Sample records for ghg protocol program

  1. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  2. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  3. Voluntary Agreements for Energy Efficiency or GHG EmissionsReduction in Industry: An Assessment of Programs Around the World

    SciTech Connect (OSTI)

    Price, Lynn

    2005-06-01T23:59:59.000Z

    Voluntary agreements for energy efficiency improvement and reduction of energy-related greenhouse gas (GHG) emissions have been a popular policy instrument for the industrial sector in industrialized countries since the 1990s. A number of these national-level voluntary agreement programs are now being modified and strengthened, while additional countries--including some recently industrialized and developing countries--are adopting these type of agreements in an effort to increase the energy efficiency of their industrial sectors.Voluntary agreement programs can be roughly divided into three broad categories: (1) programs that are completely voluntary, (2) programs that use the threat of future regulations or energy/GHG emissions taxes as a motivation for participation, and (3) programs that are implemented in conjunction with an existing energy/GHG emissions tax policy or with strict regulations. A variety of government-provided incentives as well as penalties are associated with these programs. This paper reviews 23 energy efficiency or GHG emissions reduction voluntary agreement programs in 18 countries, including countries in Europe, the U.S., Canada, Australia, New Zealand, Japan, South Korea, and Chinese Taipei (Taiwan) and discusses preliminary lessons learned regarding program design and effectiveness. The paper notes that such agreement programs, in which companies inventory and manage their energy use and GHG emissions to meet specific reduction targets, are an essential first step towards GHG emissions trading programs.

  4. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George, E-mail: mavrotas@chemeng.ntua.gr [National Technical University of Athens, Iroon Polytechniou 9, Zografou, Athens, 15780 (Greece); Skoulaxinou, Sotiria [EPEM SA, 141 B Acharnon Str., Athens, 10446 (Greece); Gakis, Nikos [FACETS SA, Agiou Isidorou Str., Athens, 11471 (Greece); Katsouros, Vassilis [Athena Research and Innovation Center, Artemidos 6 and Epidavrou Str., Maroussi, 15125 (Greece); Georgopoulou, Elena [National Observatory of Athens, Thisio, Athens, 11810 (Greece)

    2013-09-15T23:59:59.000Z

    Highlights: • The multi-objective multi-period optimization model. • The solution approach for the generation of the Pareto front with mathematical programming. • The very detailed description of the model (decision variables, parameters, equations). • The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the application of the model in a Greek region.

  5. Climate VISION: Private Sector Initiatives: Lime: GHG Inventory...

    Office of Scientific and Technical Information (OSTI)

    GHG Inventory Protocols Read the CO2 Emissions Calculation Protocol for the Lime industry (PDF 229 KB) Download Acrobat Reader...

  6. Climate VISION: Private Sector Initiatives: Minerals: GHG Inventory...

    Office of Scientific and Technical Information (OSTI)

    GHG Inventory Protocols Read the Industrial Minerals Association - North America (IMA-NA) Borates and Soda Ash Sections Greenhouse Gas Inventory Protocol (PDF 75 KB) Download...

  7. Climate VISION: Private Sector Initiatives: Minerals: GHG Work...

    Office of Scientific and Technical Information (OSTI)

    major areas of activity - Emissions Measurement and Reporting, Opportunities for GHG Inventory Protocols Reduction of GHGs, Cross-Sector Projects, and Research & Development and...

  8. Climate VISION: Private Sector Initiatives: Magnesium: GHG Inventory...

    Office of Scientific and Technical Information (OSTI)

    GHG Inventory Protocols The Magnesium Industry Partnership's SF6 emissions tracking and reporting software tool (Excel based) can be accessed by visiting the Partnership's...

  9. Climate VISION: Private Sector Initiatives: Iron and Steel: GHG...

    Office of Scientific and Technical Information (OSTI)

    GHG Inventory Protocols Principles for a Steel Industry Methodology for Reporting Carbon-Related Energy Sources and Raw Materials (PDF 48 KB) Download Acrobat Reader Steel Industry...

  10. GHG | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump1946865°, -86.0529604°Wisconsin:FyreStorm IncLSE COMP POSTGHD IncGHG

  11. avoid ghg emissions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    University Greenhouse Gas (GHG) Inventory Summary Queen's University completes annual GHG inventories as part of the ongoing commitment to reduce GHG emissions and address...

  12. Development and Update of Models for Long-Term Energy and GHG...

    Energy Savers [EERE]

    and Update of Models for Long-Term Energy and GHG Impact Evaluation 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

  13. Design for MOSIS Educational Program (Research) Testchip for AHIP protocol, ASIC flow, and Leakage Control

    E-Print Network [OSTI]

    protocol) block on the Xilinx controller. Our lab setup and testing methodology is similar to that of ATC0Design for MOSIS Educational Program (Research) Testchip for AHIP protocol, ASIC flow, and Leakage Control Through Body Biasing Seongmoo Heo, Graduate Student Krste Asanovi´c, Associate Professor

  14. Buildings GHG Mitigation Estimator Worksheet, Version 1

    Broader source: Energy.gov [DOE]

    Xcel document describes Version 1 of the the Buildings GHG Mitigation Estimator tool. This tool assists federal agencies in estimating the greenhouse gas mitigation reduction from implementing energy efficiency measures across a portfolio of buildings. It is designed to be applied to groups of office buildings, for example, at a program level (regional or site) that can be summarized at the agency level. While the default savings and cost estimates apply to office buildings, users can define their own efficiency measures, costs, and savings estimates for inclusion in the portfolio assessment. More information on user-defined measures can be found in Step 2 of the buildings emission reduction guidance. The output of this tool is a prioritized set of activities that can help the agency to achieve its greenhouse gas reduction targets most cost-effectively.

  15. A Program Logic for Verifying Secure Routing Protocols

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    protocol implementations; and thus, both verifica- tion and empirical evaluation of secure routing based on SANDLog specification and ran the code in simulation. 1 Introduction In recent years, we have, evaluated primarily experimentally, and their security properties shown via informal reasoning. Existing

  16. Summary of Fast Pyrolysis and Upgrading GHG Analyses

    SciTech Connect (OSTI)

    Snowden-Swan, Lesley J.; Male, Jonathan L.

    2012-12-07T23:59:59.000Z

    The Energy Independence and Security Act (EISA) of 2007 established new renewable fuel categories and eligibility requirements (EPA 2010). A significant aspect of the National Renewable Fuel Standard 2 (RFS2) program is the requirement that the life cycle greenhouse gas (GHG) emissions of a qualifying renewable fuel be less than the life cycle GHG emissions of the 2005 baseline average gasoline or diesel fuel that it replaces. Four levels of reduction are required for the four renewable fuel standards. Table 1 lists these life cycle performance improvement thresholds. Table 1. Life Cycle GHG Thresholds Specified in EISA Fuel Type Percent Reduction from 2005 Baseline Renewable fuel 20% Advanced biofuel 50% Biomass-based diesel 50% Cellulosic biofuel 60% Notably, there is a specialized subset of advanced biofuels that are the cellulosic biofuels. The cellulosic biofuels are incentivized by the Cellulosic Biofuel Producer Tax Credit (26 USC 40) to stimulate market adoption of these fuels. EISA defines a cellulosic biofuel as follows (42 USC 7545(o)(1)(E)): The term “cellulosic biofuel” means renewable fuel derived from any cellulose, hemicellulose, or lignin that is derived from renewable biomass and that has lifecycle greenhouse gas emissions, as determined by the Administrator, that are at least 60 percent less than the baseline lifecycle greenhouse gas emissions. As indicated, the Environmental Protection Agency (EPA) has sole responsibility for conducting the life cycle analysis (LCA) and making the final determination of whether a given fuel qualifies under these biofuel definitions. However, there appears to be a need within the LCA community to discuss and eventually reach consensus on discerning a 50–59 % GHG reduction from a ? 60% GHG reduction for policy, market, and technology development. The level of specificity and agreement will require additional development of capabilities and time for the sustainability and analysis community, as illustrated by the rich dialogue and convergence around the energy content and GHG reduction of cellulosic ethanol (an example of these discussions can be found in Wang 2011). GHG analyses of fast pyrolysis technology routes are being developed and will require significant work to reach the levels of development and maturity of cellulosic ethanol models. This summary provides some of the first fast pyrolysis analyses and clarifies some of the reasons for differing results in an effort to begin the convergence on assumptions, discussion of quality of models, and harmonization.

  17. EPA-GHG Inventory Targeted Data Collection Strategies and Software...

    Open Energy Info (EERE)

    EPA-GHG Inventory Targeted Data Collection Strategies and Software Tools (Redirected from US EPA GHG Inventory Targeted Data Collection Strategies and Software Tools) Jump to:...

  18. 2011 & 2012 Queen's University Greenhouse Gas (GHG) Inventory

    E-Print Network [OSTI]

    Abolmaesumi, Purang

    2011 & 2012 Queen's University Greenhouse Gas (GHG) Inventory Summary Queen's University completes annual GHG inventories as part of the ongoing commitment to reduce GHG emissions and address climate in 2010. This is the fourth inventory report. This inventory report accounts for GHG emissions from

  19. The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale

    E-Print Network [OSTI]

    Culler, David E.

    To support network programming, we present Deluge, a reliable data dissemination protocol for propagating network. Deluge builds from prior work in density-aware, epi- demic maintenance. We show that Deluge can and propose meth- ods to improve Deluge and possibly take advantage of them. A simple model is also derived

  20. The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...

    Open Energy Info (EERE)

    within a community. Separate calculators are available for emissions from stationary combustion, transport or mobile sources, refrigeration and air conditioning equipment, and...

  1. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    within a community. Separate calculators are available for emissions from stationary combustion, transport or mobile sources, purchased electricity, and several industrial sectors....

  2. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f <MaintainedInformation 2EnergyCity ofGeysers and SaltonLimited

  3. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f <MaintainedInformation 2EnergyCity ofGeysers and SaltonLimitedMobil

  4. The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with formSoutheasternInformationPolicy |Environmental BuildingTheElectricity

  5. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with formSoutheasternInformationPolicy |Environmental

  6. Shale Gas Production: Potential versus Actual GHG Emissions

    E-Print Network [OSTI]

    O'Sullivan, Francis

    Estimates of greenhouse gas (GHG) emissions from shale gas production and use are controversial. Here we assess the level of GHG emissions from shale gas well hydraulic fracturing operations in the United States during ...

  7. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  8. Carbon and Water Program Protocols for Neutrally Buoyant Sediment Traps Twilight Zone Explorer at BATS, June 2007-December 2009

    E-Print Network [OSTI]

    Buesseler, Ken

    Carbon and Water Program Protocols for Neutrally Buoyant Sediment Traps ­ Twilight Zone Explorer is highest without bubble going all the way down the tubing o Once complete, remove tubing slowly · Repeat

  9. Shale Gas Production: Potential versus Actual GHG Emissions

    E-Print Network [OSTI]

    Shale Gas Production: Potential versus Actual GHG Emissions Francis O'Sullivan and Sergey Paltsev://globalchange.mit.edu/ Printed on recycled paper #12;1 Shale Gas Production: Potential versus Actual GHG Emissions Francis O'Sullivan* and Sergey Paltsev* Abstract Estimates of greenhouse gas (GHG) emissions from shale gas production and use

  10. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  11. GHG Management Institute | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGermanFifeGEXA Corp. (New Jersey) Jump to:GGAM ElectricalGHG

  12. GBTL Workshop GHG Emissions | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdf Flash2006-52.pdf0.pdfDepartment ofEnergy 3FungibleOpeningGHG Emissions GBTL

  13. Methodology for Estimating Reductions of GHG Emissions from Mosaic...

    Open Energy Info (EERE)

    Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation AgencyCompany Organization: World Bank Sector: Land Focus Area: Forestry Topics: Co-benefits...

  14. Climate VISION: Private Sector Initiatives: Magnesium: GHG Information

    Office of Scientific and Technical Information (OSTI)

    GHG Information The magnesium industry directly emits SF6 from its primary metal production, parts casting, and recycling operations. In 2005, the industry's SF6 emissions were...

  15. Protocol for New Degree Program Proposals When is a new degree program proposal needed?

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    Affairs Highlights' series in 2009, can be found at: https://www.cu.edu/articles/upload/BOR Academic://www.colorado.edu/GraduateSchool/academics/_docs/GuideforConcDeg.doc An informal overview of the new degree program approval process, provided by the system Academic Affairs office in their `Academic

  16. Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)

    SciTech Connect (OSTI)

    Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

    2013-08-09T23:59:59.000Z

    The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

  17. Greenhouse gas (GHG) mitigation and monitoring technology performance: Activities of the GHG Technology Verification Center. Report for January 1998--January 1999

    SciTech Connect (OSTI)

    Masemore, S.; Kirchgessner, D.A.

    1999-05-01T23:59:59.000Z

    The paper discusses greenhouse gas (GHG) mitigation and monitoring technology performance activities of the GHG Technology Verification Center. The Center is a public/private partnership between Southern Research Institute and the US EPA`s Office of Research and Development. The Center is part of EPA`s Environmental Technology Verification (ETV) Program, which has established 12 verification centers to evaluate a wide range of technologies in various environmental media and technology areas. The Center has published the results of its first verification: use of a phosphoric acid fuel cell to produce electricity from landfill gas. It has also initiated three new field verifications, two on technologies that reduce methane emissions from natural gas transmissions compressors, and one on a new microturbine electricity production technology.

  18. The Future Energy and GHG Emissions Impact of Alternative Personal

    E-Print Network [OSTI]

    The Future Energy and GHG Emissions Impact of Alternative Personal Transportation Pathways in China://globalchange.mit.edu/ Printed on recycled paper #12;The Future Energy and GHG Emissions Impact of Alternative Personal Paul N. Kishimoto, Sergey Paltsev and Valerie J. Karplus Report No. 231 September 2012 China Energy

  19. Energy and GHG Emissions in British Columbia 1990 -2010

    E-Print Network [OSTI]

    Pedersen, Tom

    Energy and GHG Emissions in British Columbia 1990 - 2010 Report Highlights John Nyboer and Maximilian Kniewasser Canadian Industrial Energy End-use Data and Analysis Centre (CIEEDAC) Simon Fraser for Climate Solutions 1 HIGHLIGHTS The Energy and GHG Emissions in British

  20. Regulation of GHG emissions from transportation fuels: Emission quota versus emission intensity standard

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01T23:59:59.000Z

    Derivation of average cost of emission reduction by blending?) and ? respectively. GHG emissions per unit of blend is, ?+ ?? i Reduction in GHG emissions with respect to unblended

  1. Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)

    SciTech Connect (OSTI)

    Wang, Na; Gorrissen, Willy J.

    2013-01-11T23:59:59.000Z

    The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

  2. STUDY PROTOCOL Open Access Evaluation of the Housing First program in

    E-Print Network [OSTI]

    Boyer, Edmond

    disorders in France: study protocol for a randomized controlled trial Aurelie Tinland1,2 , Cecile Fortanier1 Background: Recent studies in North American contexts have suggested that the Housing First model randomized protocols, to evaluate the impact of Housing First approaches in France. Method and design

  3. Catalyst Paper No-Carb Strategy for GHG Reduction

    E-Print Network [OSTI]

    McClain, C.; Robinson, J.

    2008-01-01T23:59:59.000Z

    The Catalyst Paper strategy to manage GHG exposure is a combination of energy reduction initiatives in manufacturing and the effective use of biomass and alternative fuels to produce mill steam and electricity from the powerhouse. The energy...

  4. GREENHOUSE GAS (GHG) INVENTORY REPORT 20102011 Dalhousie Office of Sustainability

    E-Print Network [OSTI]

    Brownstone, Rob

    ..................................... 30 Appendix E: Canadian Default Factors for Calculating CO2 Emissions from Combustion of Natural Gas GREENHOUSE GAS (GHG) INVENTORY REPORT 20102011 Dalhousie Office of Sustainability ......................................................... 34 Appendix K: Fleet Vehicles on Campus .............

  5. Climate VISION: Private Sector Initiatives: Aluminum: GHG Information

    Office of Scientific and Technical Information (OSTI)

    GHG Information The primary aluminum industry emits PFCs and CO2 directly from the production process and indirectly emits CO2 from its energy consumption. In 2001, the U.S....

  6. Climate VISION: Private Sector Initiatives: Minerals: GHG Information

    Office of Scientific and Technical Information (OSTI)

    GHG Information Read the Industrial Minerals Association - North America (IMA-NA) 2011 Greenhouse Gas and Energy Survey Industry Summary for the period from 2000 to 2010 (PDF 16...

  7. Climate VISION: Private Sector Initiatives: Oil and Gas: GHG...

    Office of Scientific and Technical Information (OSTI)

    Prior to developing the API Compendium of GHG Emissions Methodologies for the Oil and Gas Industry (PDF 14.6 MB), API reviewed a wide range of government estimates of...

  8. Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs

    E-Print Network [OSTI]

    Messenger, M.

    2007-01-01T23:59:59.000Z

    . This paper focuses on how the protocols will help provide more transparent information to building owners about the net savings achieved by a particular energy efficiency investment and reviews the best methods available to estimate both gross and net energy...

  9. Integrating Agricultural and Forestry GHG Mitigation Response into General Economy Frameworks

    E-Print Network [OSTI]

    McCarl, Bruce A.

    Integrating Agricultural and Forestry GHG Mitigation Response into General Economy Frameworks. #12;2 Integrating Agricultural and Forestry GHG Mitigation Response into General Economy Frameworks for characterizing potential responses to greenhouse gas mitigation policies by the agriculture and forestry

  10. Current Activities of the GHG Scientific Advisory Group Ed Dlugokencky

    E-Print Network [OSTI]

    . Motivation High GWP gases Valuable in emissions trading Network of measurements likely to expand. This may be important as our observations are used to verify emission inventories under GHG emissions trading schemes. We also prepare documents that can be used by developing countries to assess

  11. Regional GHG Emissions O tlook Greenhouse Gas and the Regional

    E-Print Network [OSTI]

    Information Administration Annual Energy Outlook for 2013 (AEO2013) along with the modeled curve Outlook with No Federal CO2 Regulatory Cost 70 Annual CO2 Emission from Power System 30 40 50 60 Million25 GHG Emission Outlook with a Federal CO2 Regulatory Cost 70 Annual CO2 Emission from Power System

  12. What GHG Concentration Targets are Reachable in this Century?

    E-Print Network [OSTI]

    Paltsev, Sergey

    2013-07-26T23:59:59.000Z

    We offer simulations that help to understand the relationship between GHG emissions and concentrations, and the relative role of long-lived (e.g., CO2) and short-lived (e.g., CH4) emissions. We show that, absent technologies ...

  13. Catalyst Paper No-Carb Strategy for GHG Reduction 

    E-Print Network [OSTI]

    McClain, C.; Robinson, J.

    2008-01-01T23:59:59.000Z

    for manufacturing is generated by the powerhouse where 63% of thermal energy is now from biomass and alternative fuels. This strategy reduced gross energy usage by 22% and provided a direct reduction in Green House Gas (GHG) emissions by 71% from 1990 to 2005...

  14. UNFCCC-GHG Inventory Review Training Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin Baxin HydropowerTrinityTurnbull

  15. UNFCCC-GHG Inventory Review Training Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin Baxin HydropowerTrinityTurnbull

  16. GHG Emissions from Hydropower Reservoirs The role of hydropower reservoirs in contributing to greenhouse gas (GHG) emissions is poorly

    E-Print Network [OSTI]

    GHG Emissions from Hydropower Reservoirs The role of hydropower reservoirs in contributing from tropical and boreal reservoirs are significant. In light of hydropower's potential role as a green to characterize carbon dioxide (CO2) and methane (CH4) emissions from hydropower reservoirs in the US Southeast

  17. Selected GHG Emission Supply Curves | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form HistoryRistma AG Jump638324°,Schnell ZTools andSegen LtdGHG Emission

  18. Quantitative Analysis of Biofuel Sustainability, Including Land Use Change GHG Emissions

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsQuantitative Analysis of Biofuel Sustainability, Including Land Use Change GHG EmissionsJennifer B....

  19. Climate VISION: Private Sector Initiatives: Aluminum: GHG Inventory...

    Office of Scientific and Technical Information (OSTI)

    Gas Protocol enhances and expands for the aluminum sector the World Business Council for Sustainable DevelopmentWorld Resources Institute greenhouse gas corporate accounting and...

  20. DRAFT VERSION September 6, 2009 1 1990 GHG Baseline for Building Energy Use

    E-Print Network [OSTI]

    Escher, Christine

    DRAFT VERSION ­ September 6, 2009 1 1990 GHG Baseline for Building Energy Use in the Oregon of 1990 building energy use and the associated greenhouse gas (GHG) emissions for Oregon University System's stated intent. Specifically, there is a focus on building energy use, the single largest source of direct

  1. TECHNICAL REPORTS The greenhouse gas (GHG) impact of composting a range

    E-Print Network [OSTI]

    Brown, Sally

    TECHNICAL REPORTS 1396 The greenhouse gas (GHG) impact of composting a range of potential by composting and GHG emissions during composting. The primary carbon credits associated with composting are through CH4 avoidance when feedstocks are composted instead of landfilled (municipal solid waste

  2. Systematic Review and Harmonization of Life Cycle GHG Emission Estimates for Electricity Generation Technologies (Presentation)

    SciTech Connect (OSTI)

    Heath, G.

    2012-06-01T23:59:59.000Z

    This powerpoint presentation to be presented at the World Renewable Energy Forum on May 14, 2012, in Denver, CO, discusses systematic review and harmonization of life cycle GHG emission estimates for electricity generation technologies.

  3. GHG emission factors developed for the recycling and composting of municipal waste in South African municipalities

    SciTech Connect (OSTI)

    Friedrich, Elena, E-mail: Friedriche@ukzn.ac.za; Trois, Cristina

    2013-11-15T23:59:59.000Z

    Highlights: • GHG emission factors for local recycling of municipal waste are presented. • GHG emission factors for two composting technologies for garden waste are included. • Local GHG emission factors were compared to international ones and discussed. • Uncertainties and limitations are presented and areas for new research highlighted. - Abstract: GHG (greenhouse gas) emission factors for waste management are increasingly used, but such factors are very scarce for developing countries. This paper shows how such factors have been developed for the recycling of glass, metals (Al and Fe), plastics and paper from municipal solid waste, as well as for the composting of garden refuse in South Africa. The emission factors developed for the different recyclables in the country show savings varying from ?290 kg CO{sub 2} e (glass) to ?19 111 kg CO{sub 2} e (metals – Al) per tonne of recyclable. They also show that there is variability, with energy intensive materials like metals having higher GHG savings in South Africa as compared to other countries. This underlines the interrelation of the waste management system of a country/region with other systems, in particular with energy generation, which in South Africa, is heavily reliant on coal. This study also shows that composting of garden waste is a net GHG emitter, releasing 172 and 186 kg CO{sub 2} e per tonne of wet garden waste for aerated dome composting and turned windrow composting, respectively. The paper concludes that these emission factors are facilitating GHG emissions modelling for waste management in South Africa and enabling local municipalities to identify best practice in this regard.

  4. Idaho National Laboratory (INL) Site Greenhouse Gas (GHG) Monitoring Plan - 40 CFR 98

    SciTech Connect (OSTI)

    Deborah L. Layton; Kimberly Frerichs

    2010-07-01T23:59:59.000Z

    The purpose of this Greenhouse Gas (GHG) Monitoring Plan is to meet the monitoring plan requirements of Title 40 of the Code of Federal Regulations Part 98.3(g)(5). This GHG Monitoring Plan identifies procedures and methodologies used at the Idaho National Laboratory Site (INL Site) to collect data used for GHG emissions calculations and reporting requirements from stationary combustion and other regulated sources in accordance with 40 CFR 98, Subparts A and other applicable subparts. INL Site Contractors determined subpart applicability through the use of a checklist (Appendix A). Each facility/contractor reviews operations to determine which subparts are applicable and the results are compiled to determine which subparts are applicable to the INL Site. This plan is applicable to the 40 CFR 98-regulated activities managed by the INL Site contractors: Idaho National Laboratory (INL), Idaho Cleanup Project (ICP), Advanced Mixed Waste Treatment Project (AMWTP), and Naval Reactors Facilities (NRF).

  5. Idaho National Laboratory (INL) Site Greenhouse Gas (GHG) Monitoring Plan - 40 CFR 98

    SciTech Connect (OSTI)

    Deborah L. Layton; Kimberly Frerichs

    2011-12-01T23:59:59.000Z

    The purpose of this Greenhouse Gas (GHG) Monitoring Plan is to meet the monitoring plan requirements of Title 40 of the Code of Federal Regulations Part 98.3(g)(5). This GHG Monitoring Plan identifies procedures and methodologies used at the Idaho National Laboratory Site (INL Site) to collect data used for GHG emissions calculations and reporting requirements from stationary combustion and other regulated sources in accordance with 40 CFR 98, Subparts A and other applicable subparts. INL Site Contractors determined subpart applicability through the use of a checklist (Appendix A). Each facility/contractor reviews operations to determine which subparts are applicable and the results are compiled to determine which subparts are applicable to the INL Site. This plan is applicable to the 40 CFR 98-regulated activities managed by the INL Site contractors: Idaho National Laboratory (INL), Idaho Cleanup Project (ICP), Advanced Mixed Waste Treatment Project (AMWTP), and Naval Reactors Facilities (NRF).

  6. Transportation Energy Futures: Combining Strategies for Deep Reductions in Energy Consumption and GHG Emissions (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-03-01T23:59:59.000Z

    This fact sheet summarizes actions in the areas of light-duty vehicle, non-light-duty vehicle, fuel, and transportation demand that show promise for deep reductions in energy use. Energy efficient transportation strategies have the potential to simultaneously reduce oil consumption and greenhouse gas (GHG) emissions. The Transportation Energy Futures (TEF) project examined how the combination of multiple strategies could achieve deep reductions in GHG emissions and petroleum use on the order of 80%. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal was to help inform domestic decisions about transportation energy strategies, priorities, and investments, with an emphasis on underexplored opportunities. TEF findings reveal three strategies with the potential to displace most transportation-related petroleum use and GHG emissions: 1) Stabilizing energy use in the transportation sector through efficiency and demand-side approaches. 2) Using additional advanced biofuels. 3) Expanding electric drivetrain technologies.

  7. Simplified life cycle approach: GHG variability assessment for onshore wind electricity based on Monte-Carlo simulations

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    in the literature. In the special case of greenhouses gases (GHG) from wind power electricity, the LCA resultsSimplified life cycle approach: GHG variability assessment for onshore wind electricity based performed by the IPCC [1]. Such result might lead policy makers to consider LCA as an inconclusive method [2

  8. Deer Park Chemical Plant Received ACC Award for Energy Efficiency Program

    E-Print Network [OSTI]

    Moon, S.; Heyman, E.

    2006-01-01T23:59:59.000Z

    on sour gas processing facilities, has developed methods and programs to identify opportunities for energy conservation and GHG reductions. The program outlined in this paper consists of four interrelated phases that are used to identify and track...

  9. 2008 Guidelines to Defra's GHG Conversion Methodology Paper for Transport Emission Factors

    E-Print Network [OSTI]

    2008 Guidelines to Defra's GHG Conversion Factors: Methodology Paper for Transport Emission Factors: Methodology Paper for Transport Emission Factors Contents I. INTRODUCTION 3 II. AVIATION 4 Previous Approach 4 New Passenger Air Transport Emission Factors 5 New Freight Air Transport Emission Factors 10 Other

  10. GLOBAL EMISSIONS Greenhouse gas (GHG) emissions, largely carbon dioxide (CO2)

    E-Print Network [OSTI]

    Green, Donna

    GLOBAL EMISSIONS Greenhouse gas (GHG) emissions, largely carbon dioxide (CO2) from the combustion),2 China, Russia, Japan, India and Canada--accounted for more than 70 percent of energy-related CO2. Figure 1 Global Carbon Dioxide Emissions: 1850­2030 1850 1860 1870 1880 1890 1900 1910 1920 1930 1940

  11. UBC Social, Ecological Economic Development Studies (SEEDS) Student Report GHG Emissions Data Tracker User Manual

    E-Print Network [OSTI]

    of a project/report." #12;GHG Emissions Data Tracker User Manual #12;Add/Edit vehicles Vehicles type addition will be saved automatically. Add Vehicles: Enter Vehicles name in the bottom most blank space and once you enter the first character it will create a new record in database. Edit Vehicles: Click on the text box that you

  12. Life Cycle Analysis on Greenhouse Gas (GHG) Emissions of Marcellus Shale Gas Supporting Information

    E-Print Network [OSTI]

    Jaramillo, Paulina

    the well pad drilling site and the location for accommodation. The rig and auxiliary equipments for hydraulic fracturing process are trucked in trailers to the drilling site. Several wells on one multi-well 1. GHG Emissions Estimation for Production of Marcellus Shale Gas 1.1 Preparation of Well Pad

  13. Abstract--Energy consumption and the concomitant Green House Gases (GHG) emissions of network infrastructures are

    E-Print Network [OSTI]

    Politčcnica de Catalunya, Universitat

    Abstract--Energy consumption and the concomitant Green House Gases (GHG) emissions of network as for their energy consumption. Renewable energy sources (e.g. solar, wind, tide, etc.) are emerging as a promising and the comparison of several energy-aware static routing and wavelength assignment (RWA) strategies for wavelength

  14. 2002 2004 2006 2008 2010 2012 2014 2016 2018 2020 Rio Tinto GHG

    E-Print Network [OSTI]

    California at Davis, University of

    Tinto GHG Climate Policy Coverage (CO2 emissions of jurisdictions with carbon pricing as a % of global0% 10% 20% 30% 40% 50% 60% 70% 2002 2004 2006 2008 2010 2012 2014 2016 2018 2020 Global CO2 Rio Benchmark for Direct Emissions Benchmark for carbon intensity of electricity Benchmark for electricity per

  15. Scientific perspectives on MRV: approaches, techniques, and requirements of quantifying GHG

    E-Print Network [OSTI]

    Scientific perspectives on MRV: approaches, techniques, and requirements of quantifying GHG-up inventories - measure changes in stocks or flows of carbon, extrapolate to all ecosystems. ~Bottom-up TBMs to Bedrich Benes, Jason Lambert, Yuyu Zhou #12;INFLUX Background CO2, CH4 WindWind Urban CO2, CH4 Thanks

  16. EVOLUTION OF THE HOUSEHOLD VEHICLE FLEET: ANTICIPATING FLEET COMPOSITION, PHEV ADOPTION AND GHG

    E-Print Network [OSTI]

    Kockelman, Kara M.

    EVOLUTION OF THE HOUSEHOLD VEHICLE FLEET: ANTICIPATING FLEET COMPOSITION, PHEV ADOPTION AND GHG evolution, vehicle ownership, plug-in hybrid electric vehicles (PHEVs), climate change policy, stated preference, opinion survey, microsimulation ABSTRACT In todays world of volatile fuel prices and climate

  17. Proposed Final Opinion on GHG Strategies in the Energy Sectors

    E-Print Network [OSTI]

    to increase in capital costs and growing demand for electricity, unrelated to AB 32 Important to have programs in the electricity and natural gas sectors Joint regulatory proceeding o March 2008 Interim Opinion o September 2008 Recommendations Set requirements for achieving all cost effective energy efficiency Expand electricity from

  18. Capturing Fugitives to Reduce DOE’s GHG Emissions

    Broader source: Energy.gov [DOE]

    Experts are hunting down fugitive carbon emissions from across 20 Energy Department laboratories, sites and program offices — and they’ve already prevented the release of more than 600,000 metric tons of CO2 equivalent since 2009 -- equal to taking 140,000 cars off the road for a year.

  19. Airborne greenhouse gas (GHG) measurements provide essential constraints for estimating surface emissions. Until recently, dedicated research-grade instruments have been required

    E-Print Network [OSTI]

    GHG columns · Quantifying local to regional GHG enhancements for emissions inventory verificationAbstract Airborne greenhouse gas (GHG) measurements provide essential constraints for estimating with another Cessna 210 over Central California quantified enhancements in CO2 and CH4 from urban

  20. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    SciTech Connect (OSTI)

    Vine, E.; Sathaye, J.

    1997-12-01T23:59:59.000Z

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  1. Pyrolysis and gasification of meat-and-bone-meal: Energy balance and GHG accounting

    SciTech Connect (OSTI)

    Cascarosa, Esther [Thermochemical Processes Group, Aragón Institute for Engineering Research (I3A), Universidad de Zaragoza (Spain); Boldrin, Alessio, E-mail: aleb@env.dtu.dk [Department of Environmental Engineering. Technical University of Denmark, Kongens Lyngby (Denmark); Astrup, Thomas [Department of Environmental Engineering. Technical University of Denmark, Kongens Lyngby (Denmark)

    2013-11-15T23:59:59.000Z

    Highlights: • GHG savings are in the order of 600–1000 kg CO{sub 2}-eq. per Mg of MBM treated. • Energy recovery differed in terms of energy products and efficiencies. • The results were largely determined by use of the products for energy purposes. - Abstract: Meat-and-bone-meal (MBM) produced from animal waste has become an increasingly important residual fraction needing management. As biodegradable waste is routed away from landfills, thermo-chemical treatments of MBM are considered promising solution for the future. Pyrolysis and gasification of MBM were assessed based on data from three experimental lab and pilot-scale plants. Energy balances were established for the three technologies, providing different outcomes for energy recovery: bio-oil was the main product for the pyrolysis system, while syngas and a solid fraction of biochar were the main products in the gasification system. These products can be used – eventually after upgrading – for energy production, thereby offsetting energy production elsewhere in the system. Greenhouse gases (GHG) accounting of the technologies showed that all three options provided overall GHG savings in the order of 600–1000 kg CO{sub 2}-eq. per Mg of MBM treated, mainly as a consequence of avoided fossil fuel consumption in the energy sector. Local conditions influencing the environmental performance of the three systems were identified, together with critical factors to be considered during decision-making regarding MBM management.

  2. Life Cycle GHG Emissions from Conventional Natural Gas Power Generation: Systematic Review and Harmonization (Presentation)

    SciTech Connect (OSTI)

    Heath, G.; O'Donoughue, P.; Whitaker, M.

    2012-12-01T23:59:59.000Z

    This research provides a systematic review and harmonization of the life cycle assessment (LCA) literature of electricity generated from conventionally produced natural gas. We focus on estimates of greenhouse gases (GHGs) emitted in the life cycle of electricity generation from conventionally produced natural gas in combustion turbines (NGCT) and combined-cycle (NGCC) systems. A process we term "harmonization" was employed to align several common system performance parameters and assumptions to better allow for cross-study comparisons, with the goal of clarifying central tendency and reducing variability in estimates of life cycle GHG emissions. This presentation summarizes preliminary results.

  3. U.S. HDV GHG and Fuel Efficiency Final Rule | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarchC.DepartmentTexas to CallDepartmentHDV GHG and

  4. GHG emission factors developed for the collection, transport and landfilling of municipal waste in South African municipalities

    SciTech Connect (OSTI)

    Friedrich, Elena, E-mail: Friedriche@ukzn.ac.za [CRECHE Centre for Research in Environmental, Coastal and Hydrological Engineering, School of Engineering, Civil Engineering Programme, University of KwaZulu-Natal, Howard College Campus, Durban (South Africa); Trois, Cristina [CRECHE Centre for Research in Environmental, Coastal and Hydrological Engineering, School of Engineering, Civil Engineering Programme, University of KwaZulu-Natal, Howard College Campus, Durban (South Africa)

    2013-04-15T23:59:59.000Z

    Highlights: ? An average GHG emission factor for the collection and transport of municipal solid waste in South Africa is calculated. ? A range of GHG emission factors for different types of landfills (including dumps) in South Africa are calculated. ? These factors are compared internationally and their implications for South Africa and developing countries are discussed . ? Areas for new research are highlighted. - Abstract: Greenhouse gas (GHG) emission factors are used with increased frequency for the accounting and reporting of GHG from waste management. However, these factors have been calculated for developed countries of the Northern Hemisphere and are lacking for developing countries. This paper shows how such factors have been developed for the collection, transport and landfilling of municipal waste in South Africa. As such it presents a model on how international results and methodology can be adapted and used to calculate country-specific GHG emission factors from waste. For the collection and transport of municipal waste in South Africa, the average diesel consumption is around 5 dm{sup 3} (litres) per tonne of wet waste and the associated GHG emissions are about 15 kg CO{sub 2} equivalents (CO{sub 2} e). Depending on the type of landfill, the GHG emissions from the landfilling of waste have been calculated to range from ?145 to 1016 kg CO{sub 2} e per tonne of wet waste, when taking into account carbon storage, and from 441 to 2532 kg CO{sub 2} e per tonne of wet waste, when carbon storage is left out. The highest emission factor per unit of wet waste is for landfill sites without landfill gas collection and these are the dominant waste disposal facilities in South Africa. However, cash strapped municipalities in Africa and the developing world will not be able to significantly upgrade these sites and reduce their GHG burdens if there is no equivalent replacement of the Clean Development Mechanism (CDM) resulting from the Kyoto agreement. Other low cost avenues need to be investigated to suit local conditions, in particular landfill covers which enhance methane oxidation.

  5. LowCostGHG ReductionCARB 3/03 Low-Cost and Near-Term Greenhouse Gas Emission Reduction

    E-Print Network [OSTI]

    Edwards, Paul N.

    LowCostGHG ReductionCARB 3/03 1 Low-Cost and Near-Term Greenhouse Gas Emission Reduction Marc Ross for Light Duty Vehicles Critical to the Pavley bill's goal to reduce greenhouse gas (GHG) emissions from trucks (large symbols). The emissions from midsize and smaller cars, emit about half as much. Question

  6. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  7. 15th International Conference Ramiran, May 3-6, 2013, Versailles Accounting GHG emissions from sludge treatment and disposal routes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    sludge treatment and disposal routes ­ methodological problems focused on sludge land spreading% of sewage sludge is directly land spreading or composted before land spreading. Sludge application to quantify GHG emissions emitted during sludge treatment and disposal routes. This paper aims to present how

  8. Energy efficiency and the cost of GHG abatement: A comparison of bottom-up and hybrid models for the US

    E-Print Network [OSTI]

    Energy efficiency and the cost of GHG abatement: A comparison of bottom-up and hybrid models energy­economy models. Using the CIMS hybrid model, we conducted simulations for comparison with the Mc February 2011 Accepted 16 August 2011 Available online 17 September 2011 Keywords: Energy efficiency

  9. Implications of Near-Term Coal Power Plant Retirement for SO2 and NOX and Life Cycle GHG Emissions

    E-Print Network [OSTI]

    Jaramillo, Paulina

    Implications of Near-Term Coal Power Plant Retirement for SO2 and NOX and Life Cycle GHG Emissions for electricity generation, by comparing systems that consist of individual natural gas and coal power plants when coal power plants are retired. These models estimate the order in which existing power plants

  10. Implications of changing natural gas prices in the United States electricity sector for SO and life cycle GHG emissions

    E-Print Network [OSTI]

    Jaramillo, Paulina

    Implications of changing natural gas prices in the United States electricity sector for SO 2 , NO X of changing natural gas prices in the United States electricity sector for SO2, NOX and life cycle GHG to projections of low natural gas prices and increased supply. The trend of increasing natural gas use

  11. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  12. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  13. Carbon Trading Protocols for Geologic Sequestration

    E-Print Network [OSTI]

    Hoversten, Shanna

    2009-01-01T23:59:59.000Z

    EU ETS: European Union Emissions Trading System GHG: Greenstarts operating an emissions trading scheme (ETS) similarGovernments operating emissions trading systems face the

  14. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  15. Decontamination systems information and research program -- Literature review in support of development of standard test protocols and barrier design models for in situ formed barriers project

    SciTech Connect (OSTI)

    NONE

    1994-12-01T23:59:59.000Z

    The US Department of Energy is responsible for approximately 3,000 sites in which contaminants such as carbon tetrachloride, trichlorethylene, perchlorethylene, non-volatile and soluble organic and insoluble organics (PCBs and pesticides) are encountered. In specific areas of these sites radioactive contaminants are stored in underground storage tanks which were originally designed and constructed with a 30-year projected life. Many of these tanks are now 10 years beyond the design life and failures have occurred allowing the basic liquids (ph of 8 to 9) to leak into the unconsolidated soils below. Nearly one half of the storage tanks located at the Hanford Washington Reservation are suspected of leaking and contaminating the soils beneath them. The Hanford site is located in a semi-arid climate region with rainfall of less than 6 inches annually, and studies have indicated that very little of this water finds its way to the groundwater to move the water down gradient toward the Columbia River. This provides the government with time to develop a barrier system to prevent further contamination of the groundwater, and to develop and test remediation systems to stabilize or remove the contaminant materials. In parallel to remediation efforts, confinement and containment technologies are needed to retard or prevent the advancement of contamination plumes through the environment until the implementation of remediation technology efforts are completed. This project examines the various confinement and containment technologies and protocols for testing the materials in relation to their function in-situ.

  16. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  17. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  18. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  19. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  20. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  1. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  2. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  3. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  4. Pilot application of PalmGHG, the RSPO greenhouse gas calculator for oil palm products , Chase L.D.C.b

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    and consumption of sustainable palm oil through a voluntary certification scheme. This certification scheme1 Pilot application of PalmGHG, the RSPO greenhouse gas calculator for oil palm products Bessou C, France b Independent Consultant in Tropical Agriculture, High Trees, Martineau Drive, Dorking, Surrey RH4

  5. 11 2011 Society of Chemical Industry and John Wiley & Sons, Ltd | Greenhouse Gas Sci Technol. 1:1120 (2011); DOI: 10.1002/ghg3 Perspective

    E-Print Network [OSTI]

    Zhou, Quanlin

    2011-01-01T23:59:59.000Z

    Online Library (wileyonlinelibrary.com). DOI: 10.1002/ghg3.001 On scale and magnitude of pressure build-up, such as oil produc- tion. Large-scale pressure build-up in response to the injection may limit the dynamic of pressure build-up induced by industrial-scale CO2 storage projects is presented. Also dis- cussed

  6. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program Direction and Analysis DeputyStructure

  7. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  8. Greenhouse Gas Management Program Overview (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2011-11-01T23:59:59.000Z

    Program fact sheet highlighting federal requirements for GHG emissions management, FEMP services to help agencies reduce emissions, and additional resources. The U.S. Department of Energy (DOE) Federal Energy Management Program (FEMP) assists Federal agencies with managing their greenhouse gas (GHG) emissions. GHG management entails measuring emissions and understanding their sources, setting a goal for reducing emissions, developing a plan to meet this goal, and implementing the plan to achieve reductions in emissions. FEMP provides the following services to help Federal agencies meet the requirements of inventorying and reducing their GHG emissions: (1) FEMP offers one-on-one technical assistance to help agencies understand and implement the Federal Greenhouse Gas Accounting and Reporting Guidance and fulfill their inventory reporting requirements. (2) FEMP provides training, tools, and resources on FedCenter to help agencies complete their annual inventories. (3) FEMP serves a leadership role in the interagency Federal Working Group on Greenhouse Gas Accounting and Reporting that develops recommendations to the Council on Environmental Quality (CEQ) for the Federal Greenhouse Gas Accounting and Reporting Guidance. (4) As the focus continues to shift from measuring emissions (completing inventories) to mitigating emissions (achieving reductions), FEMP is developing a strategic planning framework and resources for agencies to prioritize among a variety of options for mitigating their GHG emissions, so that they achieve their reduction goals in the most cost-effective manner. These resources will help agencies analyze their high-quality inventories to make strategic decisions about where to use limited resources to have the greatest impact on reducing emissions. Greenhouse gases trap heat in the lower atmosphere, warming the earth's surface temperature in a natural process known as the 'greenhouse effect.' GHGs include carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), perfluorocarbons (PFCs), hydrofluorocarbons (HFCs), and sulfur hexafluoride (SF{sub 6}). Human activities have caused a rapid increase in GHG concentrations. This rising level contributes to global climate change, which contributes to environmental and public health problems.

  9. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01T23:59:59.000Z

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  10. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli; Johnson, Dana M.; Wang, Jinjiang

    2015-04-01T23:59:59.000Z

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncoveredmore »that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.« less

  11. Life-cycle energy and GHG emissions of forest biomass harvest and transport for biofuel production in Michigan

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Fengli [China Univ. of Petroleum, Beijing (China); Michigan Technological Univ., Houghton, MI (United States); Johnson, Dana M. [Michigan Technological Univ., Houghton, MI (United States); Wang, Jinjiang [China Univ. of Petroleum, Beijing (China)

    2015-04-01T23:59:59.000Z

    High dependence on imported oil has increased U.S. strategic vulnerability and prompted more research in the area of renewable energy production. Ethanol production from renewable woody biomass, which could be a substitute for gasoline, has seen increased interest. This study analysed energy use and greenhouse gas emission impacts on the forest biomass supply chain activities within the State of Michigan. A life-cycle assessment of harvesting and transportation stages was completed utilizing peer-reviewed literature. Results for forest-delivered ethanol were compared with those for petroleum gasoline using data specific to the U.S. The analysis from a woody biomass feedstock supply perspective uncovered that ethanol production is more environmentally friendly (about 62% less greenhouse gas emissions) compared with petroleum based fossil fuel production. Sensitivity analysis was conducted with key inputs associated with harvesting and transportation operations. The results showed that research focused on improving biomass recovery efficiency and truck fuel economy further reduced GHG emissions and energy consumption.

  12. The Internet Backplane Protocol: A Study in Resource Sharing1 This work is supported by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of

    E-Print Network [OSTI]

    Plank, Jim

    by the National Science Foundation Next Generation Software Program under grant # EIA-9975015, the Department of Energy Scientific Discovery through Advanced Computing Program under grant # DE-FC02-01ER25465, and by the National Science Foundation Internet Technologies Program under grant # ANI-9980203. Alessandro Bassi

  13. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  14. A Machine Learning Approach to Performance Prediction of Total Order Broadcast Protocols()

    E-Print Network [OSTI]

    Rodrigues, LuĂ­s E.T.

    as of a number of specialized replication protocols tailored for, e.g., database systems [19] and transactional and evaluation of TOB protocols (extensively surveyed by Defago et al. [5]). However, we are not aware of any) through the PIDDAC Program funds and Aristos project (PTDC/EIA-EIA/102496/2008) and by the European

  15. Towards a Wireless Building Management System Requiring no Change to Upper-layer Protocols

    E-Print Network [OSTI]

    Wang, Dan

    communications to support transmission, design protocols for sensor networking and conduct application that converts existing wired sensor network into wireless without changing upper layer protocols decent understanding on the design within a wireless sensor network, e.g., OS, programming languages

  16. PhD Forum: Routing Protocol and Performance Modeling in Delay Tolerant Vehicular Networks

    E-Print Network [OSTI]

    vehicle research and development program with the goal of develop- ing technology that will enable routing protocols from MANET research is difficult. There are several models discussed in related work applications such as accident avoidance messaging, In Proc. 17th IEEE Intl. Conf. on Networking Protocols

  17. Algorithms for Categorizing Multiprocessor Communication Under Invalidate and UpdateBased Coherence Protocols \\Lambda

    E-Print Network [OSTI]

    Bianchini, Ricardo

    of useless traffic entailed by each coherence protocol. Under an invalidate­based protocol, our algorithms and Technology---HighPerformance Computing, Software Science and Tech­ nology program, ARPA Order no. 8930 to intro­ duce useless communication due to a mismatch between the hardware unit of coherence and the data

  18. Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc.

    E-Print Network [OSTI]

    1 Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc. Refrigerator Description Refrigerator recycling programs are designed to save energy through the removal of old-but- operable refrigerators from service. By offering free pick-up, providing incentives, and disseminating

  19. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  20. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  1. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  2. SAMPLING AND ANALYSIS PROTOCOLS

    SciTech Connect (OSTI)

    Jannik, T; P Fledderman, P

    2007-02-09T23:59:59.000Z

    Radiological sampling and analyses are performed to collect data for a variety of specific reasons covering a wide range of projects. These activities include: Effluent monitoring; Environmental surveillance; Emergency response; Routine ambient monitoring; Background assessments; Nuclear license termination; Remediation; Deactivation and decommissioning (D&D); and Waste management. In this chapter, effluent monitoring and environmental surveillance programs at nuclear operating facilities and radiological sampling and analysis plans for remediation and D&D activities will be discussed.

  3. Protocols for conducting Environmental Management Assessments of DOE organizations

    SciTech Connect (OSTI)

    Not Available

    1993-08-01T23:59:59.000Z

    To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

  4. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01T23:59:59.000Z

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  5. GHG Considerations in Integrated

    E-Print Network [OSTI]

    CO2 11 PGE's CO2 profile Carbon intensity 12 #12;6/5/2013 7 Ongoing, forecast load growth of 1-Quarters of U.S. coal fleet is over 30 years old 10 #12;6/5/2013 6 PGE's CO2 profile Total emissions & avoided

  6. GBTL Workshop GHG Emissions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdfTechnologiesNATIONAL ENVIRONMENTALnatural gas as a feedstock

  7. International Experience with Key Program Elements of IndustrialEnergy Efficiency or Greenhouse Gas Emissions Reduction Target-SettingPrograms

    SciTech Connect (OSTI)

    Price, Lynn; Galitsky, Christina; Kramer, Klaas Jan

    2008-02-02T23:59:59.000Z

    Target-setting agreements, also known as voluntary ornegotiated agreements, have been used by a number of governments as amechanism for promoting energy efficiency within the industrial sector. Arecent survey of such target-setting agreement programs identified 23energy efficiency or GHG emissions reduction voluntary agreement programsin 18 countries. International best practice related to target-settingagreement programs calls for establishment of a coordinated set ofpolicies that provide strong economic incentives as well as technical andfinancial support to participating industries. The key program elementsof a target-setting program are the target-setting process,identification of energy-saving technologies and measures usingenergy-energy efficiency guidebooks and benchmarking as well as byconducting energy-efficiency audits, development of an energy-savingsaction plan, development and implementation of energy managementprotocols, development of incentives and supporting policies, monitoringprogress toward targets, and program evaluation. This report firstprovides a description of three key target-setting agreement programs andthen describes international experience with the key program elementsthat comprise such programs using information from the three keytarget-setting programs as well as from other international programsrelated to industrial energy efficiency or GHG emissionsreductions.

  8. Vehicle Technologies Office Merit Review 2015: Development and Update of Long-Term Energy and GHG Emission Macroeconomic Accounting Tool

    Broader source: Energy.gov [DOE]

    Presentation given by Argonne National Laboratory at 2015 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Office Annual Merit Review and Peer Evaluation Meeting about development and...

  9. Vehicle Technologies Office Merit Review 2014: Development and Update of Long-Term Energy and GHG Emission Macroeconomic Accounting Tool

    Broader source: Energy.gov [DOE]

    Presentation given by Argonne National Laboratory at 2014 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Office Annual Merit Review and Peer Evaluation Meeting about the development...

  10. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  11. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  12. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  13. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  14. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  15. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  16. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  17. Generic protocol for environmental audits at federal facilities

    SciTech Connect (OSTI)

    NONE

    1989-08-01T23:59:59.000Z

    The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

  18. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  19. TEEX tackles toxins: TEEX develops ECLOX protocols to detect toxins in drinking water

    E-Print Network [OSTI]

    Jordan, Leslie

    2010-01-01T23:59:59.000Z

    Specialist Keith McLeroy: The equipment came with minimal instructions and no protocols for establishing baseline data for comparing the ECLOX readings. TCEQ turned to the TEEX Water and Wastewater Program to establish baseline data for 24 public...,? said McLeroy of TEEX?s Infrastructure Training and Safety Institute. ?After many years of looking at every research paper with the word ?ECLOX? in it, we were the first to actually achieve this (developing the protocols) with drinking water...

  20. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  1. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  2. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  3. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  4. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  5. Climate VISION: Resources and Links

    Office of Scientific and Technical Information (OSTI)

    Programs & Partnerships Industry Associations Technical Information GHG Information Plant Assessments Training Calendar Software Tools Voluntary GHG Reporting Guidelines Page Last...

  6. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  7. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  8. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  9. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  10. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  11. GRADUATE PROGRAM UNDERGRADUATE PROGRAMS

    E-Print Network [OSTI]

    SELF STUDY GRADUATE PROGRAM UNDERGRADUATE PROGRAMS DEPARTMENT OF POLITICAL SCIENCE COLLEGE OF LIBERALARTS TEXAS A&M UNIVERSITY March 2007 #12;SELF STUDY GRADUATE PROGRAM UNDERGRADUATE PROGRAMS DEPARTMENT........................................................................................ 4 Brief History of Degree Programs and the Department

  12. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  13. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  14. Chapter 17: Residential Behavior Protocol

    SciTech Connect (OSTI)

    Stewart, J.; Todd, A.

    2015-01-01T23:59:59.000Z

    Residential behavior-based (BB) programs use strategies grounded in the behavioral social sciences to influence household energy use. Strategies may include providing households with real-time or delayed feedback about their energy use; supplying energy-efficiency education and tips; rewarding households for reducing their energy use; comparing households to their peers; and establishing games, tournaments, and competitions. BB programs often target multiple energy end uses and encourage energy savings, demand savings, or both. Savings from BB programs are usually a small percentage of energy use, typically less than 5%.

  15. The two phase commit protocol simulation and analysis

    E-Print Network [OSTI]

    Bokil, Anupam

    1993-01-01T23:59:59.000Z

    IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

  16. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  17. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  18. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  19. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  20. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  1. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  2. LCA (Life Cycle Assessment) of Parabolic Trough CSP: Materials Inventory and Embodied GHG Emissions from Two-Tank Indirect and Thermocline Thermal Storage (Presentation)

    SciTech Connect (OSTI)

    Heath, G.; Burkhardt, J.; Turchi, C.; Decker, T.; Kutscher, C.

    2009-07-20T23:59:59.000Z

    In the United States, concentrating solar power (CSP) is one of the most promising renewable energy (RE) technologies for reduction of electric sector greenhouse gas (GHG) emissions and for rapid capacity expansion. It is also one of the most price-competitive RE technologies, thanks in large measure to decades of field experience and consistent improvements in design. One of the key design features that makes CSP more attractive than many other RE technologies, like solar photovoltaics and wind, is the potential for including relatively low-cost and efficient thermal energy storage (TES), which can smooth the daily fluctuation of electricity production and extend its duration into the evening peak hours or longer. Because operational environmental burdens are typically small for RE technologies, life cycle assessment (LCA) is recognized as the most appropriate analytical approach for determining their environmental impacts of these technologies, including CSP. An LCA accounts for impacts from all stages in the development, operation, and decommissioning of a CSP plant, including such upstream stages as the extraction of raw materials used in system components, manufacturing of those components, and construction of the plant. The National Renewable Energy Laboratory (NREL) is undertaking an LCA of modern CSP plants, starting with those of parabolic trough design.

  3. Protocol for DOE-VPP Star Site Re-certification Reviews

    Broader source: Energy.gov [DOE]

    This document provides the overall policy and the procedural protocols that will be utilized by the Office of Environment, Safety and Health in conducting re-certification reviews of facilities participating in the Department of Energy Voluntary Protection Program (DOE-VPP) at the Star recognition level.

  4. A Protocol for the Atomic Capture of Multiple Molecules on Large Scale Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Protocol for the Atomic Capture of Multiple Molecules on Large Scale Platforms Marin Bertier services. Envi- sioned over largely distributed and highly dynamic platforms, expressing this coordination coordination of services. However, the execution of such programs over large scale platforms raises several

  5. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    regulation and have gained attention recently within the context of greenhouse gas (GHG) emissions trading

  6. Protocols for Processes Programming in the Large for Open Systems

    E-Print Network [OSTI]

    ;The Essential Tension Reusability requires Context freedom Encapsulation Usability (usefulness conductor Akin to a workflow or flow in BPEL Choreography: an exchange of messages among participants Akin Process Specification Schema (BPSS) Intended to be legally binding Generally highly limited: two party

  7. Former Worker Program Medical Protocol | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAM Revised DOEDepartment of Energy Related

  8. Protocol, Qualification Standard for the Site Lead Program - May 2011 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November 2012

  9. Protocol, Technical Qualification Program - October 22, 2003 | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November

  10. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  11. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  12. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  13. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  14. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  15. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  16. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  17. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  18. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  19. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  20. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  1. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

    2009-03-27T23:59:59.000Z

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

  2. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  3. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  4. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  5. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  6. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  7. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  8. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  9. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  10. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

  11. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  12. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  13. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11T23:59:59.000Z

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  14. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  15. GHG Management Institute GHG MRV Curriculum | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump1946865°, -86.0529604°Wisconsin:FyreStorm IncLSE COMP POSTGHD Inc

  16. Chapter 16: Retrocommissioning Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    Retrocommissioning (RCx) is a systematic process for optimizing energy performance in existing buildings. It specifically focuses on improving the control of energy-using equipment (e.g., heating, ventilation, and air conditioning equipment and lighting) and typically does not involve equipment replacement. Field results have shown proper RCx can achieve energy savings ranging from 5% to 20%, with a typical payback of 2 years or less. A study conducted on behalf of Lawrence Berkeley National Laboratory analyzed data from 11 utilities operating RCx programs across the United States. The dataset included 122 RCx projects and more than 950 RCx measures.

  17. Seismicity Protocol | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCO OverviewRepository |Complex"DepartmentProgram under ARRAServices

  18. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  19. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    SciTech Connect (OSTI)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01T23:59:59.000Z

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  20. Rateless Deluge: Over-the-Air Programming of Wireless Sensor

    E-Print Network [OSTI]

    Goldberg, Bennett

    1 Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes thus design and implement two rateless OAP protocols, rateless Deluge and ACKless Deluge, both of which replace the data transfer mechanism of the established OAP Deluge protocol with rateless analogs

  1. Rateless Deluge: Over-the-Air Programming of Wireless Sensor

    E-Print Network [OSTI]

    Starobinski, David

    Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes thus design and implement two rateless OAP protocols, rateless Deluge and ACKless Deluge, both of which replace the data transfer mechanism of the estab- lished OAP Deluge protocol with rateless analogs

  2. GHG Update/CAP Progress ReportGHG Update/CAP Progress Report 2010 GHG Update2010 GHG Update

    E-Print Network [OSTI]

    Zhou, Pei

    i i f t d d 486­ Duke Energy emission factors decreased .486 kgCO2/kWh to .405 kgCO2/kWh · Steam Percentages 15% 1% (~328,000 MTeCO2) 13% 1% (~307,000 MTeCO2) 44% 10% 15% 49%1% 11% 44% 1% 1% 28% Electricity Update 450000 500000 250000 300000 350000 400000 CO2 100000 150000 200000 250000 MTeC 0 50000 1990 1991

  3. Ur/Web: A Simple Model for Programming the Web

    E-Print Network [OSTI]

    Chlipala, Adam

    The World Wide Web has evolved gradually from a document delivery platform to an architecture for distributed programming. This largely unplanned evolution is apparent in the set of interconnected languages and protocols ...

  4. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  5. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  6. IBM NJE protocol emulator for VAX/VMS

    SciTech Connect (OSTI)

    Engert, D.E.

    1981-01-01T23:59:59.000Z

    Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

  7. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chaneličre; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  8. User's guide to PROTOCOL, a numerical simulator for the dissolution reactions of inorganic solids in aqueous solutions

    SciTech Connect (OSTI)

    Pickrell, G.; Jackson, D.D.

    1984-10-01T23:59:59.000Z

    This report provides a user's manual for PROTOCOL, a comprehensive coupled kinetic/equilibrium computer program for analyzing the dissolution reactions of solids with aqueous solutions, specifically applied to the potential corrosion of vitrified nuclear waste by groundwater. The capabilities and available options are summarized as well as instructions for setting up and running problems. Also described in this report and included in the PROTOCOL software package are MASTER, a master file of species thermodynamic data, MANEQL, a preprocessor program and POSTP, a postprocessor. POSTP provides offline plotting using the CRAY-1 DISSPLA 9.0 graphics library. PROTOCOL is operational on the CDC-7600 and CRAY-1 computers at the Lawrence Livermore National Laboratory. 7 references, 10 figures, 2 tables.

  9. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    SciTech Connect (OSTI)

    Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Leitch, Rosalyn M [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  10. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  11. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  12. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  13. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  14. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  15. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  16. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  17. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  18. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  19. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  20. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  1. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  2. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  3. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  4. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  5. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  6. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  7. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  8. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  9. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  10. The Greenhouse Gas Protocol Initiative: Measurement and Estimation of

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries PvtStratosolarTharaldson Ethanol LLC Jump to:Uncertainty of GHG Emissions | Open

  11. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  12. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  13. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  14. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  15. Method and apparatus for collaborative use of application program

    DOE Patents [OSTI]

    Dean, Craig D. (Sandia Park, NM)

    1994-01-01T23:59:59.000Z

    Method and apparatus permitting the collaborative use of a computer application program simultaneously by multiple users at different stations. The method is useful with communication protocols having client/server control structures. The method of the invention requires only a sole executing copy of the application program and a sole executing copy of software comprising the invention. Users may collaboratively use a set of application programs by invoking for each desired application program one copy of software comprising the invention.

  16. Euclid Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Programming Programming Compiling and linking programs on Euclid. Compiling Codes How to compile and link MPI codes on Euclid. Read More Using the ACML Math Library How to...

  17. Student Internship Programs Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Student Internship Programs Program Description The objective of the Laboratory's student internship programs is to provide students with opportunities for meaningful hands- on...

  18. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  19. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  20. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  1. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  2. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  3. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  4. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  5. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  6. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  7. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  8. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  9. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  10. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  11. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  12. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  13. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  14. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  15. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  16. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  17. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  18. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  19. Program School/ Career: Descripton ISIS Program Codes

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

  20. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Bray, Kathryn L.; Conover, David R.; Kintner-Meyer, Michael CW; Viswanathan, Vijayganesh; Ferreira, Summer; Rose, David; Schoenwald, David

    2012-10-01T23:59:59.000Z

    The U.S. Department of Energy’s Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of EESs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  1. Protocol for uniformly measuring and expressing the performance of energy storage systems.

    SciTech Connect (OSTI)

    Ferreira, Summer Rhodes; Rose, David Martin; Schoenwald, David Alan; Bray, Kathy [Pacific Northwest National Laboratory, Richland, WA; Conover, David [Pacific Northwest National Laboratory, Richland, WA; Kintner-Meyer, Michael [Pacific Northwest National Laboratory, Richland, WA; Viswanathan, Vilayanur [Pacific Northwest National Laboratory, Richland, WA

    2013-08-01T23:59:59.000Z

    The U.S. Department of Energy's Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of ESSs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs to make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  2. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  3. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  4. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  5. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  6. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  7. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  8. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  9. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  10. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  11. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  12. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  13. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    ­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

  14. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  15. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  16. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  17. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  18. iTOUGH2 Universal Optimization Using the PEST Protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.

    2010-07-01T23:59:59.000Z

    iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  19. Sponsored Program Resources SPONSORED PROGRAMS

    E-Print Network [OSTI]

    Mather, Patrick T.

    Sponsored Program Resources - 1 - SPONSORED PROGRAMS Sponsored programs are research, instruction for sponsored programs is provided through an agreement between the sponsor and Syracuse University are being achieved and funds properly used Sponsored programs are managed by the Office of Sponsored

  20. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  1. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Experience, is a unique educational program designed to introduce students in geophysics and related fields to "hands on" geophysical exploration and research. The program...

  2. Program Administration

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21T23:59:59.000Z

    This volume describes program administration that establishes and maintains effective organizational management and control of the emergency management program. Canceled by DOE G 151.1-3.

  3. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  4. Environmental Programs Environmental Programs Committee

    E-Print Network [OSTI]

    Richards-Kortum, Rebecca

    162 Environmental Programs Environmental Programs Committee Walter Whitfield Isle, Chair (English) Katherine Bennett Ensor (Statistics) Mark R. Wiesner (Civil and Environmental Engineering) Donald Ostdiek (Architecture) The Environmental Programs Committee coordinates courses and curricula on environmental topics

  5. Accessible programming using program synthesis

    E-Print Network [OSTI]

    Singh, Rishabh

    2014-01-01T23:59:59.000Z

    New computing platforms have greatly increased the demand for programmers, but learning to program remains a big challenge. Program synthesis techniques have the potential to revolutionize programming by making it more ...

  6. Solving iTOUGH2 simulation and optimization problems using the PEST protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.; Zhang, Y.

    2011-02-01T23:59:59.000Z

    The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstrate the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.

  7. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  8. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  9. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  10. Implementation and evaluation of modified dynamic conformal arc (MDCA) technique for lung SBRT patients following RTOG protocols

    SciTech Connect (OSTI)

    Shi, Chengyu, E-mail: shicy1974@gmail.com [St. Vincent's Medical Center, Bridgeport, CT (United States); Tazi, Adam; Fang, Deborah Xiangdong; Iannuzzi, Christopher [St. Vincent's Medical Center, Bridgeport, CT (United States)

    2013-10-01T23:59:59.000Z

    To implement modified dynamic conformal arc (MDCA) technique and Radiation Therapy Oncology Group (RTOG) protocols in our clinic for stereotactic body radiation therapy (SBRT) treatment of patients with Stage I/II non–small cell lung cancer. Five patients with non–small cell lung cancer have been treated with SBRT. All the patients were immobilized using CIVCO Body Pro-Lok system and scanned using GE 4-slice computed tomography. The MDCA technique that was previously published was adopted as our planning technique, and RTOG protocols for the lung SBRT were followed. The patients were treated on Novalis Tx system with cone-beam computed tomography imaging guidance. All the patient plans passed the RTOG criteria. The conformal index ranges from 0.99 to 1.12 for the planning target volume, and the biological equivalent dose for the planning target volume is overall 100 Gy. Critical structures (lung, spinal cord, brachial plexus, skin, and chest wall) also meet RTOG protocols or published data. A 6-month follow-up of one of the patients shows good local disease control. We have successfully implemented the MDCA technique into our clinic for the lung SBRT program. It shows that the MDCA is useful and efficient for the lung SBRT planning, with the plan quality meeting the RTOG protocols.

  11. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muńoz, Francesc

    and Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  12. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  13. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  14. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  15. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  16. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  17. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingŐumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  18. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  19. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  20. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  1. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  2. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  3. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  4. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  5. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  6. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  7. Sponsors of CIEEDAC: Environment Canada Natural Resources Canada, Canadian Industry Program for Energy Conservation, Aluminium Industry Association, Canadian Chemical Producers' Association, Canadian Electricity

    E-Print Network [OSTI]

    of making more transparent data available to the public; · initiating the historical GHG emissions review ++ ­ + Prices + ­ + Crude oil -use Energy Data and Analysis Centre Simon Fraser University, Burnaby, BC February, 2008 #12;GHG Emissions

  8. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  9. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  10. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  11. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  12. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  13. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  14. Environmental compliance assessment protocol - federal aviation administration (ECAP-FAA). Final report

    SciTech Connect (OSTI)

    Mann, D.K.; Schell, D.J.

    1994-10-01T23:59:59.000Z

    In response to the growing number of environmental laws and regulations worldwide, the Federal Aviation Administration (FAA) has adopted an environmental compliance program that identifies compliance problems before they are cited as violations by the U.S. Environmental Protection Agency (USEPA). In 1992, the FAA developed a program to maintain compliance with all Federal, state, and local environmental regulations. The goal is to protect human health/safety and the environment. The Southern Region of the FAA, which includes eight states and the Caribbean, developed and implemented a specific environmental assessment and management program tailored to the type and size of their facilities and operations. The resulting system combines Federal environmental regulations, along with good management practices and risk management information, into a series of checklists that show (1) legal requirements and (2) which specific items or operations to review. In 1994, the program was implemented nationwide. The Environmental Compliance Assessment Protocol - Federal Aviation Administration (ECAP-FAA) incorporates existing checklists from USEPA and private industry. The system has been tested at several FAA facilities. The manual is updated continually to address new environmental compliance laws and regulations.

  15. A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features

    E-Print Network [OSTI]

    Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

    2014-09-06T23:59:59.000Z

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  16. Results of a Technical Review of the U.S. Climate Change Technology Program's R&D Portfolio

    SciTech Connect (OSTI)

    Brown, Marilyn A [ORNL

    2006-07-01T23:59:59.000Z

    The U.S. Climate Change Technology Program (CCTP) is a multi-agency planning and coordinating entity, led by the U.S. Department of Energy that aims to accelerate the development and facilitate the adoption of technologies to address climate change. In late 2005, CCTP asked Oak Ridge National Laboratory and Energetics Incorporated to organize and coordinate a review of the CCTP R&D portfolio using structured workshops. Each workshop focused on one of CCTP's six strategic goals: 1.Reduce emissions from energy end-use and infrastructure 2.Reduce emissions from energy supply 3.Capture and sequester carbon dioxide 4.Reduce emissions of non-CO2 greenhouse gases (GHG) 5.Improve capabilities to measure and monitor GHG emissions 6.Bolster basic science contributions to technology development To promote meaningful dialogue while ensuring broad coverage, a group of broadly experienced professionals with expertise in fields relevant to each CCTP goal were asked to participate in the portfolio reviews and associated workshops. A total of 75 experts participated in the workshops; 60 of these participants represented non-Federal organizations. This report summarizes the findings of the workshops and the results of the Delphi assessment of the CCTP R&D portfolio.

  17. 2008 Academic Program Review Graduate Programs

    E-Print Network [OSTI]

    2008 Academic Program Review of Graduate Programs November 2008 Texas A&M University College ........................................................................................................12 III. Graduate Program.....................................................................................................14 B. Educational Programs

  18. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol-profit organizations. To inform processes of policy development and implementation, climate change research needs #12;The MIT Joint Program on the Science and Policy of Global Change is an organization for research

  19. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01T23:59:59.000Z

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  20. Integrating Enhanced Building Operations into Municipal Sustainability Programming: A Report from NYC

    E-Print Network [OSTI]

    Bobker, M.

    2007-01-01T23:59:59.000Z

    . 2 The GHG Inventory showed over 75% of energy use to be attributable to buildings. PlaNYC2030 sets a reduction target of 30% of 2005 consumption. However, when taking projected urban growth into account, the reduction target is actually over.... Municipalities, large and small, have become a focal area for Greenhouse Gas (GHG) reduction commitments. Guided most often by the International Council of Local Environmental Initiatives (ICLEI), numerous municipalities have conducted GHG inventories...

  1. Insights from Agricultural GHG Offset studies

    E-Print Network [OSTI]

    McCarl, Bruce A.

    Ron Sands PNNL Maryland Man Keun Kim PNNL Maryland Francisco de Lachesnaye EPA Heng-Chi Lee Waterloo

  2. Climate VISION: Private Sector Initiatives: Semiconductors: GHG...

    Office of Scientific and Technical Information (OSTI)

    2005, the industry's PFC emissions were equivalent to 4.3 million metric tons of CO2 (Inventory of U.S. Greenhouse Gas Emissions and Sinks: 1990-2005, U.S. EPA, 2007). Since...

  3. Discounts, Fungibility and Agricultural GHG Offset projects

    E-Print Network [OSTI]

    McCarl, Bruce A.

    in MMT of Carbon Equivalents Soil Carbon Sequestration Discount for Saturating Sinks No Sink Discounting of Carbon Equivalents Carbon Sequestration from Trees Discount for Saturating Sinks No Sink Discounting 0.S. Agricultural and Forest Carbon Sequestration," 2003. #12;FungibilityFungibility A number of concepts have

  4. Sharing the Burden of GHG Reductions

    E-Print Network [OSTI]

    Jacoby, Henry D.

    The G8 countries propose a goal of a 50% reduction in global emissions by 2050, in an effort that needs to take account of other agreements specifying that developing countries are to be provided with incentives to action ...

  5. China-GHG Monitoring | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovation inOpenadd:Information ChinaChinaInformation

  6. China-GHG Monitoring | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovation inOpenadd:Information ChinaChinaInformationMonitoring

  7. GHG Management Institute curriculum | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDIT REPORTEnergyFarms A S JumpWindfarmFundicioncurriculum Jump to:

  8. IGES GHG Emissions Data | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup | OpenHunan Runhua New Energy DevelopmentListIIFCI Venture CapitalIGES

  9. Shear Transformation Zones: State Determined or Protocol Dependent?

    E-Print Network [OSTI]

    Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

    2014-08-18T23:59:59.000Z

    The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

  10. Streaming multimedia over WMSNs: an online multipath routing protocol

    E-Print Network [OSTI]

    Medjiah, Samir; Asgari, Abolghasem Hamid

    2012-01-01T23:59:59.000Z

    Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.

  11. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  12. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  13. Protocol development for evaluation of commercial catalytic cracking catalysts

    SciTech Connect (OSTI)

    Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

    1988-09-01T23:59:59.000Z

    A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

  14. Evaluation of metrics and baselines for tracking greenhouse gas emissions trends: Recommendations for the California climate action registry

    SciTech Connect (OSTI)

    Price, Lynn; Murtishaw, Scott; Worrell, Ernst

    2003-06-01T23:59:59.000Z

    Executive Summary: The California Climate Action Registry, which was initially established in 2000 and began operation in Fall 2002, is a voluntary registry for recording annual greenhouse gas (GHG) emissions. The purpose of the Registry is to assist California businesses and organizations in their efforts to inventory and document emissions in order to establish a baseline and to document early actions to increase energy efficiency and decrease GHG emissions. The State of California has committed to use its ''best efforts'' to ensure that entities that establish GHG emissions baselines and register their emissions will receive ''appropriate consideration under any future international, federal, or state regulatory scheme relating to greenhouse gas emissions.'' Reporting of GHG emissions involves documentation of both ''direct'' emissions from sources that are under the entity's control and indirect emissions controlled by others. Electricity generated by an off-site power source is consider ed to be an indirect GHG emission and is required to be included in the entity's report. Registry participants include businesses, non-profit organizations, municipalities, state agencies, and other entities. Participants are required to register the GHG emissions of all operations in California, and are encouraged to report nationwide. For the first three years of participation, the Registry only requires the reporting of carbon dioxide (CO2) emissions, although participants are encouraged to report the remaining five Kyoto Protocol GHGs (CH4, N2O, HFCs, PFCs, and SF6). After three years, reporting of all six Kyoto GHG emissions is required. The enabling legislation for the Registry (SB 527) requires total GHG emissions to be registered and requires reporting of ''industry-specific metrics'' once such metrics have been adopted by the Registry. The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab) was asked to provide technical assistance to the California Energy Commission (Energy Commission) related to the Registry in three areas: (1) assessing the availability and usefulness of industry-specific metrics, (2) evaluating various methods for establishing baselines for calculating GHG emissions reductions related to specific actions taken by Registry participants, and (3) establishing methods for calculating electricity CO2 emission factors. The third area of research was completed in 2002 and is documented in Estimating Carbon Dioxide Emissions Factors for the California Electric Power Sector (Marnay et al., 2002). This report documents our findings related to the first areas of research. For the first area of research, the overall objective was to evaluate the metrics, such as emissions per economic unit or emissions per unit of production that can be used to report GHG emissions trends for potential Registry participants. This research began with an effort to identify methodologies, benchmarking programs, inventories, protocols, and registries that u se industry-specific metrics to track trends in energy use or GHG emissions in order to determine what types of metrics have already been developed. The next step in developing industry-specific metrics was to assess the availability of data needed to determine metric development priorities. Berkeley Lab also determined the relative importance of different potential Registry participant categories in order to asses s the availability of sectoral or industry-specific metrics and then identified industry-specific metrics in use around the world. While a plethora of metrics was identified, no one metric that adequately tracks trends in GHG emissions while maintaining confidentiality of data was identified. As a result of this review, Berkeley Lab recommends the development of a GHG intensity index as a new metric for reporting and tracking GHG emissions trends.Such an index could provide an industry-specific metric for reporting and tracking GHG emissions trends to accurately reflect year to year changes while protecting proprietary data. This GHG intensity index changes

  15. Counterintelligence Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-12-10T23:59:59.000Z

    The Order establishes Counterintelligence Program requirements and responsibilities for the Department of Energy, including the National Nuclear Security Administration. Cancels: DOE 5670.3.

  16. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Description Discover E (Engineering) is an evening of interesting, interactive and fun engineering, science, math, and technology demonstrations for K-12 students and their...

  17. Programming Stage

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21T23:59:59.000Z

    This chapter addresses plans for the acquisition and installation of operating environment hardware and software and design of a training program.

  18. Counterintelligence Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-04T23:59:59.000Z

    To establish the policies, procedures, and specific responsibilities for the Department of Energy (DOE) Counterintelligence (CI) Program. This directive does not cancel any other directive.

  19. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MATHCOUNTS is a national enrichment, coaching and competition program that promotes middle school mathematic achievement. The mission of MATHCOUNTS is to increase enthusiasm for...

  20. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  1. The Development of Rapid Aging and Poisoning Protocols for Diesel...

    Broader source: Energy.gov (indexed) [DOE]

    by DOE OFCVT Fuels Technology Program and our program managers are Kevin Stork, Dennis Smith, and Steve Goguen OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY Catalyst...

  2. Community Leadership Certificate Program Program Overview

    E-Print Network [OSTI]

    Saldin, Dilano

    Community Leadership Certificate Program Program Overview The undergraduate Community Leadership Certificate Program is an interdisciplinary program where students from any major can explore leadership in community engagement and leadership. The program is based on a social justice model of leadership

  3. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  4. TOPAZ-Protocol Development Instructions for Researchers Page 1 Topaz Electronic Protocol Development

    E-Print Network [OSTI]

    Oliver, Douglas L.

    ...............................................................................................................................2 Saving will help you and/or give you an example. Save often. This program is webbased and if you lose your connection to the web, you will regret not saving. But do not click the save button twice in a row. Most

  5. Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks

    E-Print Network [OSTI]

    Turgut, Damla

    of a crisis. Our protocol does not rely on critical infrastructure. It is designed to be spectrally efficient then present the link rendezvous process in detail. At the heart of this process is an attention signal, inability to scale to meet the capacity demands of the crisis, and in some instances, difficulty

  6. Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    and energy consumption by up to three times compared to Deluge. These improvements are most prominent of these factors on the protocol's behavior. Moreover, we compare Typhoon's performance to that of Deluge--the de times faster than Deluge in sparse and lossy networks. This paper has five sections. We summarize

  7. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  8. How to Use Bitcoin to Design Fair Protocols Iddo Bentov

    E-Print Network [OSTI]

    How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

  9. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  10. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  11. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  12. Reducing Transaction Abort Rates with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muńoz, Francesc

    D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universidad Polit´ecnica de Valencia 46022 Valencia (SPAIN) {emiedes,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/22 E.Miedes,F.D.Mu~noz-Esco´i Transaction Abort Rates with Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  13. GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning

    E-Print Network [OSTI]

    Movileanu, Liviu

    GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

  14. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP ­ a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  15. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  16. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  17. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14T23:59:59.000Z

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  18. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  19. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770-2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770- 2) both assume that the two parties who wish to establish centre). 1 #12;· In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC 11770

  20. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770­2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770­ 2) both assume that the two parties who wish to establish centre). 1 #12; . In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC

  1. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert-hop network topology were conducted using three wireless sensor net- work traffic patterns (broadcast which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most

  2. Routing protocol for anycast communications in a wireless sensor network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Routing protocol for anycast communications in a wireless sensor network Nancy El Rachkidy. 1 Introduction In the past few years, wireless sensor networks have been used in several moni University Complexe scientifique des C´ezeaux, 63177 Aubi`ere cedex, France Abstract. In wireless sensor

  3. PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks Chieh-Yih Wan Dept. of Electrical class of reliable data applications emerging in wireless sensor networks. For example, currently sensor of sensors in wireless sensor networks on the fly (e.g., during disaster recovery). Due to the application

  4. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  5. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    is given. Next, the current eorts of the automotive industry on middleware technologies which mayA Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst

  6. LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note

    E-Print Network [OSTI]

    Raizada, Manish N.

    LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

  7. The COMPOW Protocol for Power Control in Ad Hoc Networks

    E-Print Network [OSTI]

    Kawadia, Vikas

    .S Sreenivas and P.R. Kumar The Power Control problem · How do we choose the right transmit power level ­ Power;3 Affects battery life · Higher power transmission is unnecessary if the receiver is close of links is critical · Find a way to ensure bidirectionality without breaking existing protocols

  8. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  9. Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"

    E-Print Network [OSTI]

    Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

    2014-04-28T23:59:59.000Z

    In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

  10. Survivability validation protocol issues for a system-of-systems

    SciTech Connect (OSTI)

    Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

    1993-08-01T23:59:59.000Z

    This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

  11. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  12. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  14. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  15. Energy Aware Implementation of an Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Brown, Timothy X.

    Energy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B in Telecommunications Department of InterDisciplinary Telecommunications 2003 #12;This thesis entitled: Energy Aware mentioned discipline. #12;iii Scriptor, Shweta Bhandare (M.S., Telecommunications) Energy Aware

  16. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07T23:59:59.000Z

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  17. Lightweight Protocol Suite for Wireless Sensor Networks: Design and Evaluation

    E-Print Network [OSTI]

    Huang, Changcheng

    , China Graduate School of the Chinese Academy of Sciences, Beijing, 100049, China E-mail: {chenhaiming phenomena [1]. Forecasting its wide application in both civilian and industrial fields, more and more are on the networking issues and energy consumption problems. To date, lots of efficient protocols have been proposed

  18. A proposed protocol for remote control of automated assessment devices

    SciTech Connect (OSTI)

    Kissock, P.S. [AlliedSignal FM and T/NM, Albuquerque, NM (United States); Pritchard, D.A. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31T23:59:59.000Z

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices.

  19. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  20. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06T23:59:59.000Z

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, this division of functionality evolved organically- tures of the algorithms, we construct TRUMP: a traffic man- agement protocol that is distributed

  3. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01T23:59:59.000Z

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc networks together to form...

  4. Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

  5. Solar Thermal Incentive Program

    Broader source: Energy.gov [DOE]

    Note: This program is not currently accepting applications. Check the program web site for information regarding future financing programs.

  6. ARRA Program Summary: Energy Smart Jobs Program

    E-Print Network [OSTI]

    ARRA Program Summary: Energy Smart Jobs Program Statewide Program (Initially targeting urban 30,000 buildings surveyed, approximately 5,000 will be retrofitted, yielding approximately $40

  7. Machinist Pipeline/Apprentice Program Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Machinist PipelineApprentice Program Program Description The Machinist Pipeline Program was created by the Prototype Fabrication Division to fill a critical need for skilled...

  8. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01T23:59:59.000Z

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  9. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect (OSTI)

    Mickalonis, J.

    2014-09-16T23:59:59.000Z

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  10. On the Performance of Collision Avoidance Protocols in Ad-Hoc Networks

    E-Print Network [OSTI]

    Paterakis, Michael

    the dialogue-based scheme. Examples of such protocols are: MACA [1], MACAW [2], DBTMA [3], FPRP [5], HRMA [7

  11. Performance Test Protocol for Evaluating Inverters Used in Grid-Connected

    E-Print Network [OSTI]

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

  12. Greenhouse Gas Programs, Energy Efficiency, and the Industrial Sector

    E-Print Network [OSTI]

    Zhou, A.; Tutterow, V.; Harris, J.

    The United States has made significant progress in reducing total energy use through energy efficiency improvements over the past decade, yet the United States still ranks as the highest absolute greenhouse gas (GHG) emitter in the world with 23...

  13. Joint implementation : lessons from Title IV's voluntary compliance programs

    E-Print Network [OSTI]

    Atkeson, Erica

    The United Nation's Framework Convention on Climate Change (FCCC), signed by more than 150 nations in June 1992, commits signatory countries to limit greenhouse gas (GHG) emissions to 1990 levels by the year 2000. Article ...

  14. Programming models

    SciTech Connect (OSTI)

    Daniel, David J [Los Alamos National Laboratory; Mc Pherson, Allen [Los Alamos National Laboratory; Thorp, John R [Los Alamos National Laboratory; Barrett, Richard [SNL; Clay, Robert [SNL; De Supinski, Bronis [LLNL; Dube, Evi [LLNL; Heroux, Mike [SNL; Janssen, Curtis [SNL; Langer, Steve [LLNL; Laros, Jim [SNL

    2011-01-14T23:59:59.000Z

    A programming model is a set of software technologies that support the expression of algorithms and provide applications with an abstract representation of the capabilities of the underlying hardware architecture. The primary goals are productivity, portability and performance.

  15. Static Analysis of Interrupt-driven Programs Synchronized via the Priority Ceiling Protocol

    E-Print Network [OSTI]

    MĂĽller-Olm, Markus

    Garching, Germany {schwmart,seidl,vojdanig}@in.tum.de Peter Lammich Markus M¨uller-Olm Westf¨alische Wilhelms-Universit¨at M¨unster Einsteinstra�e 62, D-48149 M¨unster, Germany {peter.lammich,markus.mueller-olm

  16. The integration of digitized images, databases, and inventory protocol in an inventory updating program

    E-Print Network [OSTI]

    Wright, Charles Timothy

    1993-01-01T23:59:59.000Z

    is known as a database management system (DBMS). Among a DBMS's advantages (Humphrey and Biagio, 1986; Loucopoulos and Zicari, 1992) are the ability to query data, assurance of consistency of stored data, and the ability to share data with many users...

  17. SECO Programs

    E-Print Network [OSTI]

    Trevino, E.

    2011-01-01T23:59:59.000Z

    this web page address! ASSISTANCE AND FUNDING OPPORTUNITIES Energy Efficiency Technical Assistance Energy Efficiency Grants Renewable Energy Technology Grants Alternative Fuel Grants The LoanSTAR Revolving Loan Program Energy Efficiency... maximum of $50,000 per grant ? Funded on a reimbursement basis Renewable Energy Technology Grants ? Fort Worth ISD ? South Sills High School ? 5KW Wind Turbine Alternative Fuel Grants ? Grant program to convert city/county and ISD vehicle...

  18. INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX

    E-Print Network [OSTI]

    Smith, Spencer

    INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX By SRDJAN RUSOVAN, B Code that Implements the PPP Protocol in Linux AUTHOR: Srdjan Rusovan, B.Sc. (University of Belgrade: viii, 145 #12;iii ABSTRACT The Point-to-Point Protocol (PPP) is a widely accepted standard used

  19. Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe

    E-Print Network [OSTI]

    Roscoe, Bill

    . . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

  20. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect (OSTI)

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30T23:59:59.000Z

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  1. Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muńoz, Francesc

    Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco´i InstitutoMiedesetal.:DynamicTotalOrderProtocolReplacementITI-SIDI-2012/009 #12;#12;Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco

  2. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyán

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely ´Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  3. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  4. QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1

    E-Print Network [OSTI]

    Wu, Jie

    QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

  5. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Wagner, David

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  6. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Boult, Terrance E.

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  7. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

  8. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    Brown, Timothy X.

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

  9. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

  10. A CDMA-Based, Self-Organizing, Location-Aware Media Access Control Protocol

    E-Print Network [OSTI]

    New South Wales, University of

    protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over latency. Our MAC protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over protocol design balances the con- siderations of energy-efficiency, latency, accuracy, and fault

  11. A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Demirbas, Murat

    A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

  12. PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Shihada, Basem

    PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

  13. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Perkins, Richard A.

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland .........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  14. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  15. U.S. EPA State Clean Energy and Climate Program (2009). Clean Energy Lead by Example Guide: Strategies, Resources, and Action Steps for State Programs.

    E-Print Network [OSTI]

    Prepared Joanna Pratt; Joe Donahue; Niko Dietsch

    State governments can achieve substantial energy cost savings across their facilities, operations, and fleets through clean energy Lead by Example (LBE) programs. They can also demonstrate energy and environmental leadership, raise public awareness of the benefits of clean energy technologies, improve air quality, reduce greenhouse gas (GHG) emissions, improve energy supply and reliability, and foster markets for environmentally preferable products. The LBE Guide provides information to assist state governments as they develop and implement effective LBE programs to achieve their clean energy goals. It presents strategies, resources, and tools state decision makers can use throughout the process. EPA and other organizations recognize leading by example as a key policy option for states seeking to achieve their clean energy goals. For example, the importance of LBE programs is documented in the the National Action Plan for Energy Efficiency “Vision for 2025 ” report. The Vision identifies LBE as a critical component of achieving the long-term goal of all cost-effective energy efficiency by 2025. Goal Six of the Vision’s ten implementation goals is to develop state policies such as LBE for pursuing robust energy efficiency practices. DocUmEnt maP ChAPtER onE introduction ChAPtER two Potential lBE activities and measures ChAPtER thREE

  16. Program Year 2008 State Energy Program Formula

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy (DOE) State Energy Program (SEP), SEP Program Guidance Fiscal Year 2008, Program Year 2008, energy efficiency and renewable energy programs in the states, DOE Office of Energy Efficiency and Renewable Energy

  17. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Martí Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11T23:59:59.000Z

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  18. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  19. Quantum secret-sharing protocol based on Grover's algorithm

    SciTech Connect (OSTI)

    Hsu, Li-Yi [Physics Division, National Center of Theoretical Sciences, Hsinchu, Taiwan, Republic of China (China)

    2003-08-01T23:59:59.000Z

    A marked state can be found with certainty in the two-qubit case of Grover's algorithm. This property is included in the proposed quantum secret-sharing protocol. In the proposed scheme, the sender prepares some initial state in private and then performs a phase shift of the marked state as the sender's bit. Then, the sender sends these two qubits to each of the two receivers. Only when the sender broadcasts the initially prepared state and then the receivers perform the corresponding inversion operation about the average, is the sender's bit faithfully revealed. Moreover, the sender can detect deception using cheat-detecting states. The proposed quantum secret-sharing protocol is shown to be secure.

  20. CANCER PROGRAM ANNUAL REPORT CANCER PROGRAM

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    CANCER PROGRAM ANNUAL REPORT CANCER PROGRAM 2010 ANNUAL REPORT WITH STATISTICAL DATA FROM 2009 UNIVERSITY OF ILLINOIS MEDICAL CENTER #12;2 CANCER PROGRAM ANNUAL REPORT 2 #12;3 CANCER PROGRAM ANNUAL REPORT 3 UIMC CANCER PROGRAM CHANGING MULTIDISCIPLINARY CARE. FOR GOOD. #12;4 CANCER PROGRAM ANNUAL REPORT

  1. Single-step distillation protocol with generalized beam splitters

    SciTech Connect (OSTI)

    Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

    2003-07-01T23:59:59.000Z

    We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

  2. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01T23:59:59.000Z

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  3. STEP Program Benchmark Report

    Broader source: Energy.gov [DOE]

    STEP Program Benchmark Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  4. Maryland Efficiency Program Options

    Broader source: Energy.gov [DOE]

    Maryland Efficiency Program Options, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  5. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01T23:59:59.000Z

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  6. Program Summaries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70 Hg Mercury 35Information &Program PlanningProgram

  7. Climate VISION: Private Sector Initiatives: Minerals

    Office of Scientific and Technical Information (OSTI)

    Commitment Letter (PDF 318 KB) Download Acrobat Reader For updates regarding IMA-NA participants see Work Plans and GHG Inventory Protocols. Page Last Modified: February 12, 2009...

  8. Greenhouse Emission Reductions and Natural Gas Vehicles: A Resource Guide on Technology Options and Project Development

    SciTech Connect (OSTI)

    Orestes Anastasia; NAncy Checklick; Vivianne Couts; Julie Doherty; Jette Findsen; Laura Gehlin; Josh Radoff

    2002-09-01T23:59:59.000Z

    Accurate and verifiable emission reductions are a function of the degree of transparency and stringency of the protocols employed in documenting project- or program-associated emissions reductions. The purpose of this guide is to provide a background for law and policy makers, urban planners, and project developers working with the many Greenhouse Gas (GHG) emission reduction programs throughout the world to quantify and/or evaluate the GHG impacts of Natural Gas Vehicle (NGVs). In order to evaluate the GHG benefits and/or penalties of NGV projects, it is necessary to first gain a fundamental understanding of the technology employed and the operating characteristics of these vehicles, especially with regard to the manner in which they compare to similar conventional gasoline or diesel vehicles. Therefore, the first two sections of this paper explain the basic technology and functionality of NGVs, but focus on evaluating the models that are currently on the market with their similar conventional counterparts, including characteristics such as cost, performance, efficiency, environmental attributes, and range. Since the increased use of NGVs, along with Alternative Fuel Vehicle (AFVs) in general, represents a public good with many social benefits at the local, national, and global levels, NGVs often receive significant attention in the form of legislative and programmatic support. Some states mandate the use of NGVs, while others provide financial incentives to promote their procurement and use. Furthermore, Federal legislation in the form of tax incentives or procurement requirements can have a significant impact on the NGV market. In order to implement effective legislation or programs, it is vital to have an understanding of the different programs and activities that already exist so that a new project focusing on GHG emission reduction can successfully interact with and build on the experience and lessons learned of those that preceded it. Finally, most programs that deal with passenger vehicles--and with transportation in general--do not address the climate change component explicitly, and thus there are few GHG reduction goals that are included in these programs. Furthermore, there are relatively few protocols that exist for accounting for the GHG emissions reductions that arise from transportation and, specifically, passenger vehicle projects and programs. These accounting procedures and principles gain increased importance when a project developer wishes to document in a credible manner, the GHG reductions that are achieved by a given project or program. Section four of this paper outlined the GHG emissions associated with NGVs, both upstream and downstream, and section five illustrated the methodology, via hypothetical case studies, for measuring these reductions using different types of baselines. Unlike stationary energy combustion, GHG emissions from transportation activities, including NGV projects, come from dispersed sources creating a need for different methodologies for assessing GHG impacts. This resource guide has outlined the necessary context and background for those parties wishing to evaluate projects and develop programs, policies, projects, and legislation aimed at the promotion of NGVs for GHG emission reduction.

  9. 2008 Guidelines to Defra's GHG Conversion Factors Guidelines to Defra's GHG Conversion Factors

    E-Print Network [OSTI]

    - Imports and Exports Last updated: Jun-05 Total emissions (kg CO2) Total electricity produced Total heat produced kg CO2/kWh elecricity Total emissions (kg CO2) Total electricity produced Total heat produced kg CO2/kWh heat Emissions (in kgCO2) per kWh electricity = twice total emissions (in kgCO2) twice total

  10. Efficient protocols for deterministic secure quantum communication using GHZ-like states

    E-Print Network [OSTI]

    Anindita Banerjee; Anirban Pathak

    2012-01-18T23:59:59.000Z

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

  11. Proposed New Program: Planning New Programs

    E-Print Network [OSTI]

    Machel, Hans

    Proposed New Program: Planning New Programs Planning Program As outlined in the attached document, the Human Geography group is bringing forward a proposal for a new undergraduate program in Planning. The Curriculum Committee has discussed this program both last year, and in our Friday the 13th

  12. Better Buildings Neighborhood Program Business Models Guide: Program Administrator Description

    Broader source: Energy.gov [DOE]

    Better Buildings Neighborhood Program Business Models Guide: Program Administrator Business Models, Program Administrator Description.

  13. Cap-and-Trade Modeling and Analysis: Congested Electricity Market Equilibrium

    E-Print Network [OSTI]

    Limpaitoon, Tanachai

    2012-01-01T23:59:59.000Z

    GHG Regulations in Electricity . . . . . . . . . . . . . .and Trade Programs in Electricity: the Case of Californiadown) . . . . . . . . . . . . . . 1.4.2 Electricity Analysis

  14. Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras

    E-Print Network [OSTI]

    Qin, Ni

    2010-01-16T23:59:59.000Z

    assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

  15. ASHRAE's New Performance Measurement Protocols for Commercial Buildings

    E-Print Network [OSTI]

    Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

    meters. Figure 8 shows an example of photograph of a lighting modelcompared with a simulated image using Radiance software. Chapter 5:Acoustics (CurtEichelberger). In Chapter 5 protocols are provided for the performance measurement of indoor acoustics...-metering of specific water using loads such as landscapewateringor coolingtowers. In a similar fashion as Level 1, the benchmark for Level 2 would be a comparison to a national database.Level 3 would consist of Level 2 information and hourly metering from data loggers...

  16. Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November 2012 Protocol

  17. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prev nextEnergy Consumer Privacy whileProtocol for

  18. Program Development

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation covers how to go about developing a human reliability program. In particular, it touches on conceptual thinking, raising awareness in an organization, the actions that go into developing a plan. It emphasizes evaluating all positions, eliminating positions from the pool due to mitigating factors, and keeping the process transparent. It lists components of the process and objectives in process development. It also touches on the role of leadership and the necessity for audit.

  19. Office of Environment, Safety and Health Assessments Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    the requirements and responsibilities for conducting and managing the Office of Environment, Safety and Health Assessments required reading program. Office of Environment,...

  20. Summer School Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summer School Programs Summer School Programs Focused technical enrichment programs. Contact Leader Francis J. Alexander (505) 665-4518 Email Deputy Carolyn Connor (505) 665-9891...

  1. Geothermal Technologies Program Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Jay Nathwani Acting Program Manager Geothermal Technologies Program Office of Energy Efficiency and Renewable Energy The Geothermal Technologies Program Overview May 18 2010 Energy...

  2. Existing Facilities Program

    Broader source: Energy.gov [DOE]

    The NYSERDA Existing Facilities program merges the former Peak Load Reduction and Enhanced Commercial and Industrial Performance programs. The new program offers a broad array of different...

  3. URBAN LEADERSHIP DEVELOPMENT PROGRAM SUPPLEMENTAL PROGRAM APPLICATION

    E-Print Network [OSTI]

    Walker, Lawrence R.

    URBAN LEADERSHIP DEVELOPMENT PROGRAM SUPPLEMENTAL PROGRAM APPLICATION as part of your Graduate College application to the Urban Leadership Program/Supervisor: #12;Part 3: LEADERSHIP EXPERIENCES: Identify any educational leadership experiences

  4. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01T23:59:59.000Z

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  5. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect (OSTI)

    Assche, G. van; Cerf, N.J. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); Iblisdir, S. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); GAP-Optique, University of Geneva, 20 rue de l'Ecole-de-Medecine, CH-1211 Geneva (Switzerland)

    2005-05-15T23:59:59.000Z

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  6. Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muńoz, Francesc

    Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/23 (supersedes TR-ITI-ITE-07/07) E.Miedes,F.D.Mu~noz-Esco´i:AddingPrioritiestoTotalOrderBroadcastProtocolsTR-ITI-ITE-07/23( #12;#12;Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  7. On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muńoz, Francesc

    On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report ITI-SIDI-2009/002 E.Miedes,F.D.Mu~noz-Esco´i:OntheCostofPrioritizedAtomicMulticastProtocolsITI-SIDI-2009/002 #12;#12;On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  8. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  9. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15T23:59:59.000Z

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  10. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15T23:59:59.000Z

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, dated 6-27-13, cancels DOE O 142.1A. Certified 12-3-14.

  11. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14T23:59:59.000Z

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  12. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01T23:59:59.000Z

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  13. Trapped Ion Quantum Error Correcting Protocols Using Only Global Operations

    E-Print Network [OSTI]

    Joseph F. Goodwin; Benjamin J. Brown; Graham Stutter; Howard Dale; Richard C. Thompson; Terry Rudolph

    2014-07-07T23:59:59.000Z

    Quantum error-correcting codes are many-body entangled states that are prepared and measured using complex sequences of entangling operations. Each element of such an entangling sequence introduces noise to delicate quantum information during the encoding or reading out of the code. It is important therefore to find efficient entangling protocols to avoid the loss of information. Here we propose an experiment that uses only global entangling operations to encode an arbitrary logical qubit to either the five-qubit repetition code or the five-qubit code, with a six-ion Coulomb crystal architecture in a Penning trap. We show that the use of global operations enables us to prepare and read out these codes using only six and ten global entangling pulses, respectively. The proposed experiment also allows the acquisition of syndrome information during readout. We provide a noise analysis for the presented protocols, estimating that we can achieve a six-fold improvement in coherence time with noise as high as $\\sim 1\\%$ on each entangling operation.

  14. addition-cambridge trial protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  15. anesthesia gas-guided protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  16. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01T23:59:59.000Z

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  17. A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes

    Broader source: Energy.gov [DOE]

    Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

  18. On the group theoretic structure of a class of quantum dialogue protocols

    E-Print Network [OSTI]

    Chitra Shukla; Vivek Kothari; Anindita Banerjee; Anirban Pathak

    2012-03-27T23:59:59.000Z

    Intrinsic symmetry of the existing protocols of quantum dialogue are explored. It is shown that if we have a set of mutually orthogonal $n$-qubit states {\

  19. An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha

  20. Impacts of the Kyoto protocol on U.S. energy markets and economic activity

    SciTech Connect (OSTI)

    NONE

    1998-10-01T23:59:59.000Z

    The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

  1. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect (OSTI)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19T23:59:59.000Z

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP staff and investigate specific ways to improve implementation. Another meeting in July 2011 focused on preparations for outreach to industry and universities. In this paper PNRI describes current implementation of the AP in the Philippines, and both DOE/INSEP and PNRI provide their perspectives on their cooperation to enhance that implementation.

  2. Solar Energy Incentives Program

    Broader source: Energy.gov [DOE]

    Note: The deadline for the most recent solicitation under this program has now passed. The program is currently closed, pending revisions to the program guidelines. Please see the program web site...

  3. HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM

    E-Print Network [OSTI]

    HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM date ­ November 23, 2004 · Contract end date ­ March 31, 2006 #12;Hydrogen Regional Infrastructure Program in Pennsylvania Hydrogen Regional Infrastructure Program in Pennsylvania · Objectives ­ Capture

  4. Human Reliability Program Overview

    SciTech Connect (OSTI)

    Bodin, Michael

    2012-09-25T23:59:59.000Z

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  5. Program Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prev next >Presentations Program Presentations

  6. Science Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland Science Stockpile2015HighlightsSciencePrograms

  7. Volunteer Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEureka Analytics and VisualizationVolunteer

  8. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriorityPetroleumNotActivities |Program

  9. Program Description

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News, informationPriorityPetroleumNotActivities |Program

  10. Program Managers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program Direction and Analysis Deputy Director

  11. SCIENCE Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobs Running jobsS2.Tour"Program early

  12. Resource Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection TechnicalResonant Soft X-Ray Scattering of0 Resource Program

  13. Educational Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnet UpdateEarthTroubleProgram

  14. DOE Technical Assistance Program

    Broader source: Energy.gov (indexed) [DOE]

    energy management, and conservation strategies * Green building technologies * Building codes Program Design and Implementation * Policy and program development * Coordinating...

  15. Actuarial Sciences Program

    E-Print Network [OSTI]

    The Purdue Actuarial Science Program is an interdisciplinary program offered jointly by the Department of Mathematics and Department of Statistics.

  16. Renewable Energy Grant Programs

    Broader source: Energy.gov [DOE]

    '''''Note: This program is no longer accepting applications. See the program web site for information regarding future solicitations. '''''

  17. SUNY Programs: Australia and

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    SUNY Programs: Australia and New Zealand Semester, Academic Year and Short Term #12;1 Table of Contents How to Use this Booklet 1 Choosing a Program in Australia and New Zealand 2 Exchange vs. Study Abroad 3 Programs Outside Sydney and Melbourne 4 Programs in Melbourne 10 Programs in Sydney 12 Programs

  18. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06T23:59:59.000Z

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  19. International Programs and Services International Programs

    E-Print Network [OSTI]

    Stephens, Graeme L.

    International Programs and Services _______________ 1.5 Page 1 International Programs and Services OFFICE OF INTERNATIONAL PROGRAMS Offices in Laurel Hall (970) 491-5917 www.international.colostate.edu James A. Cooney, Vice Provost for International Affairs The Office of International Programs acts

  20. International Programs and Services International Programs

    E-Print Network [OSTI]

    Collett Jr., Jeffrey L.

    International Programs and Services International Programs and Services OFFICE OF INTERNATIONAL PROGRAMS Offices in Laurel Hall (970) 491-5917 international.colostate.edu James A. Cooney, Vice Provost for International Affairs The Office of International Programs acts as a catalyst for ideas that bring about

  1. Signature Program/Landmark Research Programs

    E-Print Network [OSTI]

    Signature Program/Landmark Research Programs for the College of Veterinary Medicine and Biomedical Sciences November 20, 2008 #12;SIGNATURE PROGRAM PROPOSAL: CARDIOVASCULAR SCIENCES/DEBAKEY INSTITUTE in Figure 1 to identify the participants in the cardiovascular science program and the central role

  2. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

    2014-03-14T23:59:59.000Z

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  3. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  4. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06T23:59:59.000Z

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  5. Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)

    E-Print Network [OSTI]

    Kamboj, Pariza

    2010-01-01T23:59:59.000Z

    Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

  6. Field Monitoring Protocol: Mini-Split Heat Pumps

    SciTech Connect (OSTI)

    Christensen, D.; Fang, X.; Tomerlin, J.; Winkler, J.; Hancock, E.

    2011-03-01T23:59:59.000Z

    The report provides a detailed method for accurately measuring and monitoring performance of a residential Mini-Split Heat Pump. It will be used in high-performance retrofit applications, and as part of DOE's Building America residential research program.

  7. ANJE5.40. VAX VMS IBM NJE Protocol Emulator

    SciTech Connect (OSTI)

    Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

    1990-06-01T23:59:59.000Z

    The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

  8. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  9. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  10. Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario

    E-Print Network [OSTI]

    Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario Malisa as an alternative solution. In this paper, we compare the performance of the two protocols in a Home Automation of Home Automation networks. Routing in LLNs is one of the key challenges for the IoT emergence

  11. METHODOLOGY Open Access Protocol: A simple phenol-based method for 96-well

    E-Print Network [OSTI]

    Howard, Martin

    Arabidopsis seedlings. This prompted us to develop a high-throughput RNA extraction protocol (HTP96) adapted. Conclusion: The development of the HTP96 protocol has vastly increased our sample throughput, allowing us in many labs, and develop an effective high-throughput gene expression platform. We propose that the HTP96

  12. An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Perkins, Dmitri

    1 An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks Van Nguyen-utilized and performance is not maximized. In this work, we propose the Opportunistic Virtual MISO (OVM) protocol for multi-hop wireless networks. OVM combines virtual MISO (using space- time block codes) and cooperative diversity

  13. The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

    E-Print Network [OSTI]

    Levis, Philip

    of performance of opportunistic routing and network coding protocols. Comparing Deluge and Rateless Deluge, Deluge's network coding counterpart, we find that can predict which of the two is best suited is the ability to send a single packet to multiple receivers. Data dissemi- nation protocols such as Deluge [8

  14. A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming

    E-Print Network [OSTI]

    Xu, Dongyan

    1 A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming the effectiveness of TFDP. Keywords: Data integrity, message digest, and media streaming. I. INTRODUCTION Consider

  15. Team Oriented Multicast: a Scalable Routing Protocol for Large Mobile Networks

    E-Print Network [OSTI]

    Park, Joon-Sang

    Team Oriented Multicast: a Scalable Routing Protocol for Large Mobile Networks Yunjung Yi, Mario Team Oriented Multicast (TOM). TOM builds up a "motion aware" hierarchy to support efficient, scalable team multicast protocol. TOM identifies clusters of nodes with same affinity as teams and manages

  16. Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures

    E-Print Network [OSTI]

    Llanos, Diego R.

    Reducing the Replacement Overhead on COMA Protocols for Workstation-Based Architectures Diego R discuss the behavior of the replacement mechanism of well-known COMA protocols applied to a loosely replacement mecha- nism in order to select the destination node of a replacement transaction without

  17. State Pruning for Test Vector Generation for a Multiprocessor Cache Coherence Protocol

    E-Print Network [OSTI]

    Minnesota, University of

    }@ece.umn.edu dabts@cray.com Abstract Verification is extremely important in designing digital systems such as a cache coherence protocol. Generating traces for system verification using a model checker and then using bugs in the Stanford DASH cache coherence protocol. Using an IBM Power4 system with the Berkeley Active

  18. 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET

  19. Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cs.cmu.edu)

    E-Print Network [OSTI]

    Salvucci, Dario D.

    1 Tracing Eye Movement Protocols with Cognitive Process Models Dario D. Salvucci (dario+@cmu.edu) Department of Psychology; Carnegie Mellon University Pittsburgh, PA 15213 Abstract In using eye movements to develop cognitive models, researchers typically analyze eye movement protocols with aggregate measures

  20. Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia

    E-Print Network [OSTI]

    Burton, Geoffrey R.

    Assessing Rural Transformations: Piloting a Qualitative Impact Protocol in Malawi and Ethiopia a Qualitative Impact Protocol in Malawi and Ethiopia James Copestake and Fiona Remnant Abstract This paper impact evaluation of NGO sponsored rural development projects in Malawi and Ethiopia. Two of the projects