementary access. The host labs and other labs attending the training found the training to be extremely useful and helpful in making sure that each lab's Additional Protocol team had made correct declarations of nuclear activities, had properly trained staff ready to host and answer IAEA inquiries, and would implement managed access during a complementary access that would provide access by the IAEA team to resolve questions or inconsistencies about a particular declaration and still protect the information addressed by Articles 1 and 7 of the U.S. AP.

  4. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and Alexandre Juin 1994 #12; Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v the existing hardware and software testing methods would be adequate for the testing of communication protocols

  5. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and AlexandreZal Juin 1994 #12;Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v. Bochmann and software testing methods would be adequate for the testing of communication protocols. The purpose

  6. The Pulse Protocol: Energy Efficient Infrastructure Access

    E-Print Network [OSTI]

    Awerbuch, Baruch

    The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, herb}@cs.jhu.edu Abstract-- We present the Pulse protocol which is designed for multi-hop wireless. The Pulse protocol utilizes a periodic flood initiated at the network gateways which provides both routing

  7. TEC Working Group Topic Groups Archives Protocols

    Broader source: Energy.gov [DOE]

    The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  8. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  9. Program Overview: The Texas LoanSTAR Program; 1989-August 1997 

    E-Print Network [OSTI]

    Turner, W. D.; Claridge, D. E.; O'Neal, D. L.; Haberl, J. S.; Heffington, W. M.; Harvey, T.; Sifuentes, T.

    1998-01-01

    program impacts will be briefly assessed, including the contributions to national documents such as the DOE building monitoring protocols, the NEMVP, IPMVP, the ASHRAE GPC-14P standards work, and other related programs. Loans and Loan Amounts Figure... in building retrofits. Initially called the NEMVP (North American Energy Measurement and Verification Protocols) and now called the IPMVP (International Performance Monitoring and Verification Protocols), this document contains m*y of the methodologies...

  10. Program Overview: The Texas LoanSTAR Program; 1989-October 1999, A 10-Year Experience 

    E-Print Network [OSTI]

    Turner, W. D.; Claridge, D. E.; O'Neal, D. L.; Haberl, J. S.; Heffington, W. M.; Taylor, D.; Sifuentes, T.

    2000-01-01

    program impacts will be briefly assessed, including the contributions to national documents such as the DOE building monitoring protocols (NEMVP and IPMVP), the ASHRAE GPC- 14P standards work, and other related programs. Figure 1 Cumulative Loan... American Energy Measurement and Verification Protocols) and now called the IPMVP (International Performance Monitoring and Verification Protocols), this document contains many of the methodologies developed in LoanSTAR. ASHRAE is also developing...

  11. Part 1: Introduction What is the Internet, What is a protocol?

    E-Print Network [OSTI]

    Internet Backbones A Brief History of Computer Networking and the Internet Wireshark Lab 1 Part 2Part 1: Introduction What is the Internet, What is a protocol? The Network Edge, Core, and Access Electronic Mail in the Internet The Internet's Directory Service: DNS Socket Programming Python Programming

  12. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  13. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  14. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  16. International Experience with Key Program Elements of IndustrialEnergy Efficiency or Greenhouse Gas Emissions Reduction Target-SettingPrograms

    SciTech Connect (OSTI)

    Price, Lynn; Galitsky, Christina; Kramer, Klaas Jan

    2008-02-02

    Target-setting agreements, also known as voluntary ornegotiated agreements, have been used by a number of governments as amechanism for promoting energy efficiency within the industrial sector. Arecent survey of such target-setting agreement programs identified 23energy efficiency or GHG emissions reduction voluntary agreement programsin 18 countries. International best practice related to target-settingagreement programs calls for establishment of a coordinated set ofpolicies that provide strong economic incentives as well as technical andfinancial support to participating industries. The key program elementsof a target-setting program are the target-setting process,identification of energy-saving technologies and measures usingenergy-energy efficiency guidebooks and benchmarking as well as byconducting energy-efficiency audits, development of an energy-savingsaction plan, development and implementation of energy managementprotocols, development of incentives and supporting policies, monitoringprogress toward targets, and program evaluation. This report firstprovides a description of three key target-setting agreement programs andthen describes international experience with the key program elementsthat comprise such programs using information from the three keytarget-setting programs as well as from other international programsrelated to industrial energy efficiency or GHG emissionsreductions.

  17. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  18. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  19. Measurement and verification protocols -- Facts and fiction, news from the field

    SciTech Connect (OSTI)

    Schiller, S.R.; Kromer, J.S.

    1998-07-01

    This paper provides descriptions of the 1997 International Performance Measurement and Verification Protocol (IPMVP), the 1996 Federal Energy Management Program's (FEMP) Measurement Verification Guidelines, and the draft ASHRAE 13-P Measurement of Energy and Demand Savings Guideline. These protocols and guidelines are establishing a framework for measurement and verification (M and V) activities throughout the world. The M and V protocols are also being used by the energy performance contracting industry as an educational tool and as the starting point for program specific M and V guidelines. Beyond descriptions of the documents the paper covers how the documents are being sued and the perspective of various user groups--such as government entities, utilities, private companies, and energy services companies. The protocols were designed around four main M and V options to allow flexibility in their application to different types of projects. However, this intentional flexibility has caused confusion among some users who are now required to select the appropriate option, method, level or rigor, and accuracy for their projects. Eventually though, as the protocols are more widely used and more documentation is available on M and V costs and accuracy the industry will become more comfortable selecting the best option and applying the M and V protocols in a more consistent manner for different types of projects and programs.

  20. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    Country Analysis Briefs: India, ENERGY INFO. ADMIN. (Aug.Blog/Blogging-Clean-Energy/india-rejects-mandatory-ghg-cuts/India and Thailand are from SPP independent renewable energy

  1. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  2. GHG | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban TransportFortistarFuelCellsEtcSilicon Co LtdGEOGHD Inc Jump

  3. ARM - Campaign Instrument - ghg

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve4AJ01) (See EnergyCurrent : 0.0 WaitingMay

  4. ARM - Instrument - ghg

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments? WeDatastreamstpsgovInstrumentsclap Documentation ARM DatagovInstrumentsflask

  5. GBTL Workshop GHG Emissions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,Executive Compensation References: FAR 31.205-6Applicationsnatural gas as

  6. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Office of Environmental Management (EM)

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  7. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform...

    Energy Savers [EERE]

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  8. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov [DOE]

    This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007.

  9. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  10. Vehicle Technologies Office Merit Review 2015: Development and Update of Long-Term Energy and GHG Emission Macroeconomic Accounting Tool

    Broader source: Energy.gov [DOE]

    Presentation given by Argonne National Laboratory at 2015 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Office Annual Merit Review and Peer Evaluation Meeting about development and...

  11. Chapter 17: Residential Behavior Protocol

    SciTech Connect (OSTI)

    Stewart, J.; Todd, A.

    2015-01-01

    Residential behavior-based (BB) programs use strategies grounded in the behavioral social sciences to influence household energy use. Strategies may include providing households with real-time or delayed feedback about their energy use; supplying energy-efficiency education and tips; rewarding households for reducing their energy use; comparing households to their peers; and establishing games, tournaments, and competitions. BB programs often target multiple energy end uses and encourage energy savings, demand savings, or both. Savings from BB programs are usually a small percentage of energy use, typically less than 5%.

  12. TrustworthyNetworkingProgram Border Gateway Protocol (BGP):Border Gateway Protocol (BGP)

    E-Print Network [OSTI]

    DegradationPerformance Degradation K. Sriram, D. Montgomery, O. Borchert, O. Kim, andK. Sriram, D. Montgomery

  13. Improving the Security of Cryptographic Protocol Standards

    E-Print Network [OSTI]

    Basin, David

    for their implementation. This generality is enabled by standards and technical documents such as Request for CommentsImproving the Security of Cryptographic Protocol Standards David Basin Cas Cremers Kunihiko Miyazaki Sasa Radomirovic Dai Watanabe May 1, 2014 Keywords: Standards, Network Protocols, Security

  14. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  15. Protocols for Processes Munindar P. Singh

    E-Print Network [OSTI]

    Protocols for Processes Munindar P. Singh (Students: Amit K. Chopra, Nirmit V. Desai, Ashok U. Mallya) singh@ncsu.edu Department of Computer Science North Carolina State University http://www.csc.ncsu.edu/faculty/mpsingh/ c Munindar P. Singh, July 2004 ­ p.1/25 #12;Why Processes and Protocols? Heavy interest from

  16. Positron: Composing Commitment Protocols No Institute Given

    E-Print Network [OSTI]

    to a specific role). We evaluate our contributions by modeling well-known protocols in the insurance, manufactur with how they relate to one another. Such a description, even if supported by standards such as BPMN [20 exchanged by the business partners. In contrast, a commitment protocol emphasizes the social state

  17. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  18. Measuring Transport Protocol Potential for Energy Efficiency

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras. Several attempts have been made to measure the energy efficiency of trans- port protocols, (e.g. [10], [12-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

  19. Context-Aware Protocol Engines for  Ad Hoc Networks

    E-Print Network [OSTI]

    Garcia-Luna-Aceves, J.J.

    2009-01-01

    Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation

  20. Adapting a delay-based protocol to heterogeneous environments 

    E-Print Network [OSTI]

    Kotla, Kiran

    2008-10-10

    We investigate the issues in making a delay-based protocol adaptive to heterogeneous environments. We assess and address the problems a delay-based protocol faces when competing with a loss-based protocol such as TCP. We ...

  1. An Alternative Quantization Protocol for the History Dependent Parrondo Game

    E-Print Network [OSTI]

    Faisal Shah Khan

    2008-06-09

    Earlier work on the quantization of the history dependent (HD) Parrondo game by Flitney, Ng, and Abbott led to the FNA protocol. We propose an alternative quantization protocol for this game which differs from the FNA protocol in various aspects.

  2. Office of Environment, Safety and Health Assessments Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    April 2015 Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 The purpose of this protocol is to establish...

  3. Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Lecture: Coherence Protocols · Topics: wrap-up of memory systems, multi-thread programming models scaling properties and eventually higher density: phase change memory (PCM), spin torque transfer (STT-RAM), etc. · PCM: heat and cool a material with elec pulses ­ the rate of heat/cool determines

  4. Protocol for DOE-VPP Star Site Re-certification Reviews

    Broader source: Energy.gov [DOE]

    This document provides the overall policy and the procedural protocols that will be utilized by the Office of Environment, Safety and Health in conducting re-certification reviews of facilities participating in the Department of Energy Voluntary Protection Program (DOE-VPP) at the Star recognition level.

  5. Former Worker Program Medical Protocol | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report toDepartment of Energycontractors mustW-4Department5

  6. Protocol, Qualification Standard for the Site Lead Program - May 2011 |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department ofDepartment of Energy Qualification

  7. Protocol, Technical Qualification Program - October 22, 2003 | Department

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department ofDepartment of Energy Qualificationof

  8. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

  9. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  10. High Performance Computing Data Center Metering Protocol | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

  11. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

  12. TEC Working Group Topic Groups Archives Protocols Meeting Summaries...

    Office of Environmental Management (EM)

    Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 Jacksonville TEC Meeting,...

  13. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  14. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Office of Environmental Management (EM)

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design...

  15. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  16. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  17. The Development of Rapid Aging and Poisoning Protocols for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices...

  18. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at...

  19. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments Protocol for the Development and Maintenance of Criteria Review and...

  20. Optimizing local protocols implementing nonlocal quantum gates

    E-Print Network [OSTI]

    Scott M. Cohen

    2010-02-02

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and are deterministic while also being "one-shot", in that they use only one copy of an entangled resource state. The optimization is in the sense of minimizing the amount of entanglement used, and it is often the case that less entanglement is needed than with an alternative protocol using two-way teleportation.

  1. Energy Assessment Protocol for Glass Furnaces 

    E-Print Network [OSTI]

    Plodinec, M. J.; Kauffman, B. M.; Norton, O. P.; Richards, C.; Connors, J.; Wishnick, D.

    2005-01-01

    of the protocol are implemented, resulting in cost savings of greater than $200,000 per year. PROJECT OVERVIEW The glass industry is a major energy consumer. Depending on the market sector, a glass furnace heated by oxy-fuel burners may use from 3..., the manufacturer of the burners used in the PPG furnace, brought extensive field experience to the team, as well as in-depth knowledge of burner performance. ENERGY ASSESSMENT PROTOCOL The project team developed the protocol based on DIAL, Eclipse and PPG...

  2. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  3. A SECURE TEXT MESSAGING PROTOCOL Gary Belvin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in conformity with the requirements for the degree of Master of Science in Security Informatics. Baltimore Key Agreement Protocol for SMS (KAPS) 12 3.1 Retransmission Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.9 Key Agreement

  4. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  5. Privacy of encrypted Voice Over Internet Protocol 

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10

    In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the ...

  6. Verifying the Mascara Protocol | A rst step |

    E-Print Network [OSTI]

    Sidorova, Natalia

    Verifying the Mascara Protocol | A #12;rst step | Dragan Bosnacki Dennis Dams Susanne Graf Leszek list properties associated with the di#11;erent entities which we intend to verify or for which we

  7. An Algorithm for Evolving Protocol Constraints 

    E-Print Network [OSTI]

    Collins, Mark

    We present an investigation into the design of an evolutionary mechanism for multiagent protocol constraint optimisation. Starting with a review of common population based mechanisms we discuss the properties of the ...

  8. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    "B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson, C.E. Hancock

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  9. Seismicity Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report AppendicesAVideo » Search resultsEnergyPolicy,Seismicity

  10. 2100. For case 2, the net GHG balance is +57 Pg CO2eq through 2050 and +679 through 2100.

    E-Print Network [OSTI]

    Minnesota, University of

    in a cap-and-trade program. Previous CI estimates for California gasoline (3) suggest that values less than ~96 g CO2eq MJ­1 indicate that blending cellulosic biofuels will help lower the carbon intensity, a substan- tial penalty--in fact, possibly worse than with gasoline--in the first few decades may render

  11. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

    2009-03-27

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

  12. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  13. On the Complexity of Verifying Cyber-Physical Security Protocols

    E-Print Network [OSTI]

    Nigam, Vivek

    On the Complexity of Verifying Cyber-Physical Security Protocols Max Kanovich, Tajana Ban Kirigin agents. We classify such security protocols as Cyber-Physical.6 The key elements of such protocols important class of Bounded Memory Cyber-Physical Security19 Protocols with a Memory Bounded Intruder

  14. Validating a token coherence protocol for scientific Fernandez-Pascual

    E-Print Network [OSTI]

    Acacio, Manuel

    Validating a token coherence protocol for scientific workloads Ricardo Fern´andez-Pascual r.fernandez

  15. Automatic Protocol Selection in Secure Two-Party Computations

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Protocol Selection in Secure Two-Party Computations (Full Version) Florian Kerschbaum1 for the best performance. In this paper we propose automatic protocol selection which selects a protocol, based on an extended performance model we automatically select the best protocol for a sub

  16. Chapter 16: Retrocommissioning Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    Retrocommissioning (RCx) is a systematic process for optimizing energy performance in existing buildings. It specifically focuses on improving the control of energy-using equipment (e.g., heating, ventilation, and air conditioning equipment and lighting) and typically does not involve equipment replacement. Field results have shown proper RCx can achieve energy savings ranging from 5% to 20%, with a typical payback of 2 years or less. A study conducted on behalf of Lawrence Berkeley National Laboratory analyzed data from 11 utilities operating RCx programs across the United States. The dataset included 122 RCx projects and more than 950 RCx measures.

  17. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  18. Hybrid protocol of remote implementations of quantum operations

    E-Print Network [OSTI]

    Ning Bo Zhao; An Min Wang

    2007-08-04

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

  19. Transport Protocol Services (TAPS) Problem: more and more transport protocols available, with various features,

    E-Print Network [OSTI]

    Welzl, Michael

    Transport Protocol Services (TAPS) · Problem: more and more transport protocols that would not offer "TCP or UDP" but "transport services" ­ A transport system: transport-services@ifi.uio.no hXps://sympa.uio.no/ifi.uio.no/info/transport-services · Problem

  20. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    regulation and have gained attention recently within the context of greenhouse gas (GHG) emissions trading

  1. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  2. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  3. Quantum Communication Protocol Employing Weak Measurements

    E-Print Network [OSTI]

    Alonso Botero; Benni Reznik

    1999-09-27

    We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin. In our protocol, Alice, first generates a "code" by performing weak measurements on a sample of N spins. The sample is sent to Bob, who later performs a post-selection by measuring the spin along either of two certain directions. The results of the post-selection define the "key', which he then broadcasts publicly. Using both her previously generated code and this key, Alice is able to infer the {\\em direction} chosen by Bob in the post-selection. Alternatively, if Alice broadcasts publicly her code, Bob is able to infer from the code and the key the direction chosen by Alice for her weak measurement. Two possible experimental realizations of the protocols are briefly mentioned.

  4. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chaneličre; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  5. Abating Greenhouse Gas Emissions through Cash-for-Clunker Programs

    E-Print Network [OSTI]

    Allen, Alexander; Carpenter, Rachel; Morrison, Geoff

    2009-01-01

    by multiplying the passenger car emissions estimate by the36 MPG new car to achieve the same GHG emissions reduction.U.S. (CARS) Stimulate auto industry and reduce GHG emissions

  6. LCA (Life Cycle Assessment) of Parabolic Trough CSP: Materials Inventory and Embodied GHG Emissions from Two-Tank Indirect and Thermocline Thermal Storage (Presentation)

    SciTech Connect (OSTI)

    Heath, G.; Burkhardt, J.; Turchi, C.; Decker, T.; Kutscher, C.

    2009-07-20

    In the United States, concentrating solar power (CSP) is one of the most promising renewable energy (RE) technologies for reduction of electric sector greenhouse gas (GHG) emissions and for rapid capacity expansion. It is also one of the most price-competitive RE technologies, thanks in large measure to decades of field experience and consistent improvements in design. One of the key design features that makes CSP more attractive than many other RE technologies, like solar photovoltaics and wind, is the potential for including relatively low-cost and efficient thermal energy storage (TES), which can smooth the daily fluctuation of electricity production and extend its duration into the evening peak hours or longer. Because operational environmental burdens are typically small for RE technologies, life cycle assessment (LCA) is recognized as the most appropriate analytical approach for determining their environmental impacts of these technologies, including CSP. An LCA accounts for impacts from all stages in the development, operation, and decommissioning of a CSP plant, including such upstream stages as the extraction of raw materials used in system components, manufacturing of those components, and construction of the plant. The National Renewable Energy Laboratory (NREL) is undertaking an LCA of modern CSP plants, starting with those of parabolic trough design.

  7. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    which provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with...

  8. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  9. Comparing Communication Protocols under Cooperative Pressure

    E-Print Network [OSTI]

    Eiben, A.E. "Guszti"

    Comparing Communication Protocols under Cooperative Pressure A.E. Eiben M.C. Schut N. Vink largely on the abilities of the agents to cooperate and communicate. In environments where coordination is essential for goal accomplishment, agents must thus appropriately communicate for cooperative task

  10. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode · end-to-end tunnel mode · security-gateway to security-gateway transport mode and tunnel model can coexist #12;7© Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi

  11. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  12. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  13. Efficiency Limitations for -Protocols for Group Homomorphisms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Limitations for -Protocols for Group Homomorphisms (Full Version) Endre Bangerter1 , Jan stephan.krenn@bfh.ch Abstract. Efficient zero-knowledge proofs of knowledge for group ho- momorphisms be performed very efficiently within groups of known order, for hidden order groups the respective proofs

  14. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  15. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    structure called the blockchain. The protocol requires from miners to solve a "proof of work" (POW, aka-forcing a hash inequality based on SHA-256, in order to generate new blocks for the blockchain. The blocks that comprise the blockchain contain sets of transactions that are generated at will by owners of bitcoins, who

  16. Increasing Communications Security through Protocol Parameter Diversity

    E-Print Network [OSTI]

    New Mexico, University of

    of the protocol more difficult to predict. This form of diversity is designed to mitigate the shrew attack [16 Rica, 2060 gbarrantes@ecci.ucr.ac.cr and Stephanie Forrest University of New Mexico, Department. Recently, several projects have addressed the problem of widely replicated attacks through a technique

  17. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  18. Adaptive best effort protocols for video delivery 

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01

    data when transmitted over best-effort networks like the Internet. The protocols are end-to-end, and do not propose any modifications (like reservations) to the network infrastructure-hence, they can be used over the existing Internet. The design...

  19. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming languages are likely to encounter projects in the near future that require knowledge of Java. Who Should

  20. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming are likely to encounter projects in the near future that require knowledge of Java. Who Should Enroll

  1. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  2. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  3. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  4. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect (OSTI)

    Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Leitch, Rosalyn M [Los Alamos National Laboratory

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  5. Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley

    E-Print Network [OSTI]

    Foley, Simon

    and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

  6. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    E-Print Network [OSTI]

    Jump, David

    2014-01-01

    for   Proprietary  Software  Testing  Protocols”  (vendors   value   software   testing   as   a   means   to  and  requirements  for  testing  software  vendor  energy  

  7. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    Deng, Yuxin

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1 , St´ephane Grumbach2 , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  8. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1,2, , St´ephane Grumbach3, , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  9. Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko

    E-Print Network [OSTI]

    Goddard, Wayne

    Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet

  10. Concrete Security for Entity Recognition: The Jane Doe Protocol

    E-Print Network [OSTI]

    Zenner, Erik

    Concrete Security for Entity Recognition: The Jane Doe Protocol Stefan Lucks1 , Erik Zenner2 , Andr NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether ­ the "Jane Doe Protocol" ­, and provides a formal proof of its concrete security. The protocol neither

  11. Automated protocol selection for energy efficient WSN applications

    E-Print Network [OSTI]

    Atkinson, Robert C

    Automated protocol selection for energy efficient WSN applications C. Shen, S. Harte, E. Popovici the implementation of different protocols for different topology and appli- cation scenarios to optimise the overall Heterogeneous Automated Wireless Sensor (THAWS), embedding a reactive routing protocol, an energy

  12. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  13. Evaluation of Efficiency Activities in the Industrial Sector Undertaken in Response to Greenhouse Gas Emission Reduction Targets

    E-Print Network [OSTI]

    Price, Lynn

    2010-01-01

    management program following national energy managementwith national-level energy or GHG tax programs, LBNLnational level energy efficiency and GHG emissions reduction programs.

  14. An Evaluation of UDP Transport Protocols

    SciTech Connect (OSTI)

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  15. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later algorithm � cipher spec · encryption algorithm · message digest algorithm � master secret · 48 byte shared secret � is resumable flag · can be used to initiate new connections 10© Ravi Sandhu 2001 SSL CONNECTION

  16. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later secret · 48 byte shared secret is resumable flag · can be used to initiate new connections 10© Ravi each keys generated from master secret, client/server random client_write_MAC_secret server_write_MAC_secret

  17. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  18. A Protocol for Quantum Energy Distribution

    E-Print Network [OSTI]

    Masahiro Hotta

    2008-07-10

    A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

  19. San Francisco Estuary Wetlands Regional Monitoring Program Plan

    E-Print Network [OSTI]

    San Francisco Estuary Wetlands Regional Monitoring Program Plan: Version 1 Framework and Protocols Wetlands Regional Monitoring Program Steering Committee Compiled and Edited by Joshua N. Collins, PhD San ................. 91 #12;#12;Wetlands Regional Monitoring Program Plan 2002 Executive Summary i San Francisco Estuary

  20. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  1. The Greenhouse Gas Protocol Initiative: Measurement and Estimation of

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al., 2013) |Information 5thInformation GeyserUncertainty of GHG

  2. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  3. US - Voice Over Internet Protocol Phone Service Providers Market Analysis

    E-Print Network [OSTI]

    Srinivasan, Vijaybabu

    2006-05-19

    .263 Bit stream in the Real-time Transport Protocol Vijaybabu Srinivasan Spring 2006 17 EMGT835 RTCP RTP Control protocol RTP Real-Time Transport H.323 Protocols... Total 100 Reputation/ Image: Evaluation Criteria: Reputation is the current sum total of the specific traits attributed to a company by people. A company?s reputation is produced by the memory impressions of its perceived actions over time. 13...

  4. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    Nevada State Protocol Agreement for Implementing the National Historic Preservation Act Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory...

  5. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

  6. Sandia Energy - Sandia to Discuss Energy-Storage Test Protocols...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communication within the power system. These protocols will provide for evaluation of energy storage interoperability and functionality, providing frequency and voltage stability...

  7. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  8. Chapter 15: Commercial New Construction Protocol. The Uniform...

    Energy Savers [EERE]

    Construction Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  9. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  10. Ensure Program Correctness Programming Languages

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Ensure Program Correctness Programming Languages and Formal Methods Research Group Lab Coordinator Bow-Yaw Wang The Programming Languages and Formal Methods Research Group develops techniques to help ensure program correctness. Our research in programming languages focuses on syntactic, semantic

  11. Method and apparatus for collaborative use of application program

    DOE Patents [OSTI]

    Dean, Craig D. (Sandia Park, NM)

    1994-01-01

    Method and apparatus permitting the collaborative use of a computer application program simultaneously by multiple users at different stations. The method is useful with communication protocols having client/server control structures. The method of the invention requires only a sole executing copy of the application program and a sole executing copy of software comprising the invention. Users may collaboratively use a set of application programs by invoking for each desired application program one copy of software comprising the invention.

  12. A ClassChest for Deriving Transport Protocols W. Timothy Strayer

    E-Print Network [OSTI]

    Strayer, William Timothy

    , California strayer@ca.sandia.gov Abstract Development of new transport protocols or protocol algo­ rithmsA Class­Chest for Deriving Transport Protocols W. Timothy Strayer Sandia National Laboratories to transport protocols, so that the focus is placed on the protocol­specific aspects. The Meta­ Transport

  13. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  14. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  15. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  16. Implementing a Low Power TDMA Protocol Over 802.11

    E-Print Network [OSTI]

    and contrast our protocol to other wireless power- saving mechanisms, then discuss the design, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow

  17. FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and dis- tributed control applications. We present formal for systematic and extensive testing of Modbus devices. Keywords: SCADA Protocol, Modbus, Test-case Generation, Formal Methods 1. Introduction A distributed digital control system--sometimes called a SCADA system

  18. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single

  19. On the Design and Implementation of Secure Network Protocols

    E-Print Network [OSTI]

    Paterson, Kenny

    On the Design and Implementation of Secure Network Protocols Nadhem J. AlFardan Thesis submitted Hart, for providing all what I needed to carry out my laboratory work. Finally, thanks to everyone who kept asking me "are you done yet?". 4 #12;Abstract Network Protocols are critical to the operation

  20. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ˘ˇ¤Ł Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  1. Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation

    E-Print Network [OSTI]

    Han, Qi "Chee"

    Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation Alan Marchiori, Lin It is a difficult endeavor to realistically evaluate the perfor- mance of wireless sensor network (WSN) protocols. Generic network simulators are often used, but they tend to rely on synthetic models. Because WSN

  2. Rational Protocol Design: Cryptography Against Incentive-driven Adversaries

    E-Print Network [OSTI]

    Maurer, Ueli

    in part by NSF awards #0830464, #1111599, and #1223623, the Army Research Laboratory under Cooperative Research Projects Agency through the U.S. Office of Naval Research under Contract N00014-Cryptographic Protocols, Game Theory, Se- cure Computation, Composition I. INTRODUCTION Consider a cryptographic protocol

  3. Secure Wireless Payment Protocol School of Computer Science

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Secure Wireless Payment Protocol Hong Wang School of Computer Science Carleton University 1125 Colonel By Drive, Ottawa, Canada Abstract With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols

  4. Design of a PSi header processor for the internet protocol 

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01

    bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

  5. ''GANGS'' MAC Protocol Proposal Saad Biaz Dai Yawen

    E-Print Network [OSTI]

    consumption. This paper presents a MAC layer protocol, named ''GANGS'', as a method of saving energy in sensor is not necessarily engineered or predetermined. Because of this, sensor network protocols and algorithms must be self the most energy, followed by radios. Processor and sensor power consumption are usually less important [8

  6. Bliss: Specifying Declarative Service Protocols Munindar P. Singh

    E-Print Network [OSTI]

    Bliss: Specifying Declarative Service Protocols Munindar P. Singh North Carolina State University Raleigh, NC 27695-8206, USA singh@ncsu.edu Abstract--BSPL, the Blindingly Simple Protocol Language, dispensing with conventional control flow features such as sequencing and choice. Singh [1] previously showed

  7. Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn

    E-Print Network [OSTI]

    Lam, Simon S.

    Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn Dong-Young Lee. For a system under churn, it is impossible to maintain a correct distributed DT continually. We define of protocols maintains high accuracy for systems under churn and each system converges to 100% accuracy after

  8. Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks Masaya Yoshida ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy protocols for power-efficient data collection have been proposed [1][2]. Recently, energy harvesting has

  9. Alternative Experimental Protocol for a PBR-Like Result

    E-Print Network [OSTI]

    D. J. Miller

    2012-02-29

    Pusey, Barrett and Rudolph (PBR) have recently proven an important new theorem in the foundations of quantum mechanics. Here we propose alternative experimental protocols which lead to the PBR result for a special case and a weaker PBR-like result generally. Alternative experimental protocols support the assumption of measurement independence required for the PBR theorem.

  10. Improving the Battery Performance of Ad-Hoc Routing Protocols

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department-- In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism

  11. Transport Protocol Behavior and Energy-Saving Lefteris Mamatas

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    networks [1]. Several attempts have been made to measure the energy efficiency of transport protocols, (eTransport Protocol Behavior and Energy-Saving Potential Lefteris Mamatas Demokritos University of the transport level needs to be associated with some energy potential index which, unlike energy expenditure

  12. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  13. Design and Analysis of Communication Protocols for Quantum Repeater Networks

    E-Print Network [OSTI]

    Cody Jones; Danny Kim; Matthew T. Rakher; Paul G. Kwiat; Thaddeus D. Ladd

    2015-05-06

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

  14. Combinatorial Evolution and Forecasting of Communication Protocol ZigBee

    E-Print Network [OSTI]

    Levin, Mark Sh; Kistler, Rolf; Klapproth, Alexander

    2012-01-01

    The article addresses combinatorial evolution and forecasting of communication protocol for wireless sensor networks (ZigBee). Morphological tree structure (a version of and-or tree) is used as a hierarchical model for the protocol. Three generations of ZigBee protocol are examined. A set of protocol change operations is generated and described. The change operations are used as items for forecasting based on combinatorial problems (e.g., clustering, knapsack problem, multiple choice knapsack problem). Two kinds of preliminary forecasts for the examined communication protocol are considered: (i) direct expert (expert judgment) based forecast, (ii) computation of the forecast(s) (usage of multicriteria decision making and combinatorial optimization problems). Finally, aggregation of the obtained preliminary forecasts is considered (two aggregation strategies are used).

  15. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol, and environmental effects. In turn, the greenhouse gas and atmospheric aerosol assumptions underlying climate://mit.edu/globalchange/ Printed on recycled paper #12;Russia's Role in the Kyoto Protocol A. Bernarda , S. Paltsevb , J. Reillyb

  16. A Protocol for Estimating and Mapping Global EGS Potential | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand Dalton JumpProgram | OpenEnergyEvaluationOpenInformation Protocol

  17. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Bray, Kathryn L.; Conover, David R.; Kintner-Meyer, Michael CW; Viswanathan, Vijayganesh; Ferreira, Summer; Rose, David; Schoenwald, David

    2012-10-01

    The U.S. Department of Energy’s Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of EESs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  18. Protocol for uniformly measuring and expressing the performance of energy storage systems.

    SciTech Connect (OSTI)

    Ferreira, Summer Rhodes; Rose, David Martin; Schoenwald, David Alan; Bray, Kathy; Conover, David; Kintner-Meyer, Michael; Viswanathan, Vilayanur

    2013-08-01

    The U.S. Department of Energy's Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of ESSs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs to make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  19. Greenhouse gas emissions trading in U.S. States: observations and lessons from the OTC NOx Budget Program

    SciTech Connect (OSTI)

    Andrew Aulisi; Alexander E. Farrell; Jonathan Pershing; Stacy VanDeveer

    2005-07-01

    A number of U.S. states are considering market-based policies to reduce emissions of greenhouse gases (GHGs). The experience gained from emissions trading for sulfur dioxide and oxides of nitrogen (NOx) offers a useful body of information and data to draw on to design a GHG emissions trading system. This report examines NOx trading under the Ozone Transport Commission (OTC) NOx Budget Program, which resulted principally from the leadership, decisions, and actions by a group of states, ultimately becoming the first multilateral cap-and-trade system for emissions of air pollutants. 72 refs.

  20. Fast controlled unitary protocols using group or quasigroup structures

    E-Print Network [OSTI]

    Li Yu

    2013-03-12

    A nonlocal bipartite unitary gate can sometimes be implemented using prior entanglement and only one round of classical communication in which the two parties send messages to each other simultaneously. This cuts the classical communication time by a half compared to the usual protocols, which require back-and-forth classical communication. We introduce such a "fast" protocol that can implement a class of controlled unitaries exactly, where the controlled operators form a subset of a projective representation of a finite group, which may be Abelian or non-Abelian. The entanglement cost is only related to the size of the group and is independent of the dimension of the systems. We also introduce a second fast protocol that can implement any given controlled unitary approximately. This protocol uses the algebraic structure of right quasigroups, which are generalizations of quasigroups, the latter being equivalent to Latin squares. This second protocol could optionally use shared classical randomness as a resource, in addition to using entanglement. When compared with other known fast unitary protocols, the entanglement cost of this second protocol is lower for general controlled unitaries except for some rare cases.

  1. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

  2. Technical Cost Modeling - Life Cycle Analysis Basis for Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reductions in GHG, criteria pollutants and acidification gases and * Development of LCA framework based on ISO standards and LCA technical reports such as 14040, 14044, and...

  3. Program School/ Career: Descripton ISIS Program Codes

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

  4. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  5. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  6. Delayed response protocols for high-delay wireless networks 

    E-Print Network [OSTI]

    Sadry, Nauzad Erach

    2002-01-01

    Wireless networks have become more prevalent over the last few years. These networks introduce different types of errors, which are due to the unpredictable nature of the wireless channel. The congestion control algorithms of existing TCP protocols...

  7. Rapid designs for cache coherence protocol engines in Bluespec

    E-Print Network [OSTI]

    Ng, Man Cheuk, 1980-

    2005-01-01

    In this thesis, we present the framework for Rapid Protocol Engine Development (RaPED). We implemented the framework in Bluespec, which is a high level hardware language based on Term Rewriting Systems (TRSs). The framework ...

  8. A Secure Routing Protocol for Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Klappenecker, Andreas

    't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification ­ Tunneling Two

  9. LDP : location discovery protocol for data center networks

    E-Print Network [OSTI]

    Pamboris, Andreas

    2009-01-01

    3.1 Data center network topology . . . . . . . 3.2 De?ningA Scalable, Commodity Data Center Network Architecture. InDiscovery Protocol for Data Center Networks A thesis

  10. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingŐumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  11. A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures

    E-Print Network [OSTI]

    Acacio, Manuel

    A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures Ricardo Fern Murcia SPAIN {r.fernandez,jmgarcia,meacacio}@ditec.um.es Jos´e Duato Dpto. Inform´atica de Sistemas y

  12. 2002/11/12 Roberto Innocente 1 Transport protocols

    E-Print Network [OSTI]

    Innocente, Roberto

    that that the receiver is flooded by the sender · TCP as many other protocols uses a sliding window mechanism · in every congestion control · It had an importance similar to that the Watt's Flyball regulator had for the steam

  13. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  14. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  15. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  16. High Performance Computing Data Center Metering Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancing ProgramsDepartment of¡High Performance Computing Data

  17. O C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol

    E-Print Network [OSTI]

    Segall, Adrian

    , j}.At the end, the east table of node a is {b, c, d, e, j}. a i f ec g h db j 100 200 300 400 500 with updated information. f c g h a b d 100 200 300 400 500 600 100 200 300 400 h? source access target h? h! hO C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol For Wireless Ad Hoc

  18. A FAST MENTAL POKER PROTOCOL TZER-JEN WEI AND LIH-CHUNG WANG

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a fast and secure mental poker protocol. It is twice as fast as similar protocols, namely Barnett, 27, 28, 29], see [7] for a survey). Barnett-Smart's protocol is proposed in 2003 ([3]). It canGamal-based version. Castellŕ-Roca's protocol is proposed in 2004 ([7]). It is similar to Barnett-Smart, but faster

  19. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  20. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  1. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  2. Program Administration

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume describes program administration that establishes and maintains effective organizational management and control of the emergency management program. Canceled by DOE G 151.1-3.

  3. Interlanguage Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Interlanguage Programming Interlanguage Programming This page provides examples of compilation and running scripts when mixing CC++ with Fortran codes. CMPI Main Calling Fortran...

  4. Accessible programming using program synthesis

    E-Print Network [OSTI]

    Singh, Rishabh

    2014-01-01

    New computing platforms have greatly increased the demand for programmers, but learning to program remains a big challenge. Program synthesis techniques have the potential to revolutionize programming by making it more ...

  5. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  6. Protocol: Rat Cardiac CINE with Tagging, Page 1 of 4 Author: rgb 3/16/2012 Protocol: Rat Cardiac CINE with Tagging

    E-Print Network [OSTI]

    California at San Diego, University of

    the heart at isocenter. Water Phantom Place a 15 mL tube containing water and sealed with a screw top.5 mm 5cmx5cm 15 min Protocol Steps 1. Set up the physio equipment. Follow the instructions below. See the "Positioning" section below. 4. Protocol directory. The protocols can be loaded from

  7. New York City Paid Time Off and Sick Leave Protocol The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This

    E-Print Network [OSTI]

    New York City Paid Time Off and Sick Leave Protocol 1. Scope The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This protocol applies only to employees of Carnegie Mellon University who work at least eighty (80) hours per calendar year within the City of New York, NY

  8. Combustion Safety Simplified Test Protocol Field Study

    SciTech Connect (OSTI)

    Brand, L.; Cautley, D.; Bohac, D.; Francisco, P.; Shen, L.; Gloss, S.

    2015-11-01

    Combustions safety is an important step in the process of upgrading homes for energy efficiency. There are several approaches used by field practitioners, but researchers have indicated that the test procedures in use are complex to implement and provide too many false positives. Field failures often mean that the house is not upgraded until after remediation or not at all, if not include in the program. In this report the PARR and NorthernSTAR DOE Building America Teams provide a simplified test procedure that is easier to implement and should produce fewer false positives. A survey of state weatherization agencies on combustion safety issues, details of a field data collection instrumentation package, summary of data collected over seven months, data analysis and results are included. The project team collected field data on 11 houses in 2015.

  9. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  10. A complete Randomized Benchmarking Protocol accounting for Leakage Errors

    E-Print Network [OSTI]

    T. Chasseur; F. K. Wilhelm

    2015-07-09

    Randomized Benchmarking allows to efficiently and scalably characterize the average error of an unitary 2-design such as the Clifford group $\\mathcal{C}$ on a physical candidate for quantum computation, as long as there are no non-computational leakage levels in the system. We investigate the effect of leakage errors on Randomized Benchmarking induced from an additional level per physical qubit and provide a modified protocol that allows to derive reliable estimates for the error per gate in their presence. We assess the variance of the sequence fidelity corresponding to the number of random sequences needed for valid fidelity estimation. Our protocol allows for gate dependent error channels without being restricted to perturbations. We show that our protocol is compatible with Interleaved Randomized Benchmarking and expand to benchmarking of arbitrary gates. This setting is relevant for superconducting transmon qubits, among other systems.

  11. Continuous-Variable Protocols in the Noisy-Storage Model

    E-Print Network [OSTI]

    Fabian Furrer; Christian Schaffner; Stephanie Wehner

    2015-09-30

    We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achieve security by establishing a trade-off between quantum uncertainty generated in the protocol and the classical capacity of the memory channel. As our main technical tool, we study and derive new uncertainty relations for continuous-variable systems. Finally, we provide explicit security parameters for realistic memory models.

  12. Local quantum protocols for separable measurements with many parties

    E-Print Network [OSTI]

    Scott M. Cohen

    2013-03-20

    In a recent paper \\cite{mySEPvsLOCC}, we showed how to construct a quantum protocol for implementing a bipartite, separable quantum measurement using only local operations on subsystems and classical communication between parties (LOCC) within any fixed number of rounds of communication, whenever such a protocol exists. Here, we generalize that construction to one that applies for any number of parties. One important observation is that the construction automatically determines the ordering of the parties' measurements, overcoming a significant apparent difficulty in designing protocols for more than two parties. We also present various other results about LOCC, including showing that if, in any given measurement operator of the separable measurement under consideration, the local parts for two different parties are rank-1 operators that are not repeated in any other measurement operator of the measurement, then this separable measurement cannot be exactly implemented by LOCC in any finite number of rounds.

  13. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chevassut, Olivier [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-11-12

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  14. Fast protocols for local implementation of bipartite nonlocal unitaries

    E-Print Network [OSTI]

    Li Yu; Robert B. Griffiths; Scott M. Cohen

    2012-01-06

    In certain cases the communication time required to deterministically implement a nonlocal bipartite unitary using prior entanglement and LOCC (local operations and classical communication) can be reduced by a factor of two. We introduce two such "fast" protocols and illustrate them with various examples. For some simple unitaries, the entanglement resource is used quite efficiently. The problem of exactly which unitaries can be implemented by these two protocols remains unsolved, though there is some evidence that the set of implementable unitaries may expand at the cost of using more entanglement.

  15. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  16. Sponsors of CIEEDAC: Environment Canada Natural Resources Canada, Canadian Industry Program for Energy Conservation, Aluminium Industry Association, Canadian Chemical Producers' Association, Canadian Electricity

    E-Print Network [OSTI]

    of making more transparent data available to the public; · initiating the historical GHG emissions review ++ ­ + Prices + ­ + Crude oil -use Energy Data and Analysis Centre Simon Fraser University, Burnaby, BC February, 2008 #12;GHG Emissions

  17. Development of an Updated Induced Seismicity Protocol for the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Peer Review Report DOE 2010 Geothermal Technologies Program Peer Review seismic024majer.pdf More Documents & Publications Microearthquake Technology for EGS...

  18. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  19. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  20. Development and Validation of a Simple Protocol To Rapidly

    E-Print Network [OSTI]

    pollutants in waste air biofilters. The protocol involves the determination of two pollutant concentration with low concentrations of pollutants. Biofilters work by passing humidified polluted air through a bed > aromatics > alkanes. An attempt was made to correlate the pollutant elimination with Henry's coefficient

  1. Security Analysis of an Open Car Immobilizer Protocol Stack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    --apply the principle of open evaluation. A recent example is the specification of an open security protocol stack in principle be deployed on any suitable type of transponder chip. In this paper we re-evaluate the security] and the KeeLoq algo- rithm used in remote control systems [8] demonstrate the risks of this security

  2. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  3. Simplified VO M&V Protocol Simplified Voltage Optimization (VO)

    E-Print Network [OSTI]

    modeling is mentioned, it refers to using industry accepted distribution system power flow simulation tools the verification process. · Calculations of all system improvements (reduction of line losses and no-load lossesSimplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification

  4. A Practical Hybrid-ARQ Protocol Using Noncoherent Orthogonal Modulation

    E-Print Network [OSTI]

    Valenti, Matthew C.

    requests. The proposed protocol is suitable for IEEE 802.15.4/Zigbee networks using commodity off networks that follow the Bluetooth standard or sensor networks that follow the IEEE 802.15.4/Zigbee. For instance, Bluetooth uses nonorthogonal binary Gaussian fre- quency shift keying (GFSK) while Zigbee uses 16

  5. Automating the Sandia Advanced Interoperability Test Protocols Jay Johnson1

    E-Print Network [OSTI]

    systems) interoperability and electrical behavior functionality as specified by the IEC technical reportAutomating the Sandia Advanced Interoperability Test Protocols Jay Johnson1 and Bob Fox2 1 Sandia -- As the penetration of non-dispatchable renewable energy increases around the world, there is greater need to have

  6. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  7. Fast Automatic Synthesis of Security Protocols Using Backward Search

    E-Print Network [OSTI]

    Foley, Simon

    backward. ---Sir Arthur Conan Doyle (Sherlock Holmes), A Study in Scarlet, 1887. Categories and Subject]: Protocol Verifica­ tion; K.6.5 [Security and Protection]: Authentication; D.2.4 [Software­ veloped such as [5, 10, 9, 19, 17, 22]. However, little work has been carried out on systematic approaches

  8. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    Mitchell, Chris

    ] as the 2nd edition of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks] is different to the Cheng- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  9. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks on both mechanism- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack' refers proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  10. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  11. Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    E-Print Network [OSTI]

    Merro, Massimo

    , temperature); they are used as embedded systems (e.g., biomedical sensor engineering, smart homes) or mobile sensor networks. A simulation theory is developed to compare probabilistic protocols that have similar are usually based on discrete-event simulators (e.g., ns-2, Opnet and Glomosim). However, different simulators

  12. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  13. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  14. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  15. Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement Organization and oversee the field testing of the draft Regional Supplement. Field testing will be done in cooperation, the District coordinator will provide team members with an introduction to the Regional Supplement

  16. Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement Organization of field the field testing of the draft Regional Supplement. Field testing will be done in cooperation with regional, the District coordinator will provide team members with an introduction to the Regional Supplement

  17. Combining algorithms for deciding knowledge in security protocols #

    E-Print Network [OSTI]

    Doyen, Laurent

    protocols requires a precise un­ derstanding of the attacker knowledge. Two standard notions are usu­ ally â?? E and the ACI Jeunes Chercheurs JC9005. #12; completely unrealistic to require that the Boolean true and some standard bisimulation conditions. Both of these relations rel

  18. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  19. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  20. An Oblivious Transfer Protocol with Log-Squared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6-computation and communication (k · log2 n + · log n), where k is a possibly non-constant security parameter. The new proto- col communication and is private in the standard complexity-theoretic model. Keywords. Computationally

  1. An Oblivious Transfer Protocol with LogSquared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log­Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6­computation and communication #(k · log 2 n + # · log n), where k is a possibly non­constant security parameter. The new proto the same asymptotic communication and is private in the standard complexity­theoretic model. Keywords

  2. Communication-Efficient Private Protocols for Longest Common Subsequence

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark, gondree, mohassel}@cs.ucdavis.edu Abstract. We design communication efficient two-party and multi Russians" algorithmic de- sign. This result is the first improvement to the communication complex- ity

  3. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    E-Print Network [OSTI]

    Barrash, Warren

    An interactive Bayesian geostatistical inverse protocol for hydraulic tomography Michael N. Fienen April 2008; published 25 July 2008. [1] Hydraulic tomography is a powerful technique for characterizing, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose

  4. Completely positive classical structures and sequentializable quantum protocols

    E-Print Network [OSTI]

    Chris Heunen; Sergio Boixo

    2012-10-02

    We study classical structures in various categories of completely positive morphisms: on sets and relations, on cobordisms, on a free dagger compact category, and on Hilbert spaces. As an application, we prove that quantum maps with commuting Kraus operators can be sequentialized. Hence such protocols are precisely as robust under general dephasing noise when entangled as when sequential.

  5. Parallel and Concurrent Security of the HB and HB + Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ## Abstract Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB + protocol is proven secure against active computationally­intensive to be utilized. With this motivation in mind, Juels and Weis [20] --- building upon work

  6. Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate

    E-Print Network [OSTI]

    Morozov, Kirill

    . Building on their result, we extend it in two ways: 1) we construct ef- ficient passively-secure protocols-theoretic security for both parties, hence building OT as- suming noisy resources (channels or correlations channel or correlation in the case of passive cheaters. Their construction was inefficient. The OT

  7. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  8. Publickey cryptography and password protocols Shai Halevi \\Lambda

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this scenario, and show that the security of these protocols can be formally proven based on standard in situations where the client's machine does not have the means to validate the server's public key. Public devices. \\Lambda IBM T.J.Watson Research Center, PO Box 704, Yorktown Heights, New York 10598, USA Email

  9. The Accelerated Ring Protocol: Ordered Multicast for Modern Data Centers

    E-Print Network [OSTI]

    Amir, Yair

    performance in 1- Gig and 10-Gig networks. We also implemented the full protocol in the open-source Spread Toolkit and evaluated its performance relative to the previous version of the toolkit in a 1-Gig local area network, virtualized 1-Gig local area settings, and a 10-Gig local area network. The results

  10. Analysing the PGM Protocol with UPPAAL Batrice Brard Patricia Bouyer

    E-Print Network [OSTI]

    Doyen, Laurent

    the probability of negative acknowledgements (NAK) implosion and the load of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference, which turns out not to be always verified but to depend on the values of several parameters that we

  11. Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk1 , Stephan, or reuse of any copyrighted component of this work in other works. Abstract. Efficiency is the bottleneck adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting

  12. Abstraction and Implementation of a Lightweight Distributed Termination Protocol

    E-Print Network [OSTI]

    Dobson, Simon

    Abstraction and Implementation of a Lightweight Distributed Termination Protocol D.M. Goodeve , C, University of Leeds, UK Department of Computer Science, Trinity College Dublin, Eire Abstract Termination synchronisation on this state costly. Many parallel applica- tions are structured such that termination occurs

  13. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Design an anycast WSN for a wind turbine SHM application that is very energy efficient. meets reliability for turbine structural health monitoring Are composed of sensor nodes Are very resource constrained

  14. Scaling security in pairing-based protocols Michael Scott

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scaling security in pairing-based protocols Michael Scott School of Computing Dublin City potential advantage in smart-card and embedded applications ­ security can be scaled up while continuing been addressed by Koblitz and Menezes [18] and Granger, Page and Smart [15]. As will be seen our

  15. EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Durresi, Arjan

    EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks Sasanka Madiraju Cariappa in an intelligent manner. We study the concept of energy fairness in routing in Sensor Networks so as to increase to route data based on the residual energy of the nodes. This algorithm divides the network into different

  16. An Energy-Aware Simulation Model and Transaction Protocol

    E-Print Network [OSTI]

    Pedram, Massoud

    functioning in a real world environment ! We study the effects of redistributing energy on the two network ! Communication energy: power consumption for SR transmission and reception ! Data transmission energy1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution

  17. TCP over Wireless Multi-hop Protocols: Simulation and Experiments

    E-Print Network [OSTI]

    Wang, Lan

    TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive http://www.cs.ucla.edu/NRL/wireless Abstract In this study we investigate the interaction between TCP

  18. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  19. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  20. Packet Drop Avoidance for High-speed network transmission protocol

    SciTech Connect (OSTI)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  1. BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects

    E-Print Network [OSTI]

    BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects Title: Principal) Study subjects: A total of _____ subjects were enrolled since the last report to the IRB. Since initial study approval on _____________ a total of _____ subjects have been enrolled in this study and ____ have

  2. ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ungerer, Theo

    of California, Irvine, USA, Phone: (949) 824-8720, email: nader@uci.edu mode. The energy cost rises enormouslyESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer and Nader Bagherzadeh Abstract--Most wireless sensor networks rely on battery energy. In applications

  3. Interactions Among Ionospheric Propagation, HF Modems, and Data Protocols

    E-Print Network [OSTI]

    Johnson, Eric E.

    Mexico State University Abstract The well-known challenges in using the ionospheric skywave channel to Internet-style network- and ap- plication-layer protocols, which have been designed with reliable, high that will form the basis of reliable Internet operation via next-generation HF radio networks. Introduction

  4. ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson

    E-Print Network [OSTI]

    Johnson, Eric E.

    ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson New Mexico State University ABSTRACT The explosion of interest in using Internet-style applica- tions over wireless links prompts investigation links with Internet-style workloads. The investigation is focused on high-frequency radio links

  5. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

  6. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  7. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  8. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  9. Analysis of Remote Sensing Data for Development of I/M Program Evaluation

    E-Print Network [OSTI]

    Denver, University of

    of a non-dispersive infrared (IR) component for detecting carbon monoxide, carbon dioxide (CO2Analysis of Remote Sensing Data for Development of I/M Program Evaluation Protocols Sajal S 48105 Order number: 9A-0633-NAEX #12;Analysis of Remote Sensing Data for Development of I/M Program

  10. Dynamic collision reduction protocol for ultra-wide bandwidth multiple access networks

    E-Print Network [OSTI]

    Tomezak, Gregory John, 1980-

    2004-01-01

    In this thesis, we provide a cross-layer analysis of the throughput of the dynamic collision reduction (DCR) protocol, a multiple access protocol that requires frame synchronization. At the physical-layer, we develop the ...

  11. On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

  12. Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair NXP Semiconductors, Leuven, Belgium, ventzislav.nikov@nxp.com, marc.vauclair@nxp.com Abstract. Distance-bounding protocols

  13. A Backup Route Aware Routing Protocol Fast Recovery from Transient Routing Failures

    E-Print Network [OSTI]

    Gao, Lixin

    in experimental studies [14], [15]. Border Gateway Protocol (BGP), a path vector protocol for interdomain routing al [4] propose a solution using pre-established protection tunnels to reroute traffic during failures

  14. Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D

    2003-01-01

    Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc

  15. Benthic Community Assessment Rapid Bioassessment Protocol: Benthic Macroinvertebrates (EPA 1989, 1999) .........................665

    E-Print Network [OSTI]

    Pitt, Robert E.

    Macroinvertebrates (EPA 1989, 1999) .........................665 Sample Collection ......................................................................................................................................690 RAPID BIOASSESSMENT PROTOCOL: BENTHIC MACROINVERTEBRATES (EPA 1989, 1999) As with the habitat is presented below. However, the Rapid Bioassessment Protocols (RBP) outlined by the U.S. EPA (EPA 1989, 1999

  16. The influence of purification protocol and pH on tomato spotted wilt virions 

    E-Print Network [OSTI]

    Shimek, Christina Marie

    1993-01-01

    particles within the final pellet, an immunosorbent electron microscopy (ISEM) assay was performed on the purified virons obtained from each of the protocols. When the pH level was varied using protocol B, the purified virions were observed without...

  17. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks 

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...

  18. IMPACTS: Industrial Technologies Program, Summary of Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IMPACTS: Industrial Technologies Program, Summary of Program Results for CY2009 IMPACTS: Industrial Technologies Program, Summary of Program Results for CY2009...

  19. California Energy Incentive Programs: An Annual Update on Key Energy Issues and Financial Opportunities for Federal Sites in California

    SciTech Connect (OSTI)

    2011-12-01

    A spate of recently enacted energy legislation and associated program changes is providing numerous opportunities to help California federal energy managers cut costs and meet their renewables, energy efficiency and GHG emissions goals. In April 2011, Governor Jerry Brown approved the nation’s most ambitious renewable portfolio standard (RPS), which requires 33% of the state’s electricity to come from renewable energy sources by 2020. Policy changes that will support the RPS include expanded eligibility rules that fill previous gaps in incentives for certain sizes of on-site renewable energy systems. Program updates described in this document include: $200 million more in funding for California Solar Initiative rebates to commercial and industrial customers; an increase in the eligible system size for the Feed-In-Tariff (FIT) from 1.5MW to 3MW; and pending changes that may allow customer-side systems to sell tradable renewable energy credits (TRECs) to entities with RPS compliance obligations in California.

  20. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  1. A three-pass establishment protocol for real-time multiparty communication 

    E-Print Network [OSTI]

    Yoon, Jaehee

    1996-01-01

    with a suite of simulation experiments which Compares the performance of our approach with that of other exisiting protocols....

  2. Results of a Technical Review of the U.S. Climate Change Technology Program's R&D Portfolio

    SciTech Connect (OSTI)

    Brown, Marilyn A

    2006-07-01

    The U.S. Climate Change Technology Program (CCTP) is a multi-agency planning and coordinating entity, led by the U.S. Department of Energy that aims to accelerate the development and facilitate the adoption of technologies to address climate change. In late 2005, CCTP asked Oak Ridge National Laboratory and Energetics Incorporated to organize and coordinate a review of the CCTP R&D portfolio using structured workshops. Each workshop focused on one of CCTP's six strategic goals: 1.Reduce emissions from energy end-use and infrastructure 2.Reduce emissions from energy supply 3.Capture and sequester carbon dioxide 4.Reduce emissions of non-CO2 greenhouse gases (GHG) 5.Improve capabilities to measure and monitor GHG emissions 6.Bolster basic science contributions to technology development To promote meaningful dialogue while ensuring broad coverage, a group of broadly experienced professionals with expertise in fields relevant to each CCTP goal were asked to participate in the portfolio reviews and associated workshops. A total of 75 experts participated in the workshops; 60 of these participants represented non-Federal organizations. This report summarizes the findings of the workshops and the results of the Delphi assessment of the CCTP R&D portfolio.

  3. An Energy-conscious Transport Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    An Energy-conscious Transport Protocol for Multi-hop Wireless Networks Technical Report BUCS-2007 delivery requirements of applications. To meet its goal of energy efficiency, our transport protocol (1 We present a transport protocol whose goal is to reduce power consumption without compromising

  4. Implementation and evaluation of a 2 Channel MAC protocol to improve fairness in multihop networks 

    E-Print Network [OSTI]

    Shankara, Smitha

    2001-01-01

    The standard 802.11 MAC protocol, for wireless networks, is a single channel implementation. In multihop wireless networks, scenarios can arise where a single channel MAC protocol may not perform as fairly as a 2-Channel MAC protocol. By having 2...

  5. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  6. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  7. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols (Full Version) Jos present a comprehensive spec- ification language and a certifying compiler for ZK-PoK protocols based on -protocols and composition techniques known in literature. The compiler allows the fully automatic

  8. Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks1 , Erik://weimerskirch.org/ 4 NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether presented at SAC 2003, the current paper proposes a new protocol ­ the "Jane Doe Protocol" ­, and provides

  9. Hybrid Protocol For Password-based Key Exchange in Three-party Setting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou in modern cryptology. The critical of this approach is that designing a secure hybrid protocol and design a hybrid protocol that UC-securely realizes such task. That is, we firstly define an appropriate

  10. Cryptographic Protocol Analysis on Real C Code Jean Goubault-Larrecq

    E-Print Network [OSTI]

    Doyen, Laurent

    protocol the public-key Needham-Schroeder protocol in standard notation (right). The goal is not diverted, this should reach , who will decrypt this using his P Partially supported by the ACI jeunes chercheurs "Sécurité informatique, protocoles cryp- tographiques et détection d'intrusions" and the ACI

  11. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyán

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely ´Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  12. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  13. KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE

    E-Print Network [OSTI]

    Laughlin, Robert B.

    KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE UNITED NATIONS 1998 #12;KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE The Parties to this Protocol, Being Parties to the United Nations Framework Convention on Climate Change, hereinafter referred

  14. Detection of Design Flaws in the Android Permission Protocol through Bounded

    E-Print Network [OSTI]

    Jackson, Daniel

    Detection of Design Flaws in the Android Permission Protocol through Bounded Verification Hamid of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential

  15. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  16. Comparison of two wireless ad hoc routing protocols on a hardware test-bed

    E-Print Network [OSTI]

    Brown, Timothy X.

    Comparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare of the rout- ing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through

  17. Performance of Routing Protocols in HF Wireless Networks Eric E. Johnson*

    E-Print Network [OSTI]

    Johnson, Eric E.

    Balakrishnan* , and Zibin Tang* Klipsch School of Electrical and Computer Engineering New Mexico State and Routing Protocol (WARRP) and the Internet standard Optimized Link State Routing (OLSR) protocol (RFC-3626 in the Internet. The Optimized Link State Routing (OLSR) protocol (RFC-3626) [1] is an optimization

  18. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  19. ACM SIGCOMM -1-Computer Communication Review The Design Philosophy of the DARPA Internet Protocols

    E-Print Network [OSTI]

    Ratnasamy, Sylvia

    of ISO protocols has also been colored by the history of the Internet suite, so an understandingACM SIGCOMM -1- Computer Communication Review The Design Philosophy of the DARPA Internet Protocols (DARPA) under Contract No. N00014-83-K-0125 Abstract The Internet protocol suite, TCP/IP, was first

  20. The integration of digitized images, databases, and inventory protocol in an inventory updating program 

    E-Print Network [OSTI]

    Wright, Charles Timothy

    1993-01-01

    with large amounts of land, such as forest products companies or the Nature Conservancy, also use inventories to assess conditions of their holdings. The Soil Conservation Service National Resource Inventory (NRI) involves collecting and interpreting...

  1. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  2. Optimal continuous variable quantum teleportation protocol for realistic settings

    E-Print Network [OSTI]

    F. S. Luiz; Gustavo Rigolin

    2015-02-04

    We show the optimal setup that allows Alice to teleport coherent states to Bob giving the greatest fidelity (efficiency) when one takes into account two realistic assumptions. The first one says that in any actual implementation of the continuous variable teleportation protocol (CVTP) Alice and Bob necessarily share non-maximally entangled states (two-mode finitely squeezed states). The second one assumes that Alice's pool of possible coherent states to be teleported to Bob does not cover the whole complex plane. The optimal strategy is achieved by tuning three parameters in the original CVTP, namely, the beam splitter transmittance and the displacements in position and momentum implemented on the teleported state. These slight changes in the protocol are currently easy to be implemented and, as we show, give considerable gain in perfomance for a variety of possible pool of input states with Alice.

  3. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  4. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Martí Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  5. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  6. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  7. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    their potential and pursue opportunities in science, technology, engineering and mathematics. Through Expanding Your Horizon (EYH) Network programs, we provide STEM role models...

  8. Counterintelligence Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-04

    To establish the policies, procedures, and specific responsibilities for the Department of Energy (DOE) Counterintelligence (CI) Program. This directive does not cancel any other directive.

  9. Counterintelligence Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-12-10

    The Order establishes Counterintelligence Program requirements and responsibilities for the Department of Energy, including the National Nuclear Security Administration. Supersedes DOE 5670.3.

  10. Program Summaries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Sciences Advisory Committee (BESAC) News & Resources Program Summaries Brochures Reports Accomplishments Presentations BES and Congress Science for Energy Flow Seeing...

  11. Programming Stage

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    This chapter addresses plans for the acquisition and installation of operating environment hardware and software and design of a training program.

  12. A design protocol for tailoring ice-templated scaffold structure

    E-Print Network [OSTI]

    Pawelec, K. A.; Husmann, A.; Best, Serena Michelle; Cameron, Ruth Elizabeth

    2014-03-06

    engineering scaffolds are isotropic [2, 15]. As re- generative medicine begins to make strides, tissue engineering scaffolds are needed which are large enough to span critical sized defects, often larger than 10 mm in every direction. Thus, literature focusing... with isotropic scaffolds larger than 10 mm in all directions, regardless of the processing: set freezing protocol, slurry composition, filling height, or mold design. A universal link should prove a powerful tool to predict scaffold structure from the freezing...

  13. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Develops Student-StakeholdersProtocol for Addressing Induced Seismicity

  14. Superior Energy Performance Certification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department of EnergySummary:Performance Certification Protocol

  15. Protocol, Appraisal Process Guide - April 2008 | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department of EnergyNo.Implementation ofProtocol,

  16. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  17. Application Programming

    E-Print Network [OSTI]

    Brass, Stefan

    16. Application Programming I (Embedded SQL, ODBC, JDBC) 16­1 Part 16: Application Programming I, ``Embedded SQL'', Chapter 5, ``Oracle JDBC''. . Michael Gertz: Oracle/SQL Tutorial, 1999. [http.5 Developer's Guide. McGraw­Hill, 1999. . SQL Server Books Online, ``Building SQL Server Applications''. . Art

  18. Application Programming

    E-Print Network [OSTI]

    Brass, Stefan

    17. Application Programming I (Embedded SQL, ODBC, JDBC) 17­1 Part 17: Application Programming I, ``Embedded SQL'', Chapter 5, ``Oracle JDBC''. . Michael Gertz: Oracle/SQL Tutorial, 1999. [http.5 Developer's Guide. McGraw­Hill, 1999. . SQL Server Books Online, ``Building SQL Server Applications''. . Art

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  20. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  1. Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place on stable surface. 2. Remove plants/ structure. Let debris settle out of water for a few minutes. 3. Count

  2. SECO Programs 

    E-Print Network [OSTI]

    Trevino, E.

    2011-01-01

    AND FUNDING OPPORTUNITIES Energy Efficiency Technical Assistance Energy Efficiency Grants Renewable Energy Technology Grants Alternative Fuel Grants The LoanSTAR Revolving Loan Program Energy Efficiency Technical Assistance ? Free to Public Entities... efficiency retrofits that are too small for typical LoanSTAR projects. ? Competitive equipment grant program ? Up to 25 grants at a maximum $100,000 per grant ? Funded on a reimbursement basis ? Scheduled for early 2012 announcement Renewable Energy...

  3. Machinist Pipeline/Apprentice Program Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Machinist PipelineApprentice Program Program Description The Machinist Pipeline Program was created by the Prototype Fabrication Division to fill a critical need for skilled...

  4. BLM - State Protocol Agreement with Nevada | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNState Protocol Agreement

  5. Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View New PagesInformation Regional Inventory Protocol (GRIP) Website

  6. ESPC ENABLE Measurement and Verification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based|DepartmentStatementofApril 25, 2014 ERI-2142.17-1401/AprilDraftProtocol

  7. Supplement No. 2 to the FUSRAP Summary Protocol - Verification and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority forPerk |DepartmentProtocol | Department

  8. GHG Inventory Update Summary December 2014

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    : Emissions from all on-campus fuel combustion (co-gen facility, heating oil, propane) Direct Transportation inventories. The first several charts illustrate campus consumption of electricity, gas/diesel, propane, and the Flathead Lake biological station, use propane for the heating of their buildings. This is a possible reason

  9. Discounts, Fungibility and Agricultural GHG Offset projects

    E-Print Network [OSTI]

    McCarl, Bruce A.

    in MMT of Carbon Equivalents Soil Carbon Sequestration Discount for Saturating Sinks No Sink Discounting of Carbon Equivalents Carbon Sequestration from Trees Discount for Saturating Sinks No Sink Discounting 0.S. Agricultural and Forest Carbon Sequestration," 2003. #12;FungibilityFungibility A number of concepts have

  10. Sharing the Burden of GHG Reductions

    E-Print Network [OSTI]

    Jacoby, Henry D.

    The G8 countries propose a goal of a 50% reduction in global emissions by 2050, in an effort that needs to take account of other agreements specifying that developing countries are to be provided with incentives to action ...

  11. China-GHG Monitoring | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLCLtd Jump to:ChangingCNE Jump to:New EnergyPFAN) |(Redirected from

  12. China-GHG Monitoring | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLCLtd Jump to:ChangingCNE Jump to:New EnergyPFAN) |(Redirected

  13. GHG Management Institute | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlexStock Co LtdWiegandGEXA Corp.

  14. IGES GHG Emissions Data | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA JumpDuimen RiverScoringUtilities CommEnergy, Work

  15. Joint implementation : lessons from Title IV's voluntary compliance programs

    E-Print Network [OSTI]

    Atkeson, Erica

    The United Nation's Framework Convention on Climate Change (FCCC), signed by more than 150 nations in June 1992, commits signatory countries to limit greenhouse gas (GHG) emissions to 1990 levels by the year 2000. Article ...

  16. Greenhouse Gas Programs, Energy Efficiency, and the Industrial Sector 

    E-Print Network [OSTI]

    Zhou, A.; Tutterow, V.; Harris, J.

    2009-01-01

    The United States has made significant progress in reducing total energy use through energy efficiency improvements over the past decade, yet the United States still ranks as the highest absolute greenhouse gas (GHG) emitter in the world with 23...

  17. Fossil Energy Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fossil Energy Program Home ORGANIZATION Program Management Program Manager Organizational Chart About FEP Mission Workshop ODS2010 PROGRAMS Coal Combustion Fuel Cells and...

  18. Program Analyst (Senior Program Analyst)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as Senior Program Analyst in the NNSA Information Assurance Response Center Cyber Intelligence Unit (IARC CIU), as the IARC CIU Supervisory...

  19. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  20. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  1. Program Year 2008 State Energy Program Formula

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy (DOE) State Energy Program (SEP), SEP Program Guidance Fiscal Year 2008, Program Year 2008, energy efficiency and renewable energy programs in the states, DOE Office of Energy Efficiency and Renewable Energy

  2. Development of an Updated Induced Seismicity Protocol for the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for the Application of Microearthquake (MEQ) Monitoring for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report Development of an...

  3. Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc.

    E-Print Network [OSTI]

    recycling programs have become a staple of residential demand-side management portfolios. 1 Measure coincidence factor (demand savings), incremental cost, or measure life. #12;3 PART

  4. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  5. The Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Metzger, C.; Norton, Paul

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every four years, the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the "average occupant" in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  6. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  7. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  8. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Supersedes DOE O 142.2. Admin Chg 1, dated 6-27-13, Supersedes DOE O 142.1A. Certified 12-3-14.

  9. Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics

    E-Print Network [OSTI]

    Stewart, Frank J.

    Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

  10. A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes

    Broader source: Energy.gov [DOE]

    Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

  11. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  12. Reply to "Comment on 'Quantum search protocol for an atomic array' " 

    E-Print Network [OSTI]

    Scully, Marlan O.; Zubairy, M. Suhail.

    2002-01-01

    Our quantum search protocol indicates that entanglement is not required for rootN speedup. We also reemphasize the quantum error correction mechanism in our scheme....

  13. Development of fan diagnostics methods and protocols for short term monitoring

    E-Print Network [OSTI]

    Webster, T; Barth, A

    2003-01-01

    Nexant California Energy Commission Total Site Energy & Costenergy and cost savings derived from the application of these protocols to the California

  14. 4. The Bounded Re-transmission Protocol Jean-Raymond Abrial

    E-Print Network [OSTI]

    Southampton, University of

    on the Receiver's site. FUN 8 #12;Pseudo-code for the Protocol 11 Acknowledgment Channel RCV_rcv RCV_snd Data

  15. Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  16. Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  17. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6...

    Broader source: Energy.gov (indexed) [DOE]

    H-35 DOE-H- Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information Technology (July 2011) Prescription: Use as appropriate. Consider using in solicitations...

  18. An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha

  19. Programming Libraries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working inProgrammingProgramming Math

  20. Programming models

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matricesstudents working inProgrammingProgramming NERSC-8

  1. The Internet Protocol Journal Trends in Viruses and Worms

    E-Print Network [OSTI]

    Chen, Thomas M.

    University he modern computer virus was conceived and demonstrated by Fred Cohen in 1983. Like biological viruses, computer viruses reproduce by attaching to a normal program or document and taking over control it easier for malicious programs to travel between computers by themselves. Recent virus and worm outbreaks

  2. STEP Program Benchmark Report

    Broader source: Energy.gov [DOE]

    STEP Program Benchmark Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  3. Maryland Efficiency Program Options

    Broader source: Energy.gov [DOE]

    Maryland Efficiency Program Options, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  4. SU-E-P-03: Implementing a Low Dose Lung Screening CT Program Meeting Regulatory Requirements

    SciTech Connect (OSTI)

    LaFrance, M; Marsh, S; O'Donnell, G

    2014-06-01

    Purpose: To provide information pertaining to IROC Houston QA Center's (RPC) credentialing process for institutions participating in NCI-sponsored clinical trials. Purpose: Provide guidance to the Radiology Departments with the intent of implementing a Low Dose CT Screening Program using different CT Scanners with multiple techniques within the framework of the required state regulations. Method: State Requirements for the purpose of implementing a Low Dose CT Lung Protocol required working with the Radiology and Pulmonary Department in setting up a Low Dose Screening Protocol designed to reduce the radiation burden to the patients enrolled. Radiation dose measurements (CTDIvol) for various CT manufacturers (Siemens16, Siemens 64, Philips 64, and Neusoft128) for three different weight based protocols. All scans were reviewed by the Radiologist. Prior to starting a low dose lung screening protocol, information had to be submitted to the state for approval. Performing a Healing Arts protocol requires extensive information. This not only includes name and address of the applicant but a detailed description of the disease, the x-ray examination and the population to be examined. The unit had to be tested by a qualified expert using the technique charts. The credentials of all the operators, the supervisors and the Radiologists had to be submitted to the state. Results: All the appropriate documentation was sent to the state for review. The measured results between the Low Dose Protocol versus the default Adult Chest Protocol showed that there was a dose reduction of 65% for small (100-150 lb.) patient, 75% for the Medium patient (151-250 lbs.), and a 55% reduction for the Large patient ( over 250 lbs.). Conclusion: Measured results indicated that the Low Dose Protocol indeed lowered the screening patient's radiation dose and the institution was able to submit the protocol to the State's regulators.

  5. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect (OSTI)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP staff and investigate specific ways to improve implementation. Another meeting in July 2011 focused on preparations for outreach to industry and universities. In this paper PNRI describes current implementation of the AP in the Philippines, and both DOE/INSEP and PNRI provide their perspectives on their cooperation to enhance that implementation.

  6. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

  7. Program Description | Robotics Internship Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgramExemptions | NationalProcurementwork upProgram ContactsAbout the

  8. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  9. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  10. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  11. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  12. Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR

    SciTech Connect (OSTI)

    Bernal, SM

    2004-10-11

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated Luminescence Dosimetry'') for this research, ORNL's Standards-Based Management System or any other official guidelines.

  13. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  14. Sponsored Programs SPONSORED PROGRAMS MANUAL

    E-Print Network [OSTI]

    Fernandez, Eduardo

    the faculty member's base salary rate. Salary above and beyond the faculty member's base salary rate agency. Summer salary paid to faculty on academic year, or nine-month contracts is not considered extra: Sponsored Programs requires that all proposals whose budgets include funds to pay for salary in excess of 1

  15. Greenhouse Emission Reductions and Natural Gas Vehicles: A Resource Guide on Technology Options and Project Development

    SciTech Connect (OSTI)

    Orestes Anastasia; NAncy Checklick; Vivianne Couts; Julie Doherty; Jette Findsen; Laura Gehlin; Josh Radoff

    2002-09-01

    Accurate and verifiable emission reductions are a function of the degree of transparency and stringency of the protocols employed in documenting project- or program-associated emissions reductions. The purpose of this guide is to provide a background for law and policy makers, urban planners, and project developers working with the many Greenhouse Gas (GHG) emission reduction programs throughout the world to quantify and/or evaluate the GHG impacts of Natural Gas Vehicle (NGVs). In order to evaluate the GHG benefits and/or penalties of NGV projects, it is necessary to first gain a fundamental understanding of the technology employed and the operating characteristics of these vehicles, especially with regard to the manner in which they compare to similar conventional gasoline or diesel vehicles. Therefore, the first two sections of this paper explain the basic technology and functionality of NGVs, but focus on evaluating the models that are currently on the market with their similar conventional counterparts, including characteristics such as cost, performance, efficiency, environmental attributes, and range. Since the increased use of NGVs, along with Alternative Fuel Vehicle (AFVs) in general, represents a public good with many social benefits at the local, national, and global levels, NGVs often receive significant attention in the form of legislative and programmatic support. Some states mandate the use of NGVs, while others provide financial incentives to promote their procurement and use. Furthermore, Federal legislation in the form of tax incentives or procurement requirements can have a significant impact on the NGV market. In order to implement effective legislation or programs, it is vital to have an understanding of the different programs and activities that already exist so that a new project focusing on GHG emission reduction can successfully interact with and build on the experience and lessons learned of those that preceded it. Finally, most programs that deal with passenger vehicles--and with transportation in general--do not address the climate change component explicitly, and thus there are few GHG reduction goals that are included in these programs. Furthermore, there are relatively few protocols that exist for accounting for the GHG emissions reductions that arise from transportation and, specifically, passenger vehicle projects and programs. These accounting procedures and principles gain increased importance when a project developer wishes to document in a credible manner, the GHG reductions that are achieved by a given project or program. Section four of this paper outlined the GHG emissions associated with NGVs, both upstream and downstream, and section five illustrated the methodology, via hypothetical case studies, for measuring these reductions using different types of baselines. Unlike stationary energy combustion, GHG emissions from transportation activities, including NGV projects, come from dispersed sources creating a need for different methodologies for assessing GHG impacts. This resource guide has outlined the necessary context and background for those parties wishing to evaluate projects and develop programs, policies, projects, and legislation aimed at the promotion of NGVs for GHG emission reduction.

  16. IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

    E-Print Network [OSTI]

    Miles, Will

    IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks Hala El on wireless networks is calling for the development of a protocol that is both TCP-friendly and capable of conforming to the constraints of wireless networks. This paper presents IFTP-W, an end-to-end congestion

  17. A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Sahoo, Anirudha

    A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks Sandip Dalvi in WSN such as battery power and memory. In this paper, we propose a transport protocol which provides based on their residual energies and average MAC layer data rate. The event rate distribution happens

  18. JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks (Technical Report BUCS the energy gains of JTP over one-size-fits-all transport protocols. I. INTRODUCTION Motivation and Scope physical to transport [8], [9]. JAVeLEN's design ensures that energy gains obtained in one layer would

  19. Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor within a virtual grid. The proposed approach, termed location-aided flooding (LAF), achieves energy--Communication protocol, location, energy management, information dissemination, flooding. ć 1 INTRODUCTION ADVANCES

  20. CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ravindran, Binoy

    CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks Bo networks. We present a constrained flooding protocol, called CFlood that enhances the deadline satisfaction-time perfor- mance by flooding, but effectively constrains energy consumption by controlling the scale

  1. A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards March 12, 2012 Helger Lipmaa Institute of Computer Science, University of Tartu, Estonia Abstract. We propose a simple cast, is significantly more secure (in the sense of "cast-as-intended") and convenient to use than the e-voting protocol

  2. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  3. Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development

    E-Print Network [OSTI]

    Borissova, Daniela

    3 0 Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development Rumiana). The next items present a general description and application of the newest wireless protocols ­ ZigBee PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 55 . 2005 . Sofia #12;3 1 ZigBee 802.15.4; Ultra Wide

  4. Declarative Transport No more transport protocols to design, only policies to specify #

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify # Karim ABSTRACT Transport protocols are an integral part of the inter­process communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  5. Declarative Transport No more transport protocols to design, only policies to specify

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify Karim Mattar Transport protocols are an integral part of the inter-process communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  6. Mobile Agent Based Advanced Service Architecture for H.323 Internet Protocol

    E-Print Network [OSTI]

    architecture addresses the full management life-cycle of advanced services, from open third party creationMobile Agent Based Advanced Service Architecture for H.323 Internet Protocol Telephony by Jingrong Advanced Service Architecture for H.323 Internet Protocol Telephony" submitted by Jingrong Tang, B

  7. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    Ă?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

  8. T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells

    E-Print Network [OSTI]

    Lamond, Angus I.

    T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells This protocol uses centrifugal the centrifuge at 1000 rpm to remove bubbles trapped in the elutriation chamber. Stop centrifuge and flow rate centrifuge at 1800 rpm. 6. Set FS to 102. 7. If the back pressure increases above 5 psi, stop centrifuge

  9. Next Generation BotNet Protocol Analysis Felix S. Leder and Peter Martini

    E-Print Network [OSTI]

    Clausen, Michael

    The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards. For commonly used protocols like IRC and HTTP, there is a wide range of automated analysis and monitoring tools botnets are sticking to traditional IRC communication [22] but more and more botnets are moving towards

  10. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  11. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  12. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  13. Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp in EAXprime [5], an AE block cipher mode derived from EAX [8], standardized as ANSI C12.22-2008 for Smart Grid scheme, which is deployed in the Open Smart Grid Protocol (OSGP) [15]. The latter is an application layer

  14. ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor

    E-Print Network [OSTI]

    New South Wales, University of

    ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor and Engineering The University of New South Wales Sydney 2052, Australia #12;Abstract Emerging data streaming applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18

  15. Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud that the protocol can not provide secure data storage for users. Key words: Cloud Computing, public auditing, secure it brings, Cloud Computing has introduced some new security threats and challenges. If we could not solve

  16. On Security Models and Compilers for Group Key Exchange Protocols (Full version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security Models and Compilers for Group Key Exchange Protocols (Full version) Emmanuel Bresson1-known generic solutions (compilers) for AKE- and MA-security of GKE pro- tocols proposed based compiler which provides AKE- and MA-security for any GKE protocol, under standard cryptographic assumptions

  17. On a Rate Control Protocol for Networked Estimation Vaibhav Katewa , Vijay Gupta

    E-Print Network [OSTI]

    Gupta, Vijay

    On a Rate Control Protocol for Networked Estimation Vaibhav Katewa , Vijay Gupta Department. A stochastic rate control protocol is developed using the network utility maximization (NUM) framework. The presence of estimation costs poses new challenges; however, for low congestion levels, the form of rate

  18. EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Wallach, Dan

    EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks Lei Tang ACM 978-1-4503-0722-2 ...$5.00. 1. INTRODUCTION Energy efficiency is crucial in wireless sensor networks. To this end, many energy-efficient wireless MAC protocols (e.g., [3, 6, 20­22]) have been

  19. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  20. Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior

    E-Print Network [OSTI]

    Ravindran, Binoy

    Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time