National Library of Energy BETA

Sample records for hypertext transfer protocol

  1. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  2. An Oblivious Transfer Protocol with Log-Squared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6-computation and communication (k · log2 n + · log n), where k is a possibly non-constant security parameter. The new proto- col communication and is private in the standard complexity-theoretic model. Keywords. Computationally

  3. An Oblivious Transfer Protocol with LogSquared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log­Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6­computation and communication #(k · log 2 n + # · log n), where k is a possibly non­constant security parameter. The new proto the same asymptotic communication and is private in the standard complexity­theoretic model. Keywords

  4. Hypertextual Ultrastructures: Movement and Containment in Texts and Hypertexts

    E-Print Network [OSTI]

    Coste, Rosemarie L.

    2010-01-14

    ............. 25 Ultrastructure Creates the Hyper- Attributes of Hypertext ................. 28 Toward a Formalist Criticism of Hypertext ........................................ 34 II ?CLICK HERE TO AGREE??ERROR AND VALIDATION...

  5. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  6. Building Visual Knowledge in a `Cinematic Hypertext' authoring environment

    E-Print Network [OSTI]

    Shipman, Frank

    1 Building Visual Knowledge in a `Cinematic Hypertext' authoring environment Clara Mancini them, the cinematic medium is the closest to hypertext and the analogy between cinema and hypertext in general1 has been pointed out in more than one occasion [3,7,8]. In particular, though, cinematic language

  7. Towards `Cinematic' Hypertext Technical Report KMI-04-31

    E-Print Network [OSTI]

    Towards `Cinematic' Hypertext Technical Report KMI-04-31 August, 2004 Clara Mancini and Simon Buckingham Shum Mancini, C. and Buckingham Shum, S. (2004). Towards `Cinematic' Hypertext. Proceedings of ACM://kmi.open.ac.uk/publications/pdf/kmi-04-31.pdf] #12;Towards `Cinematic' Hypertext Clara Mancini Knowledge Media Institute The Open

  8. Automatic Construction of News Hypertext Theodore Dalamagas, Mark D. Dunlop

    E-Print Network [OSTI]

    Dunlop, Mark D.

    Automatic Construction of News Hypertext Theodore Dalamagas, Mark D. Dunlop Computing Science Abstract The automatic construction of hypertext is an important part of the hy­ pertext authoring process. In this paper, we present a methodology for the automatic creation of links for news hypertext which is tailored

  9. Programmazione Web HyperText Markup Language (HTML)

    E-Print Network [OSTI]

    De Antonellis, Valeria

    Programmazione Web HyperText Markup Language (HTML) e Cascading Style Sheet (CSS) 2014/2015 #12;2014/2015 Programmazione Web - HTML e CSS 2 HyperText Markup Language l HTML (HyperText Markup Language) è un linguaggio di, è disponibile la versione HTML5 #12;2014/2015 Programmazione Web - HTML e CSS 3 HTML tag Ogni tag è

  10. Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate

    E-Print Network [OSTI]

    Morozov, Kirill

    . Building on their result, we extend it in two ways: 1) we construct ef- ficient passively-secure protocols-theoretic security for both parties, hence building OT as- suming noisy resources (channels or correlations channel or correlation in the case of passive cheaters. Their construction was inefficient. The OT

  11. Design of the PSI connection processor for the Xpress transfer protocol

    E-Print Network [OSTI]

    Brudeseth, Rolf

    1994-01-01

    Transfer Protocol is designed. The implementation is based on the finite state machines in revision 3.4. While reviewing the state machines 7 it became clear that they would require modifications to ensure that they will behave as one must assume...

  12. Knowledge Media Institute From Cinematographic to Hypertext Narrative

    E-Print Network [OSTI]

    of narrative coherence in hypertext. Brief examples of cinematic representation models are mapped onto being used in video [12]. Here, we look at what cinematic language may suggest about hypertext discourse models [9]. HOW CINEMA BUILDS MEANING The cinematic minimal linguistic unit is the shot (the frame being

  13. Knowledge Media Institute Cognitive Coherence Relations and Hypertext

    E-Print Network [OSTI]

    Knowledge Media Institute Cognitive Coherence Relations and Hypertext: From Cinematic Coherence Relations and Hypertext: From Cinematic Patterns to Scholarly Discourse Clara Mancini and Simon-mail:{C.Mancini,S.Buckingham.Shum}@open.ac.uk ABSTRACT In previous work we argued that cinematic language may provide insights into the construction

  14. Towards Cinematic Hypertext: A Theoretical and Empirical Investigation

    E-Print Network [OSTI]

    Towards Cinematic Hypertext: A Theoretical and Empirical Investigation Tech Report kmi-04-6 March submission February 2004 PHD awarded March 2004 #12;Knowledge Media Institute TOWARDS CINEMATIC HYPERTEXT elements of these with new theoretical insights, to investigate a fourth paradigm referred to as Cinematic

  15. Notes on the Vitality of Hypertext Systems Mark Bernstein

    E-Print Network [OSTI]

    Shipman, Frank

    Notes on the Vitality of Hypertext Systems Mark Bernstein Eastgate Systems, Inc. E-mail: bernstein with age, fade, and ultimately disappear. VITALITY Designers of new hypertext systems have always been is not loss of its platform but rather the gradual loss of its vitality, its ability to support change

  16. Intellectual Property Rights For Digital Library And Hypertext Publishing

    E-Print Network [OSTI]

    Glushko, Robert J.

    Intellectual Property Rights For Digital Library And Hypertext Publishing Systems: An Analysis of digital media will inevitably require some adjustments in the copyright model if digital libraries. By far the most ambitious proposal for a digital library and hypertext publishing environment is Ted

  17. Response to Incorporation of Supplemental Gonadotropins for Donor and Recipient Protocols in Commercial Bovine Embryo Transfer

    E-Print Network [OSTI]

    Chiles, Kelley

    2012-07-16

    stream_source_info CHILES-THESIS.pdf.txt stream_content_type text/plain stream_size 82955 Content-Encoding ISO-8859-1 stream_name CHILES-THESIS.pdf.txt Content-Type text/plain; charset=ISO-8859-1 RESPONSE... TO INCORPORATION OF SUPPLEMENTAL GONADOTROPINS FOR DONOR AND RECIPIENT PROTOCOLS IN COMMERCIAL BOVINE EMBRYO TRANSFER A Thesis by KELLEY CHRISTINE CHILES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment...

  18. Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution of an Approach and Toolkit

    E-Print Network [OSTI]

    Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution of an Approach and Toolkit Simon Buckingham Shum & Tamara Sumner KMI-TR-57 December, 1997 Submitted for publication [http://kmi.open.ac.uk/kmi-abstracts/kmi-tr-57-abstract.html]. #12;Publishing, Interpreting and Negotiating Scholarly Hypertexts: Evolution

  19. Design of the PSi Header Processor for Xpress Transfer Protocol(XTP)

    E-Print Network [OSTI]

    Rayaprolu, Murthy S.

    1992-01-01

    dual-pipeline scheme has been designed to handle variable length packets. The shoter packets follow pipeline Pl, and the longer packets follow pipeline P2. Also, all packets belonging to the same Connection Processors as those following P2 also... follow P2 irrespective of their length. In all, there are seven processing stages(processing elements) in the designed header processor. The first stage, which interfaces with the adjacent protocol layers, is common to both pipelines. In pipeline Pl...

  20. A hypertext model for accessing complex information: the reconstruction of a journey through Italy and Greece

    E-Print Network [OSTI]

    Parrish, David Allen

    1995-01-01

    The objective of this study is to construct a model of a computer based hypertext environment to enable easier access to complex information while providing the viewer with greater insight into a particular subject matter ...

  1. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES Science NetworkMediator Effects of Protonation State

  2. MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

    E-Print Network [OSTI]

    Yoo, Seung-mok

    2012-01-01

    the measured energy consumptions during one data transfertransmission, and energy consumption for the data transferand the energy consumption depends on the data transfer

  3. MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

    E-Print Network [OSTI]

    Yoo, Seung-mok

    2012-01-01

    include wireless sensing systems, low-power design, energyFast and Energy-Efficient Data Transfer over SPI in WirelessEnergy efficiency, master-slave switch, SPI bus, wireless

  4. Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico

    E-Print Network [OSTI]

    Perez, Mary Louise

    2012-08-31

    Management Institute, Inc. (PMI) to implement Information Technology (IT) projects and to transfer technology know how knowledge to its subsidiary in Mexico. To answer this question, an assessment of Cisco and Avaya VoIP telephony systems was completed...

  5. Fertility of Beef Recipients Following a Fixed-Time Embryo Transfer Protocol that Includes Follicle Stimulating Hormone Diluted in Hyaluronan

    E-Print Network [OSTI]

    Thorne, Jacob Westley

    2013-05-06

    and Methods The data of this study was collected in collaboration with OvaGenix, LP, a private embryo transfer company located in Bryan, TX. All cattle were provided by customers of OvaGenix, LP and the cost of materials and labor were funded by Bioniche... as effective as the 40 mg dose, and thus the 20 mg dose was not included in the present study. Estradiol CIDR?Removal?+?PGF Day?0? Day? FSHProg./Estr.?Combo?+?CIDR? Transfer 1675 8 ? 22? ? Table?1.?? Fertility...

  6. 8. HTML and XHTML --Hypertext Markup Language, Part I 8-1 Chapter 8: HTML/XHTML I

    E-Print Network [OSTI]

    Brass, Stefan

    ://www.ncsa.uiuc.edu/General/Internet/WWW/] Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2004 #12;8. HTML and XHTML -- Hypertext web pages in strict HTML 4.0/XHTML 1.0. · write syntactically correct HTML/XHTML. · read the HTML for Stylesheets and Javascript. Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2004 #12;8. HTML

  7. 8. HTML and XHTML --Hypertext Markup Language, Part I 8-1 Chapter 8: HTML/XHTML I

    E-Print Network [OSTI]

    Brass, Stefan

    ://www.ncsa.uiuc.edu/General/Internet/WWW/] Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2009 #12;8. HTML and XHTML -- Hypertext web pages in strict HTML 4.0/XHTML 1.0. · write syntactically correct HTML/XHTML. · read the HTML for Stylesheets and Javascript. Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2009 #12;8. HTML

  8. 8. HTML and XHTML --Hypertext Markup Language, Part I 8-1 Chapter 8: HTML/XHTML I

    E-Print Network [OSTI]

    Brass, Stefan

    ://www.ncsa.uiuc.edu/General/Internet/WWW/] Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2011 #12;8. HTML and XHTML -- Hypertext web pages in strict HTML 4.0/XHTML 1.0. · write syntactically correct HTML/XHTML. · read the HTML for Stylesheets and Javascript. Stefan Brass: Grundlagen des World Wide Web Universit¨at Halle, 2011 #12;8. HTML

  9. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  10. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES Science NetworkMediator Effects of ProtonationEfficient Wide

  11. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  12. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil

  13. Drinking Water and Groundwater Protection Division File Transfer...

    Open Energy Info (EERE)

    Drinking Water and Groundwater Protection Division File Transfer Protocol (FTP) Site Instructions Jump to: navigation, search OpenEI Reference LibraryAdd to library Permitting...

  14. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  15. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  16. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  17. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  18. Information Retrieval in Distributed Hypertexts Paul De Bra 1 , GeertJan Houben 1 , Yoram Kornatzky 2 , Reinier Post 1

    E-Print Network [OSTI]

    Houben, Geert-Jan

    or to a node that appears in a history list or a hotlist. Fulltext search and/or the creation of indexes and without a DBMS). Each site is completely autonomous, and offers a simple interface (protocol) to the other

  19. Application Protocols o Multimedia

    E-Print Network [OSTI]

    Biagioni, Edoardo S.

    Application Protocols o Telnet o FTP o WWW o SMTP o NNTP o IRC 7 #12; IRC o Internet Relay Chat o similar to telnet o chat

  20. An Evaluation of UDP Transport Protocols

    SciTech Connect (OSTI)

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  1. A Protocol for Quantum Energy Distribution

    E-Print Network [OSTI]

    Masahiro Hotta

    2008-07-10

    A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

  2. INTERNET PROTOCOL DARPA INTERNET PROGRAM

    E-Print Network [OSTI]

    McBrien, Peter

    RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared Way Marina del Rey, California 90291 #12;#12;September 1981 Internet Protocol TABLE OF CONTENTS ...................................................... 9 3. SPECIFICATION ................................................... 11 3.1 Internet Header Format

  3. Wumpus Protocol Analysis

    E-Print Network [OSTI]

    White, Barbara Y.

    The goal of this research was to assist in the creation of a new, improved Wumpus advisor by taking protocols of ten people learning to play Wumpus with a human coach. It was hoped that by observing these subjects learn ...

  4. Evolving Custom Communication Protocols

    E-Print Network [OSTI]

    Fernandez, Thomas

    Evolving Custom Communication Protocols by Wes Faler of Part-Time Scientists for 28C3, Berlin One-at-time simulation #12;Easy as 1...2...3... Parameter sweep int driver_movesPerTransaction[] = { 1, 20 }; int driver_wheelTicksPerCommand[] = { 512, 4096 }; int driver_commandsPerPacket[] = { 1, 25

  5. Office of Technology Transfer Material Transfer Agreements

    E-Print Network [OSTI]

    Tullos, Desiree

    Office of Technology Transfer Material Transfer Agreements Confidentiality Agreements Copyright / Patent Licensing The Office of Technology Transfer facilitates the transfer of innovations out of the university for public benefit TOOLS #12;Office of Technology Transfer Facilitating transfer of innovations

  6. House Simulation Protocols Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols Report House Simulation Protocols Report Report cover Building America's House Simulation Protocols report is designed to assist researchers in tracking...

  7. Superior Energy Performance Certification Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance cm Certification Protocol December 7, 2012 D R A F T f o r R E V I E W Superior Energy Performance cm Certification Protocol 1 December 7, 2012 2012...

  8. Design and simulation of Header Processor for Xpress Transfer Protocol

    E-Print Network [OSTI]

    Chandangoudar, Girish R.

    1993-01-01

    designed to meet the needs of high-speed networks. This research focuses on the hardware imple- mentation of XTP. Different hardware architectures for XTP are presented. A dual- pipelined XTP Header Processor is explained. To overcome many... of the problems associated with the dual-pipelined XTP Header Processor, a single-pipelined XTP Header Processor is proposed, Different design issues snd implementation techniques for the single-pipelined Header Processor are explained. Simulation models...

  9. Drinking Water and Groundwater Protection Division File Transfer Protocol

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (UtilityInstrumentsAreafor Geothermal Resources Rules - Idaho Jump

  10. File Transfer Protocol (FTP) Site Instructions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload Website

  11. Thesis Research Protocol November 2013 1 Thesis Research Protocol

    E-Print Network [OSTI]

    van Vliet, Lucas J.

    Thesis Research Protocol November 2013 1 Thesis Research Protocol November 2013 Thesis Research Project The master's programme Industrial Ecology is completed by the Thesis Research Project (TRP Ecology. The Thesis Research Project is composed of two modules: a Thesis Preparation Module (6 EC

  12. Sex GENOTYPING PROTOCOL PCR PROTOCOL NAME: Sex1

    E-Print Network [OSTI]

    Shoubridge, Eric

    Sex GENOTYPING PROTOCOL GENE NAME: PCR PROTOCOL NAME: Sex1 PCR REAGENTS: 10X NEB THERMOPOL PCR) PRIMERS: Sex1 Forward (20uM Standard Working Concentration) Sex1 Reverse (20uM Standard Working CONDITIONS: Sex (or Sex1) 95 C for 3 min 95 C for 30 sec 60 C for 1 min 35 cycles

  13. Continuous-Variable Protocols in the Noisy-Storage Model

    E-Print Network [OSTI]

    Fabian Furrer; Christian Schaffner; Stephanie Wehner

    2015-09-30

    We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achieve security by establishing a trade-off between quantum uncertainty generated in the protocol and the classical capacity of the memory channel. As our main technical tool, we study and derive new uncertainty relations for continuous-variable systems. Finally, we provide explicit security parameters for realistic memory models.

  14. Confidential Continuous Variable Direct Communication Protocol by Using Fock-Coherent Entangled States

    E-Print Network [OSTI]

    Soudeh Jahanshahi; Soroosh Alighanbari; Alireza Bahrampour; Mohammad Hossein Zandi

    2015-02-02

    We propose a scheme for the secure direct communication based on the entangled phase-coherent states, which shows an elevated level of confidentiality. The protocol gives a simultaneous security control for every bit of transferred information. The security-check-per-bit is provided by sending an additional mode to prove the legitimate parties' authenticity. Other benefit include increased transfer rate, since a separate control sequences is unnecessary. We study the security of the scheme for both ideal and realistic quantum channel. The protocol shows a robust security and prepares 50% probability to detect the presence of the eavesdropper.

  15. Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks Thomas R. Henderson * and Randy H. Katz University of California at Berkeley {tomhbased protocol, the Service Specific Connection Oriented Protocol (SSCOP), for use as a transport protocol

  16. Expressive Analytical Model for Routing Protocols infor Routing Protocols in

    E-Print Network [OSTI]

    Julien, Christine

    Taesoo Jun Angela Dalton Sh h k B dShreeshankar Bodas Christine Julien Sriram Vishwanath TR-UTEDGE-2007 in Mobile Ad Hoc Networks Taesoo Jun, Angela Dalton, Shreeshankar Bodas, Christine Julien, and Sriram, sriram}@ece.utexas.edu Abstract--Many routing protocols exist for mobile ad hoc networks. To select

  17. Reviews and approves OG protocol Publishes New protocols, Revisions,

    E-Print Network [OSTI]

    Kay, Mark A.

    CIRB reviews/approves Study-Specific Worksheet; notifies researcher & local IRB of acceptance Confirms- Specific Worksheet Worksheet Acceptance (site accepted) New protocols Revisions Renewals DSMB rpts Local local site closure to Researcher and to local IRB Oncology Group (OG) Scientific review at CTEP takes

  18. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security The library is open only to members of Brasenose; strangers are not to be admitted. Eating, drinking (with the exception of water) and smoking are strictly forbidden. Library the library. Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  19. Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread programming models scaling properties and eventually higher density: phase change memory (PCM), spin torque transfer (STT-RAM), etc. PCM: heat and cool a material with elec pulses the rate of heat/cool determines

  20. A Protocol For Cooling and Controlling Composite Systems by Local Interactions

    E-Print Network [OSTI]

    Daniel Burgarth; Vittorio Giovannetti

    2008-11-14

    We discuss an explicit protocol which allows one to externally cool and control a composite system by operating on a small subset of it. The scheme permits to transfer arbitrary and unknown quantum states from a memory on the network ("upload access") as well as the inverse ("download access"). In particular it yields a method for cooling the system.

  1. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  2. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    April 2015 (Revision 1) - PROTOCOL - EA-30-02 Office of Environment, Safety and Health Assessments Protocol for Required Reading, April 2015 (Revision 1) - PROTOCOL -...

  3. Implementation of two-party protocols in the noisy-storage model

    SciTech Connect (OSTI)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-15

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  4. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  5. Transfer information remotely via noise entangled coherent channels

    E-Print Network [OSTI]

    A. El Allati; N. Metwally; Y. Hassouni

    2010-02-11

    In this contribution, a generalized protocol of quantum teleportation is suggested to investigate the possibility of remotely transfer unknown multiparities entangled coherent state. A theoretical technique is introduced to generate maximum entangled coherent states which are used as quantum channels. We show that the mean photon number plays a central role on the fidelity of the transferred information. The noise parameter can be considered as a control parameter only for small values of the mean photon number.

  6. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and Alexandre Juin 1994 #12; Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v the existing hardware and software testing methods would be adequate for the testing of communication protocols

  7. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and AlexandreZal Juin 1994 #12;Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v. Bochmann and software testing methods would be adequate for the testing of communication protocols. The purpose

  8. The Pulse Protocol: Energy Efficient Infrastructure Access

    E-Print Network [OSTI]

    Awerbuch, Baruch

    The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, herb}@cs.jhu.edu Abstract-- We present the Pulse protocol which is designed for multi-hop wireless. The Pulse protocol utilizes a periodic flood initiated at the network gateways which provides both routing

  9. TEC Working Group Topic Groups Archives Protocols

    Broader source: Energy.gov [DOE]

    The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  10. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et tudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  11. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  12. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  13. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  14. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  15. Transfer of Spatial Reference Frame Using Singlet States and Classical Communication

    E-Print Network [OSTI]

    Thomas B. Bahder

    2014-08-27

    A simple protocol is described for transferring spatial direction from Alice to Bob (two spatially separated observers) up to inversion. The two observers are assumed to share quantum singlet states and classical communication. The protocol assumes that Alice and Bob have complete free will (measurement independence) and is based on maximizing the Shannon mutual information between Alice and Bob's measurement outcomes. Repeated use of this protocol for each spatial axis of Alice allows transfer of a complete 3-dimensional reference frame, up to inversion of each of the axes. The technological complexity of this protocol is similar to that needed for BB84 quantum key distribution, and hence is much simpler to implement than recently proposed schemes for transmission of reference frames. A second protocol based on a Bayesian formalism is also presented.

  16. Fast population transfer engineering of three-level systems

    E-Print Network [OSTI]

    Xi Chen; J. G. Muga

    2012-07-12

    We design, by invariant-based inverse engineering, resonant laser pulses to perform fast population transfers in three-level systems. The efficiency and laser intensities are examined for different protocols. The energy cost to improve the fidelity is quantified. The laser intensities can be reduced by populating the intermediate state and by multi-mode driving.

  17. Bioheat Transfer Valvano, page 1 Bioheat Transfer

    E-Print Network [OSTI]

    a technically challenging task. First, tissue heat transfer includes conduction, convection, radiation and by heat transfer due to blood flow near the probe. In vivo, the instrument measures effective thermal properties that are the combination of conductive and convective heat transfer. Thermal properties

  18. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  19. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  20. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Office of Environmental Management (EM)

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  1. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform...

    Energy Savers [EERE]

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  2. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov [DOE]

    This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007.

  3. Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization

    E-Print Network [OSTI]

    Bernardo, Danilo Valeros; 10.5121/ijnsa.2010.2402

    2010-01-01

    The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the dev...

  4. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  5. Wireless adiabatic power transfer

    SciTech Connect (OSTI)

    Rangelov, A.A., E-mail: rangelov@phys.uni-sofia.bg [Department of Physics, Sofia University, James Bourchier 5 blvd., 1164 Sofia (Bulgaria); Suchowski, H.; Silberberg, Y. [Department of Physics of Complex System, Weizmann Institute of Science, Rehovot 76100 (Israel); Vitanov, N.V. [Department of Physics, Sofia University, James Bourchier 5 blvd., 1164 Sofia (Bulgaria)

    2011-03-15

    Research Highlights: > Efficient and robust mid-range wireless energy transfer between two coils. > The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. > Wireless energy transfer is insensitive to any resonant constraints. > Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  6. Improving the Security of Cryptographic Protocol Standards

    E-Print Network [OSTI]

    Basin, David

    for their implementation. This generality is enabled by standards and technical documents such as Request for CommentsImproving the Security of Cryptographic Protocol Standards David Basin Cas Cremers Kunihiko Miyazaki Sasa Radomirovic Dai Watanabe May 1, 2014 Keywords: Standards, Network Protocols, Security

  7. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  8. Protocols for Processes Munindar P. Singh

    E-Print Network [OSTI]

    Protocols for Processes Munindar P. Singh (Students: Amit K. Chopra, Nirmit V. Desai, Ashok U. Mallya) singh@ncsu.edu Department of Computer Science North Carolina State University http://www.csc.ncsu.edu/faculty/mpsingh/ c Munindar P. Singh, July 2004 p.1/25 #12;Why Processes and Protocols? Heavy interest from

  9. Positron: Composing Commitment Protocols No Institute Given

    E-Print Network [OSTI]

    to a specific role). We evaluate our contributions by modeling well-known protocols in the insurance, manufactur with how they relate to one another. Such a description, even if supported by standards such as BPMN [20 exchanged by the business partners. In contrast, a commitment protocol emphasizes the social state

  10. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  11. Measuring Transport Protocol Potential for Energy Efficiency

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras. Several attempts have been made to measure the energy efficiency of trans- port protocols, (e.g. [10], [12-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

  12. Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7 Checklist for Adding a Collection to the DRILL Photos Images: 1. Take dorsal and lateral photos. 2. Sort images in their collection folder into the specific file in Images Ready For DRILL folder on the FTP server. 4. Transfer

  13. HEAT TRANSFER FLUIDS

    E-Print Network [OSTI]

    Lenert, Andrej

    2012-01-01

    The choice of heat transfer fluids has significant effects on the performance, cost, and reliability of solar thermal systems. In this chapter, we evaluate existing heat transfer fluids such as oils and molten salts based ...

  14. Heat Transfer Guest Editorial

    E-Print Network [OSTI]

    Kandlikar, Satish

    Journal of Heat Transfer Guest Editorial We are indeed delighted in bringing out this special issue was showcased in diverse areas such as traditional heat and mass transfer, lab-on-chip, sensors, biomedical applica- tions, micromixers, fuel cells, and microdevices. Selected papers in the field of heat transfer

  15. Context-Aware Protocol Engines for Ad Hoc Networks

    E-Print Network [OSTI]

    Garcia-Luna-Aceves, J.J.

    2009-01-01

    Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation

  16. Adapting a delay-based protocol to heterogeneous environments

    E-Print Network [OSTI]

    Kotla, Kiran

    2008-10-10

    We investigate the issues in making a delay-based protocol adaptive to heterogeneous environments. We assess and address the problems a delay-based protocol faces when competing with a loss-based protocol such as TCP. We ...

  17. An Alternative Quantization Protocol for the History Dependent Parrondo Game

    E-Print Network [OSTI]

    Faisal Shah Khan

    2008-06-09

    Earlier work on the quantization of the history dependent (HD) Parrondo game by Flitney, Ng, and Abbott led to the FNA protocol. We propose an alternative quantization protocol for this game which differs from the FNA protocol in various aspects.

  18. Office of Environment, Safety and Health Assessments Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    April 2015 Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 The purpose of this protocol is to establish...

  19. Heat transfer system

    DOE Patents [OSTI]

    Not Available

    1980-03-07

    A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

  20. Heat transfer system

    DOE Patents [OSTI]

    McGuire, Joseph C. (Richland, WA)

    1982-01-01

    A heat transfer system for a nuclear reactor. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

  1. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

  2. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  3. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

  4. High Performance Computing Data Center Metering Protocol | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

  5. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

  6. TEC Working Group Topic Groups Archives Protocols Meeting Summaries...

    Office of Environmental Management (EM)

    Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 Jacksonville TEC Meeting,...

  7. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  8. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Office of Environmental Management (EM)

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design...

  9. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  10. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  11. The Development of Rapid Aging and Poisoning Protocols for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices...

  12. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at...

  13. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments Protocol for the Development and Maintenance of Criteria Review and...

  14. Optimizing local protocols implementing nonlocal quantum gates

    E-Print Network [OSTI]

    Scott M. Cohen

    2010-02-02

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and are deterministic while also being "one-shot", in that they use only one copy of an entangled resource state. The optimization is in the sense of minimizing the amount of entanglement used, and it is often the case that less entanglement is needed than with an alternative protocol using two-way teleportation.

  15. Energy Assessment Protocol for Glass Furnaces

    E-Print Network [OSTI]

    Plodinec, M. J.; Kauffman, B. M.; Norton, O. P.; Richards, C.; Connors, J.; Wishnick, D.

    2005-01-01

    of the protocol are implemented, resulting in cost savings of greater than $200,000 per year. PROJECT OVERVIEW The glass industry is a major energy consumer. Depending on the market sector, a glass furnace heated by oxy-fuel burners may use from 3..., the manufacturer of the burners used in the PPG furnace, brought extensive field experience to the team, as well as in-depth knowledge of burner performance. ENERGY ASSESSMENT PROTOCOL The project team developed the protocol based on DIAL, Eclipse and PPG...

  16. Protected quantum-state transfer in decoherence-free subspaces

    E-Print Network [OSTI]

    Wei Qin; Chuan Wang; Xiangdong Zhang

    2015-04-07

    We propose and analyse a robust quantum state transfer protocol by the use of a combination of coherent quantum coupling and decoherence-free subspaces in a coupled quantum spin chain. Under decoherence, an arbitrary unknown quantum state embedded in a decoherence-free subspace can be perfectly transferred through a noisy channel being weakly coupled to two end registers. The method protects quantum information from both the channel noise and the environmental decoherence. A special case of utilizing two physical qubits to encode one logical qubit is considered as an example and the robustness is confirmed by numerical performances.

  17. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  18. A SECURE TEXT MESSAGING PROTOCOL Gary Belvin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in conformity with the requirements for the degree of Master of Science in Security Informatics. Baltimore Key Agreement Protocol for SMS (KAPS) 12 3.1 Retransmission Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.9 Key Agreement

  19. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  20. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10

    In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the ...

  1. Verifying the Mascara Protocol | A rst step |

    E-Print Network [OSTI]

    Sidorova, Natalia

    Verifying the Mascara Protocol | A #12;rst step | Dragan Bosnacki Dennis Dams Susanne Graf Leszek list properties associated with the di#11;erent entities which we intend to verify or for which we

  2. An Algorithm for Evolving Protocol Constraints

    E-Print Network [OSTI]

    Collins, Mark

    We present an investigation into the design of an evolutionary mechanism for multiagent protocol constraint optimisation. Starting with a review of common population based mechanisms we discuss the properties of the ...

  3. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    "B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson, C.E. Hancock

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  4. Fuel transfer system

    DOE Patents [OSTI]

    Townsend, H.E.; Barbanti, G.

    1994-03-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool. 6 figures.

  5. Fuel transfer system

    DOE Patents [OSTI]

    Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Cupertino, CA)

    1994-01-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

  6. Facility Survey & Transfer

    Broader source: Energy.gov [DOE]

    As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

  7. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  8. On the Complexity of Verifying Cyber-Physical Security Protocols

    E-Print Network [OSTI]

    Nigam, Vivek

    On the Complexity of Verifying Cyber-Physical Security Protocols Max Kanovich, Tajana Ban Kirigin agents. We classify such security protocols as Cyber-Physical.6 The key elements of such protocols important class of Bounded Memory Cyber-Physical Security19 Protocols with a Memory Bounded Intruder

  9. Validating a token coherence protocol for scientific Fernandez-Pascual

    E-Print Network [OSTI]

    Acacio, Manuel

    Validating a token coherence protocol for scientific workloads Ricardo Fernandez-Pascual r.fernandez

  10. Automatic Protocol Selection in Secure Two-Party Computations

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Protocol Selection in Secure Two-Party Computations (Full Version) Florian Kerschbaum1 for the best performance. In this paper we propose automatic protocol selection which selects a protocol, based on an extended performance model we automatically select the best protocol for a sub

  11. APPLYING HYPERTEXT STRUCTURES TO SOFTWARE DOCUMENTATION

    E-Print Network [OSTI]

    French, James C.

    correspondence should be addressed. 2.This work was supported in part by the U.S. Nuclear Regulatory Commission of the U.S. Nuclear Regulatory Commission. The views expressed are those of the authors and do not necessarily reflect any position or policy of the U.S. Nuclear Regulatory Commission. Appeared

  12. Multi-model adaptive spatial hypertext

    E-Print Network [OSTI]

    Francisco-Revilla, Luis

    2005-02-17

    Information delivery on the Web often relies on general purpose Web pages that require the reader to adapt to them. This limitation is addressed by approaches such as spatial hypermedia and adaptive hypermedia. Spatial hypermedia augments...

  13. Software Aesthetics: tools and patterns of hypertext

    E-Print Network [OSTI]

    2004-09-30

    -rate days, a wave pattern is identified that is characteristic of high rain events. This wave pattern is then compared to the patterns of variability of brightness temperature using empirical orthogonal functions. A linear regression technique is used...

  14. Hybrid protocol of remote implementations of quantum operations

    E-Print Network [OSTI]

    Ning Bo Zhao; An Min Wang

    2007-08-04

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

  15. Transport Protocol Services (TAPS) Problem: more and more transport protocols available, with various features,

    E-Print Network [OSTI]

    Welzl, Michael

    Transport Protocol Services (TAPS) Problem: more and more transport protocols that would not offer "TCP or UDP" but "transport services" A transport system: transport-services@ifi.uio.no hXps://sympa.uio.no/ifi.uio.no/info/transport-services Problem

  16. Wireless adiabatic power transfer

    E-Print Network [OSTI]

    A. A. Rangelov; H. Suchowski; Y. Silberberg; N. V. Vitanov

    2010-10-30

    We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  17. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  18. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  19. Quantum Communication Protocol Employing Weak Measurements

    E-Print Network [OSTI]

    Alonso Botero; Benni Reznik

    1999-09-27

    We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin. In our protocol, Alice, first generates a "code" by performing weak measurements on a sample of N spins. The sample is sent to Bob, who later performs a post-selection by measuring the spin along either of two certain directions. The results of the post-selection define the "key', which he then broadcasts publicly. Using both her previously generated code and this key, Alice is able to infer the {\\em direction} chosen by Bob in the post-selection. Alternatively, if Alice broadcasts publicly her code, Bob is able to infer from the code and the key the direction chosen by Alice for her weak measurement. Two possible experimental realizations of the protocols are briefly mentioned.

  20. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelire; R. Lauro; J. Ruggiero; J. -L. Le Gout

    2009-11-17

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  1. Technology transfer 1994

    SciTech Connect (OSTI)

    Not Available

    1994-01-01

    This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

  2. A Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    -- Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In additionA Lightweight Framework for Source-to-Sink Data Transfer in Wireless Sensor Networks J. Jobin, for many sensor network applications, timeliness of data delivery at a sink that collects and interprets

  3. HEAT AND MOISTURE TRANSFER THROUGH CLOTHING

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01

    R. C. Eberhart (ed), Heat transfer in medicine and biology.between convective heat transfer and mass transferConvective and radiative heat transfer coefficients for

  4. Heat and moisture transfer through clothing

    E-Print Network [OSTI]

    Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

    2009-01-01

    R. C. Eberhart (ed), Heat transfer in medicine and biology.Convective and radiative heat transfer coefficients forbetween convective heat transfer and mass transfer

  5. Ames Lab 101: Technology Transfer

    ScienceCinema (OSTI)

    Covey, Debra

    2012-08-29

    Ames Laboratory Associate Laboratory Director, Sponsored Research Administration, Debra Covey discusses technology transfer. Covey also discusses Ames Laboratory's most successful transfer, lead-free solder.

  6. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 l total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  7. Comparing Communication Protocols under Cooperative Pressure

    E-Print Network [OSTI]

    Eiben, A.E. "Guszti"

    Comparing Communication Protocols under Cooperative Pressure A.E. Eiben M.C. Schut N. Vink largely on the abilities of the agents to cooperate and communicate. In environments where coordination is essential for goal accomplishment, agents must thus appropriately communicate for cooperative task

  8. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode end-to-end tunnel mode security-gateway to security-gateway transport mode and tunnel model can coexist #12;7 Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8 Ravi

  9. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  10. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the tworound group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  11. Efficiency Limitations for -Protocols for Group Homomorphisms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Limitations for -Protocols for Group Homomorphisms (Full Version) Endre Bangerter1 , Jan stephan.krenn@bfh.ch Abstract. Efficient zero-knowledge proofs of knowledge for group ho- momorphisms be performed very efficiently within groups of known order, for hidden order groups the respective proofs

  12. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  13. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    structure called the blockchain. The protocol requires from miners to solve a "proof of work" (POW, aka-forcing a hash inequality based on SHA-256, in order to generate new blocks for the blockchain. The blocks that comprise the blockchain contain sets of transactions that are generated at will by owners of bitcoins, who

  14. Increasing Communications Security through Protocol Parameter Diversity

    E-Print Network [OSTI]

    New Mexico, University of

    of the protocol more difficult to predict. This form of diversity is designed to mitigate the shrew attack [16 Rica, 2060 gbarrantes@ecci.ucr.ac.cr and Stephanie Forrest University of New Mexico, Department. Recently, several projects have addressed the problem of widely replicated attacks through a technique

  15. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  16. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01

    data when transmitted over best-effort networks like the Internet. The protocols are end-to-end, and do not propose any modifications (like reservations) to the network infrastructure-hence, they can be used over the existing Internet. The design...

  17. Multiscale photosynthetic exciton transfer

    E-Print Network [OSTI]

    A. K. Ringsmuth; G. J. Milburn; T. M. Stace

    2012-06-14

    Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest sustained coherent exciton transfer may be possible over distances large compared with nearest-neighbour (n-n) chromophore separations, at physiological temperatures, in a clustered network with small static disorder. This may support findings suggesting long-range coherence in algal chloroplasts, and provides a framework for engineering large chromophore or quantum dot high-temperature exciton transfer networks.

  18. Policy on Cost Transfer Policy on Cost Transfer

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Policy on Cost Transfer 12/22/2014 Policy on Cost Transfer I. Purpose and Scope The University has posting of a cost to the general ledger, initiated by payroll charges, purchase orders or check requests (and the purchasing card). Cost Transfer means any subsequent transfer of the original charge

  19. Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference

    E-Print Network [OSTI]

    Kandlikar, Satish

    Proceedings of Heat Transfer 2003: ASME Summer Heat Transfer Conference Las Vegas, Nevada, USA July 21-23, 2003 HT2003-47449 HEAT TRANSFER FROM A MOVING AND EVAPORATING MENISCUS ON A HEATED SURFACE meniscus with complete evaporation of water without any meniscus break-up. The experimental heat transfer

  20. Protocols for the Equitable Assessment of Marine Energy Converters

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  1. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  2. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  3. Accelerating the transfer in Technology Transfer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposalsAboutAccelerating the transfer in

  4. MAVIDOS Maternal Vitamin D Osteoporosis Study: study protocol for a randomized controlled trial.

    E-Print Network [OSTI]

    Harvey, Nicholas C.; Javaid, Kassim; Bishop, Nicholas; Kennedy, Stephen; Papageorghiou, Aris T.; Fraser, Robert; Gandhi, Saurabh V.; Schoenmakers, Inez; Prentice, Ann; Cooper, Cyrus

    2012-02-07

    Maternal Vitamin D Osteoporosis Study: study protocol for a randomized controlled trial. The MAVIDOS Study Group Nicholas C Harvey1, Kassim Javaid2, Nicholas Bishop3, Stephen Kennedy4, Aris T Papageorghiou4, Robert Fraser5, Saurabh V Gandhi5, Inez... ]. The effect of maternal 25(OH)- vitamin D status appeared to be partly mediated via concentrations of venous umbilical cord calcium, sug- gesting that placental calcium transfer to the fetus may be a critical step in these associations. Indeed mRNA expression...

  5. Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley

    E-Print Network [OSTI]

    Foley, Simon

    and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

  6. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    E-Print Network [OSTI]

    Jump, David

    2014-01-01

    for Proprietary Software Testing Protocols (vendors value software testing as a means to and requirements for testing software vendor energy

  7. TECHNOLOGY TRANSFER: PROBLEMS AND PROSPECTS

    E-Print Network [OSTI]

    TECHNOLOGY TRANSFER: PROBLEMS AND PROSPECTS Jesse w. Fussell Department of Defense 9800 Savage Road of technology transfer in this technical area in the past, to forecast prospects for technology transfer in the future, and to suggest some ideas for stimulating the process. 2. TECHNOLOGY TRANSFER PROBLEMS Many

  8. Protocol for laboratory research on degradation, interaction, and fate of wastes disposed by deep-well injection: Final report

    SciTech Connect (OSTI)

    Collins, A.G.; Crocker, M.E.

    1987-12-01

    The objective of this research investigation was to develop a laboratory protocol for use in determining degradation, interaction, and fate of organic wastes disposed in deep subsurface reservoirs via disposal wells. Knowledge of the ultimate fate of deep-well disposed wastes is important because provisions of the Resource Conservation and Recovery Act (RCRA) require that by August 1988, the Environmental Protection Agency (EPA) must show that the disposal of specified wastes by deep-well injection is safe to human health and the environment, or the practice must be stopped. The National Institute for Petroleum and Energy Research (NIPER) developed this protocol primarily by transferring some of its expertise and knowledge of laboratory protocol relevant to improved recovery of petroleum. Phenol, because it is injected into deep, subsurface reservoirs for disposal, was selected for study by the EPA. Phenol is one waste product that has been injected into the Frio formation; therefore, a decision was made to use phenol and sedimentary rock from the Frio formation for a series of laboratory experiments to demonstrate the protocol. This study investigates the adsorption properties of a specific reservoir rock which is representative of porous sedimentary geologic formations used as repositories for hazardous organic wastes. The developed protocol can be used to evaluate mobility, adsorption, and degradation of an organic hazardous waste under simulated subsurface reservoir conditions. 22 refs., 13 figs., 16 tabs.

  9. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    Deng, Yuxin

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1 , Stephane Grumbach2 , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  10. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1,2, , Stephane Grumbach3, , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  11. Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko

    E-Print Network [OSTI]

    Goddard, Wayne

    Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet

  12. Concrete Security for Entity Recognition: The Jane Doe Protocol

    E-Print Network [OSTI]

    Zenner, Erik

    Concrete Security for Entity Recognition: The Jane Doe Protocol Stefan Lucks1 , Erik Zenner2 , Andr NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether ­ the "Jane Doe Protocol" ­, and provides a formal proof of its concrete security. The protocol neither

  13. Automated protocol selection for energy efficient WSN applications

    E-Print Network [OSTI]

    Atkinson, Robert C

    Automated protocol selection for energy efficient WSN applications C. Shen, S. Harte, E. Popovici the implementation of different protocols for different topology and appli- cation scenarios to optimise the overall Heterogeneous Automated Wireless Sensor (THAWS), embedding a reactive routing protocol, an energy

  14. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  15. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later algorithm ? cipher spec · encryption algorithm · message digest algorithm ? master secret · 48 byte shared secret ? is resumable flag · can be used to initiate new connections 10© Ravi Sandhu 2001 SSL CONNECTION

  16. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later secret · 48 byte shared secret is resumable flag · can be used to initiate new connections 10© Ravi each keys generated from master secret, client/server random client_write_MAC_secret server_write_MAC_secret

  17. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  18. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  19. Technology transfer issue

    SciTech Connect (OSTI)

    Jacobson, C.

    1982-05-31

    Testimony by Lawrence J. Brady, Commerce Assistant Secretary for Trade Administration, at Congressional hearings on the national security issues of technology transfers to the Soviet Union identified steps the US needs to take to deal effectively with the problem. These steps include an understanding of how the Soviet Union has and will benefit militarily by acquiring Western technology and efforts to work with other countries, counterintelligence agencies, and industries to stem the flow of technological information. Brady outlined changes in technology development that complicate the enforcement of transfer rules, and emphasized the importance of a close relationship between the business community and the Commerce Department. (DCK)

  20. Analysis and behavioral modeling of the Finite State Machines of the Xpress Transfer Protocol

    E-Print Network [OSTI]

    Madduri, Venkateswara Rao

    1994-01-01

    . This research focuses on the analysis and behavioral modeling of the Finite State Machines of the XTP. The simulation language used is the Verilog Hardware Description Language. We have modeled XTP Finite State Machines as a set of communicating, concurrent...

  1. Incorporation of analgesics into rodent embryo transfer protocols: assessing the effects on reproductive outcomes

    E-Print Network [OSTI]

    Burckhardt, Heather Ann

    2009-05-15

    an unforeseen difficulty: the increased burden on facilities due to the number of animals needing to be housed. The answer to this difficulty was cryopreservation. This technique was first performed successfully in 1972 on mouse embryos. Since then... from Harlan and vasectomized Swiss Webster and ICR male mice from Harlan were selected for this project. All animals were housed at Texas A&M University?s Laboratory Animal Resources and Research (LARR) facility, which is accredited...

  2. Three Dimensional Radiative Transfer

    E-Print Network [OSTI]

    Tom Abel

    2000-05-09

    Radiative Transfer (RT) effects play a crucial role in the thermal history of the intergalactic medium. Here I discuss recent advances in the development of numerical methods that introduce RT to cosmological hydrodynamics. These methods can also readily be applied to time dependent problems on interstellar and galactic scales.

  3. Cost Transfer Procedures How And When To Make Cost Transfers

    E-Print Network [OSTI]

    Hammack, Richard

    Cost Transfer Procedures How And When To Make Cost Transfers Effective February 9, 2003, cost elsewhere. Federal regulations require additional documentation to support cost transfers to sponsored program indexes. Costs may not be shifted to other research projects or from one budget period to the next

  4. Faculty Positions Heat Transfer and

    E-Print Network [OSTI]

    Faculty Positions Heat Transfer and Thermal/Energy Sciences Naval Postgraduate School Monterey-track faculty position at the assistant professor level in the areas of Heat Transfer and Thermal/Fluid Sciences

  5. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  6. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  7. Swipe transfer assembly

    DOE Patents [OSTI]

    Christiansen, Robert M. (Blackfoot, ID); Mills, William C. (McKeesport, PA)

    1992-01-01

    The swipe transfer assembly is a mechanical assembly which is used in conjunction with glove boxes and other sealed containments. It is used to pass small samples into or out of glove boxes without an open breach of the containment, and includes a rotational cylinder inside a fixed cylinder, the inside cylinder being rotatable through an arc of approximately 240.degree. relative to the outer cylinder. An offset of 120.degree. from end to end allows only one port to be opened at a time. The assembly is made of stainless steel or aluminum and clear acrylic plastic to enable visual observation. The assembly allows transfer of swipes and smears from radiological and other specially controlled environments.

  8. QER- Comment of Energy Transfer

    Broader source: Energy.gov [DOE]

    From: Lee Hanse Executive Vice President Interstate Energy Transfer Mobile - 210 464 2929 Office - 210 403 6455

  9. HIGEE Mass Transfer

    E-Print Network [OSTI]

    Mohr, R. J.; Fowler, R.

    1986-01-01

    compared with other more conventional mass transfer equipment, will show up to advantage at reasonably large capacity but compare poorly for low capacity duties. (3) Capacity and separation capability (i.e. number of stages) in a HIGEE... are not independent variables, because diameter features in both. If the casing dimensions, OD and axial length, are arbitrarily fixed; then for a duty requiring a large number of stages the packing thickness will be greater and the ID correspondingly smaller...

  10. Plastic container bagless transfer

    DOE Patents [OSTI]

    Tibrea, Steven L.; D'Amelio, Joseph A.; Daugherty, Brent A.

    2003-11-18

    A process and apparatus are provided for transferring material from an isolated environment into a storage carrier through a conduit that can be sealed with a plug. The plug and conduit can then be severed to provide a hermetically sealed storage carrier containing the material which may be transported for storage or disposal and to maintain a seal between the isolated environment and the ambient environment.

  11. Technology Transfer, Entrepreneurship and Innovation

    E-Print Network [OSTI]

    Reed, Nancy E.

    Technology Transfer, Entrepreneurship and Innovation The College of Engineering at UH Manoa has a strong tradition of technology transfer and entrepreneurship that supports the University of Hawai`i's innovation and technology transfer initiative. Principal units are mechanical engineering, electrical

  12. 5. Heat transfer Ron Zevenhoven

    E-Print Network [OSTI]

    Zevenhoven, Ron

    Three heat transfer mechanisms Conduction Convection Radiation 2/120 Pic: B88 bo Akademi University1/120 5. Heat transfer Ron Zevenhoven bo Akademi University Thermal and Flow Engineering / Vrme | Thermal and Flow Engineering | 20500 Turku | Finland #12;3/120 5.1 Conductive heat transfer bo Akademi

  13. Technology Transfer Ombudsman Program | Department of Energy

    Office of Environmental Management (EM)

    Technology Transfer Ombudsman Program Technology Transfer Ombudsman Program The Technology Transfer Commercialization Act of 2000, Public Law 106-404 (PDF) was enacted in November...

  14. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  15. US - Voice Over Internet Protocol Phone Service Providers Market Analysis

    E-Print Network [OSTI]

    Srinivasan, Vijaybabu

    2006-05-19

    .263 Bit stream in the Real-time Transport Protocol Vijaybabu Srinivasan Spring 2006 17 EMGT835 RTCP RTP Control protocol RTP Real-Time Transport H.323 Protocols... Total 100 Reputation/ Image: Evaluation Criteria: Reputation is the current sum total of the specific traits attributed to a company by people. A company?s reputation is produced by the memory impressions of its perceived actions over time. 13...

  16. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    Nevada State Protocol Agreement for Implementing the National Historic Preservation Act Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory...

  17. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

  18. Sandia Energy - Sandia to Discuss Energy-Storage Test Protocols...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communication within the power system. These protocols will provide for evaluation of energy storage interoperability and functionality, providing frequency and voltage stability...

  19. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  20. Chapter 15: Commercial New Construction Protocol. The Uniform...

    Energy Savers [EERE]

    Construction Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  1. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  2. Wireless Power Transfer

    ScienceCinema (OSTI)

    None

    2013-11-19

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  3. Wireless Power Transfer

    SciTech Connect (OSTI)

    2013-07-22

    Wireless Power Transfer is an innovative approach using magnetic resonance coupling of air core transformers designed for today's growing plug-in electric vehicle market. This technology can provide a convenient, safe and flexible means to charge electric vehicles under stationary and dynamic conditions. Plug-in Electric Vehicles (PEV) are burdened by the need for cable and plug charger, galvanic isolation of the on-board electronics, bulk and cost of this charger and the large energy storage system (ESS) packs needed. With a system where you have to physically plug in there are a number of occasions where the owner could very well forget to charge the vehicle. For stationary applications (like charging of a PHEV at home), ORNL's innovative wireless power transfer technology adds a convenience factor compared to actually plugging in which will mean that the vehicle will have a full charge every morning. Electric vehicle charging must be safe, compact and efficient in order to be convenient for customers. By reconfiguring the transformer and altering the resonance frequency, energy is transferred to the battery with lower energy losses and with fewer demands on the primary circuit by the rest of the transformer system. The ORNL discovery shows that sufficient power for the battery can be transferred from the primary to secondary circuits without significant energy losses if the operating frequency is set at 50% to 95% of the resonance frequency of the circuit. The electrical power is then transmitted to the chargeable battery, which is electrically coupled to the secondary circuit through the air core transformer. Some advantages include: Reduced energy losses during transfer of energy to the battery; A charge potential that is relatively unaffected by up to 25% misalignment of vehicle; and Other receiving components draw less power from the primary circuit. These advantages allow wireless power technology applications to expand at the workplace and beyond as the demand for EV rises. For vehicles that operate over a fixed route such as busses and shuttle vehicles, Wireless Power Transfer (WPT) means that a smaller battery pack can be used. In the traditional system, the battery pack is designed to accommodate the needs of the entire route or shift. With WPT the battery can be downsized because it can be charged when the vehicle stops on its route (a rental car shuttle bus, for example, can charge when it waits in the terminal and again when it waits at the rental car place. Thus the battery only needs enough charge to get to the next stop. This decrease in battery size means significant cost savings to electrify the vehicle. This technology enables efficient "opportunity charging stations" for predefined routes and planned stops reducing down time. Charging can occur in minutes. This improvement also eliminates the harmful emissions that occur in garages while buses are at idle during charging. In larger cities, dynamic charging offers an even greater impact utilizing existing infrastructure. As vehicles travel along busy freeways and interstate systems, wireless charging can occur while the vehicle is in motion. With this technology a vehicle essentially has unlimited electric range while using a relatively small battery pack. In-motion charging stations use vehicle sensors to alert the driver. Traveling at normal speeds, sensors establish in-motion charging. WPT transmit pads sequentially energize to the negotiated power level based on vehicle speed and its requested charging energy. Lower power when vehicle speed is slow and much higher power for faster moving vehicles. Vehicle to Infrastructure communications (V2I) coordinates WPT charging level according to on-board battery pack state-of-charge. V2I activates the roadway transmit pads placing them in standby mode and negotiates charging fee based on prevailing grid rate and vehicle energy demand. Dynamic charging would allow electricity to supply a very large fraction of the energy for the transportation sector and reduce greatly petroleum consump

  4. NREL: Technology Transfer - Ombuds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatial ToolkitSMARTS -BeingFuture for SolarTechnology Transfer

  5. A ClassChest for Deriving Transport Protocols W. Timothy Strayer

    E-Print Network [OSTI]

    Strayer, William Timothy

    , California strayer@ca.sandia.gov Abstract Development of new transport protocols or protocol algo rithmsA ClassChest for Deriving Transport Protocols W. Timothy Strayer Sandia National Laboratories to transport protocols, so that the focus is placed on the protocolspecific aspects. The Meta Transport

  6. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Michael Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  7. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  8. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  9. Implementing a Low Power TDMA Protocol Over 802.11

    E-Print Network [OSTI]

    and contrast our protocol to other wireless power- saving mechanisms, then discuss the design, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow

  10. FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and dis- tributed control applications. We present formal for systematic and extensive testing of Modbus devices. Keywords: SCADA Protocol, Modbus, Test-case Generation, Formal Methods 1. Introduction A distributed digital control system--sometimes called a SCADA system

  11. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single

  12. On the Design and Implementation of Secure Network Protocols

    E-Print Network [OSTI]

    Paterson, Kenny

    On the Design and Implementation of Secure Network Protocols Nadhem J. AlFardan Thesis submitted Hart, for providing all what I needed to carry out my laboratory work. Finally, thanks to everyone who kept asking me "are you done yet?". 4 #12;Abstract Network Protocols are critical to the operation

  13. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Verification of Cryptographic Protocols Implemented in Java Card Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  14. Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation

    E-Print Network [OSTI]

    Han, Qi "Chee"

    Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation Alan Marchiori, Lin It is a difficult endeavor to realistically evaluate the perfor- mance of wireless sensor network (WSN) protocols. Generic network simulators are often used, but they tend to rely on synthetic models. Because WSN

  15. Rational Protocol Design: Cryptography Against Incentive-driven Adversaries

    E-Print Network [OSTI]

    Maurer, Ueli

    in part by NSF awards #0830464, #1111599, and #1223623, the Army Research Laboratory under Cooperative Research Projects Agency through the U.S. Office of Naval Research under Contract N00014-Cryptographic Protocols, Game Theory, Se- cure Computation, Composition I. INTRODUCTION Consider a cryptographic protocol

  16. Secure Wireless Payment Protocol School of Computer Science

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Secure Wireless Payment Protocol Hong Wang School of Computer Science Carleton University 1125 Colonel By Drive, Ottawa, Canada Abstract With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols

  17. Design of a PSi header processor for the internet protocol

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01

    bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

  18. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  19. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis semination protocol. Infuse takes two input parameters: (i) the choice

  20. ''GANGS'' MAC Protocol Proposal Saad Biaz Dai Yawen

    E-Print Network [OSTI]

    consumption. This paper presents a MAC layer protocol, named ''GANGS'', as a method of saving energy in sensor is not necessarily engineered or predetermined. Because of this, sensor network protocols and algorithms must be self the most energy, followed by radios. Processor and sensor power consumption are usually less important [8

  1. Bliss: Specifying Declarative Service Protocols Munindar P. Singh

    E-Print Network [OSTI]

    Bliss: Specifying Declarative Service Protocols Munindar P. Singh North Carolina State University Raleigh, NC 27695-8206, USA singh@ncsu.edu Abstract--BSPL, the Blindingly Simple Protocol Language, dispensing with conventional control flow features such as sequencing and choice. Singh [1] previously showed

  2. Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn

    E-Print Network [OSTI]

    Lam, Simon S.

    Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn Dong-Young Lee. For a system under churn, it is impossible to maintain a correct distributed DT continually. We define of protocols maintains high accuracy for systems under churn and each system converges to 100% accuracy after

  3. Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks Masaya Yoshida ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy protocols for power-efficient data collection have been proposed [1][2]. Recently, energy harvesting has

  4. Alternative Experimental Protocol for a PBR-Like Result

    E-Print Network [OSTI]

    D. J. Miller

    2012-02-29

    Pusey, Barrett and Rudolph (PBR) have recently proven an important new theorem in the foundations of quantum mechanics. Here we propose alternative experimental protocols which lead to the PBR result for a special case and a weaker PBR-like result generally. Alternative experimental protocols support the assumption of measurement independence required for the PBR theorem.

  5. Improving the Battery Performance of Ad-Hoc Routing Protocols

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department-- In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism

  6. Transport Protocol Behavior and Energy-Saving Lefteris Mamatas

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    networks [1]. Several attempts have been made to measure the energy efficiency of transport protocols, (eTransport Protocol Behavior and Energy-Saving Potential Lefteris Mamatas Demokritos University of the transport level needs to be associated with some energy potential index which, unlike energy expenditure

  7. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  8. Design and Analysis of Communication Protocols for Quantum Repeater Networks

    E-Print Network [OSTI]

    Cody Jones; Danny Kim; Matthew T. Rakher; Paul G. Kwiat; Thaddeus D. Ladd

    2015-05-06

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

  9. Combinatorial Evolution and Forecasting of Communication Protocol ZigBee

    E-Print Network [OSTI]

    Levin, Mark Sh; Kistler, Rolf; Klapproth, Alexander

    2012-01-01

    The article addresses combinatorial evolution and forecasting of communication protocol for wireless sensor networks (ZigBee). Morphological tree structure (a version of and-or tree) is used as a hierarchical model for the protocol. Three generations of ZigBee protocol are examined. A set of protocol change operations is generated and described. The change operations are used as items for forecasting based on combinatorial problems (e.g., clustering, knapsack problem, multiple choice knapsack problem). Two kinds of preliminary forecasts for the examined communication protocol are considered: (i) direct expert (expert judgment) based forecast, (ii) computation of the forecast(s) (usage of multicriteria decision making and combinatorial optimization problems). Finally, aggregation of the obtained preliminary forecasts is considered (two aggregation strategies are used).

  10. Technology transfer 1995

    SciTech Connect (OSTI)

    Not Available

    1995-01-01

    Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

  11. General Relativistic Radiative Transfer

    E-Print Network [OSTI]

    S. Knop; P. H. Hauschildt; E. Baron

    2006-11-30

    We present a general method to calculate radiative transfer including scattering in the continuum as well as in lines in spherically symmetric systems that are influenced by the effects of general relativity (GR). We utilize a comoving wavelength ansatz that allows to resolve spectral lines throughout the atmosphere. The used numerical solution is an operator splitting (OS) technique that uses a characteristic formal solution. The bending of photon paths and the wavelength shifts due to the effects of GR are fully taken into account, as is the treatment of image generation in a curved spacetime. We describe the algorithm we use and demonstrate the effects of GR on the radiative transport of a two level atom line in a neutron star like atmosphere for various combinations of continuous and line scattering coefficients. In addition, we present grey continuum models and discuss the effects of different scattering albedos on the emergent spectra and the determination of effective temperatures and radii of neutron star atmospheres.

  12. Heat transfer probe

    DOE Patents [OSTI]

    Frank, Jeffrey I.; Rosengart, Axel J.; Kasza, Ken; Yu, Wenhua; Chien, Tai-Hsin; Franklin, Jeff

    2006-10-10

    Apparatuses, systems, methods, and computer code for, among other things, monitoring the health of samples such as the brain while providing local cooling or heating. A representative device is a heat transfer probe, which includes an inner channel, a tip, a concentric outer channel, a first temperature sensor, and a second temperature sensor. The inner channel is configured to transport working fluid from an inner inlet to an inner outlet. The tip is configured to receive at least a portion of the working fluid from the inner outlet. The concentric outer channel is configured to transport the working fluid from the inner outlet to an outer outlet. The first temperature sensor is coupled to the tip, and the second temperature sensor spaced apart from the first temperature sensor.

  13. Fast controlled unitary protocols using group or quasigroup structures

    E-Print Network [OSTI]

    Li Yu

    2013-03-12

    A nonlocal bipartite unitary gate can sometimes be implemented using prior entanglement and only one round of classical communication in which the two parties send messages to each other simultaneously. This cuts the classical communication time by a half compared to the usual protocols, which require back-and-forth classical communication. We introduce such a "fast" protocol that can implement a class of controlled unitaries exactly, where the controlled operators form a subset of a projective representation of a finite group, which may be Abelian or non-Abelian. The entanglement cost is only related to the size of the group and is independent of the dimension of the systems. We also introduce a second fast protocol that can implement any given controlled unitary approximately. This protocol uses the algebraic structure of right quasigroups, which are generalizations of quasigroups, the latter being equivalent to Latin squares. This second protocol could optionally use shared classical randomness as a resource, in addition to using entanglement. When compared with other known fast unitary protocols, the entanglement cost of this second protocol is lower for general controlled unitaries except for some rare cases.

  14. on technology transfer, industry research +

    E-Print Network [OSTI]

    Cafarella, Michael J.

    on technology transfer, industry research + economic development annual report U N I V E R S I T Y and resources available at the University of Michigan as showcased in this year's Annual Report on Technology Transfer, Industry Research, and Economic Development. At the heart of the University's contributions

  15. 4065 (RP-664) Heat Transfer

    E-Print Network [OSTI]

    of roomsurface-to-air heat transmission is dependentonan accurateestimateof the filmcoefficient. Forty- eight4065 (RP-664) Convective Energy and Heat Transfer Thermal Load in Building Calculations Daniel E convection film coefficients significantly underpredict the rate of surface convective heat 'transfer

  16. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

  17. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-08-05

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  18. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  19. Urban Sewage Delivery Heat Transfer System (2): Heat Transfer

    E-Print Network [OSTI]

    Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

    2006-01-01

    analysis of above flow resistance and energy cost, we know that the economy flux ratio of transfer heat-transfer means is between 0.54 and 0.85, namely sewage flux is smaller, and minC Cr min wwCVc?= . It is necessary to point out that though depending... efficiency of contranatant two pass thimble: ()213 1 11 21wwNn wz tt Cr tt 1n? ?? ?==?+ ? (1) Fig.1 Reverse-flow heat efficiency of TDHTS Contranatant single pass heat-transfer efficiency: ( ) ()1 1exp (1 ) 1exp (1)n Cr NTU Cr? = ?? ? ? Put...

  20. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  1. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  2. Delayed response protocols for high-delay wireless networks

    E-Print Network [OSTI]

    Sadry, Nauzad Erach

    2002-01-01

    Wireless networks have become more prevalent over the last few years. These networks introduce different types of errors, which are due to the unpredictable nature of the wireless channel. The congestion control algorithms of existing TCP protocols...

  3. Rapid designs for cache coherence protocol engines in Bluespec

    E-Print Network [OSTI]

    Ng, Man Cheuk, 1980-

    2005-01-01

    In this thesis, we present the framework for Rapid Protocol Engine Development (RaPED). We implemented the framework in Bluespec, which is a high level hardware language based on Term Rewriting Systems (TRSs). The framework ...

  4. A Secure Routing Protocol for Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Klappenecker, Andreas

    't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification Tunneling Two

  5. LDP : location discovery protocol for data center networks

    E-Print Network [OSTI]

    Pamboris, Andreas

    2009-01-01

    3.1 Data center network topology . . . . . . . 3.2 De?ningA Scalable, Commodity Data Center Network Architecture. InDiscovery Protocol for Data Center Networks A thesis

  6. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  7. A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures

    E-Print Network [OSTI]

    Acacio, Manuel

    A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures Ricardo Fern Murcia SPAIN {r.fernandez,jmgarcia,meacacio}@ditec.um.es Jose Duato Dpto. Informatica de Sistemas y

  8. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect (OSTI)

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  9. 2002/11/12 Roberto Innocente 1 Transport protocols

    E-Print Network [OSTI]

    Innocente, Roberto

    that that the receiver is flooded by the sender TCP as many other protocols uses a sliding window mechanism in every congestion control It had an importance similar to that the Watt's Flyball regulator had for the steam

  10. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  11. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  12. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  13. Vrije Universiteit Brussel Technology Transfer Interface

    E-Print Network [OSTI]

    Goelzer, Heiko

    Vrije Universiteit Brussel Technology Transfer Interface -connecting science and society- [for Prof. Hugo Thienpont More Information Technology Transfer Interface (TTI) Vrije Universiteit Brussel.interface@vub.ac.be - www.vubtechtransfer.be Vrije Universiteit Brussel Technology Transfer Interface -connecting science

  14. Mechanical resonators for storage and transfer of electrical and optical quantum states

    E-Print Network [OSTI]

    S. A. McGee; D. Meiser; C. A. Regal; K. W. Lehnert; M. J. Holland

    2013-05-29

    We study an optomechanical system in which a microwave field and an optical field are coupled to a common mechanical resonator. We explore methods that use these mechanical resonators to store quantum mechanical states and to transduce states between the electromagnetic resonators from the perspective of the effect of mechanical decoherence. Besides being of fundamental interest, this coherent quantum state transfer could have important practical implications in the field of quantum information science, as it potentially allows one to overcome intrinsic limitations of both microwave and optical platforms. We discuss several state transfer protocols and study their transfer fidelity using a fully quantum mechanical model that utilizes quantum state-diffusion techniques. This work demonstrates that mechanical decoherence should not be an insurmountable obstacle in realizing high fidelity storage and transduction.

  15. Technology Transfer Overview | Department of Energy

    Office of Environmental Management (EM)

    Technology Transfer Overview Technology Transfer Overview Through strategic investments in science and technology, the U.S. Department of Energy (DOE) helps power and secure...

  16. MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER

    E-Print Network [OSTI]

    Lahey, Richard T.

    MODERN DEVELOPMENTS IN MULTIPHASE FLOW & HEAT TRANSFER "ENGINEERING APPLICATIONS OF FRACTAL and multiphase flow & heat transfer will be stressed. This paper will begin by reviewing some important concepts

  17. Preparing for Transfer Biological Engineering

    E-Print Network [OSTI]

    Walter, M.Todd

    Preparing for Transfer Majors: Biological Engineering Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering Information Science, Systems, & Technology Materials Science & Engineering Mechanical Engineering Operations

  18. Preparing for Transfer Biological Engineering

    E-Print Network [OSTI]

    Walter, M.Todd

    Preparing for Transfer Majors: Biological Engineering Biomedical Engineering* Chemical Engineering Civil Engineering Computer Science Electrical & Computer Engineering Engineering Physics Environmental Engineering Information Science, Systems, & Technology Materials Science & Engineering Mechanical Engineering

  19. Knowledge Capture and Transfer Program

    Broader source: Energy.gov [DOE]

    The Office of Learning and Workforce Development is working with Heads of Departmental Elements, DOE senior leaders and subject-matter-experts to capture and transfer the knowledge and experiences...

  20. Electrohydrodynamically enhanced condensation heat transfer

    E-Print Network [OSTI]

    Wawzyniak, Markus

    1993-01-01

    In a condenser the thickness of the liquid condensate film covering the cooled surface constitutes a resistance to the heat transfer. By establishing a non uniform electric field in the vicinity of the condensation surface the extraction of liquid...

  1. Wireless transfer of electric power

    E-Print Network [OSTI]

    Moffatt, Robert Alexander

    2009-01-01

    In this dissertation, I describe the design and construction of a system which can transfer electric power wirelessly. This is accomplished using inductive, near-field, non-radiative coupling between self-resonant copper ...

  2. O C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol

    E-Print Network [OSTI]

    Segall, Adrian

    , j}.At the end, the east table of node a is {b, c, d, e, j}. a i f ec g h db j 100 200 300 400 500 with updated information. f c g h a b d 100 200 300 400 500 600 100 200 300 400 h? source access target h? h! hO C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol For Wireless Ad Hoc

  3. Automatic computation of transfer functions

    DOE Patents [OSTI]

    Atcitty, Stanley; Watson, Luke Dale

    2015-04-14

    Technologies pertaining to the automatic computation of transfer functions for a physical system are described herein. The physical system is one of an electrical system, a mechanical system, an electromechanical system, an electrochemical system, or an electromagnetic system. A netlist in the form of a matrix comprises data that is indicative of elements in the physical system, values for the elements in the physical system, and structure of the physical system. Transfer functions for the physical system are computed based upon the netlist.

  4. Spring 2014 Heat Transfer -2

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 Heat Transfer - 2 A thin electronic chip is in the shape of a square wafer, b = 1 cm surface of the chip with a heat transfer coefficient of h = 100 W/m2 -K. Assume the chip has a uniform per side with a mass of m = 0.3 grams and specific heat of C = 103 J/kg-K. The chip is mounted

  5. A FAST MENTAL POKER PROTOCOL TZER-JEN WEI AND LIH-CHUNG WANG

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a fast and secure mental poker protocol. It is twice as fast as similar protocols, namely Barnett, 27, 28, 29], see [7] for a survey). Barnett-Smart's protocol is proposed in 2003 ([3]). It canGamal-based version. Castell-Roca's protocol is proposed in 2004 ([7]). It is similar to Barnett-Smart, but faster

  6. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  7. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  8. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  9. Western Blot Protocol-de Lange Lab Western Blot Protocol (updated on 05/20/14)

    E-Print Network [OSTI]

    de Lange, Titia

    :10 with MillliQ water. Adjust pH to 8.3 (should be close) 10x Transfer Buffer Stock (1L) 30.3 g Tris Base 144 g) BioMax XAR Film (KODAK) Laemmli Sample Buffer Cell Extracts Cells can be directly lysed into 2x Laemmli Sample buffer (v.1 or v.2) as follows (not for ubiquitination): 1. Harvest cells by trypsinization

  10. Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0

    SciTech Connect (OSTI)

    Stoller-Navarro Joint Venture

    2004-06-24

    This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

  11. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  12. Nanoscale heat transfer - from computation to experiment

    E-Print Network [OSTI]

    Luo, Tengfei

    2013-04-09

    Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

  13. Protocol: Rat Cardiac CINE with Tagging, Page 1 of 4 Author: rgb 3/16/2012 Protocol: Rat Cardiac CINE with Tagging

    E-Print Network [OSTI]

    California at San Diego, University of

    the heart at isocenter. Water Phantom Place a 15 mL tube containing water and sealed with a screw top.5 mm 5cmx5cm 15 min Protocol Steps 1. Set up the physio equipment. Follow the instructions below. See the "Positioning" section below. 4. Protocol directory. The protocols can be loaded from

  14. New York City Paid Time Off and Sick Leave Protocol The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This

    E-Print Network [OSTI]

    New York City Paid Time Off and Sick Leave Protocol 1. Scope The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This protocol applies only to employees of Carnegie Mellon University who work at least eighty (80) hours per calendar year within the City of New York, NY

  15. CANISTER TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-23

    The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

  16. Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer

    SciTech Connect (OSTI)

    David Hamilton

    2004-12-31

    The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

  17. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  18. A complete Randomized Benchmarking Protocol accounting for Leakage Errors

    E-Print Network [OSTI]

    T. Chasseur; F. K. Wilhelm

    2015-07-09

    Randomized Benchmarking allows to efficiently and scalably characterize the average error of an unitary 2-design such as the Clifford group $\\mathcal{C}$ on a physical candidate for quantum computation, as long as there are no non-computational leakage levels in the system. We investigate the effect of leakage errors on Randomized Benchmarking induced from an additional level per physical qubit and provide a modified protocol that allows to derive reliable estimates for the error per gate in their presence. We assess the variance of the sequence fidelity corresponding to the number of random sequences needed for valid fidelity estimation. Our protocol allows for gate dependent error channels without being restricted to perturbations. We show that our protocol is compatible with Interleaved Randomized Benchmarking and expand to benchmarking of arbitrary gates. This setting is relevant for superconducting transmon qubits, among other systems.

  19. Local quantum protocols for separable measurements with many parties

    E-Print Network [OSTI]

    Scott M. Cohen

    2013-03-20

    In a recent paper \\cite{mySEPvsLOCC}, we showed how to construct a quantum protocol for implementing a bipartite, separable quantum measurement using only local operations on subsystems and classical communication between parties (LOCC) within any fixed number of rounds of communication, whenever such a protocol exists. Here, we generalize that construction to one that applies for any number of parties. One important observation is that the construction automatically determines the ordering of the parties' measurements, overcoming a significant apparent difficulty in designing protocols for more than two parties. We also present various other results about LOCC, including showing that if, in any given measurement operator of the separable measurement under consideration, the local parts for two different parties are rank-1 operators that are not repeated in any other measurement operator of the measurement, then this separable measurement cannot be exactly implemented by LOCC in any finite number of rounds.

  20. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chevassut, Olivier [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-11-12

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  1. Journal of Heat Transfer1999 JHT Heat Transfer Gallery Department of Mechanical 8. Aerospace Engineering

    E-Print Network [OSTI]

    Kihm, IconKenneth David

    Journal of Heat Transfer1999 JHT Heat Transfer Gallery S. M. You Department of Mechanical 8 Transfer Visualization Committee organized two photo gallery sessions in 1998. The International Heat Transfer Photo Gallery was held at the l la' International Heat Transfer Conference (IHTC) in Kyongju

  2. Radiative transfer in decomposed domains

    E-Print Network [OSTI]

    T. Heinemann; W. Dobler; A. Nordlund; A. Brandenburg

    2005-11-09

    An efficient algorithm for calculating radiative transfer on massively parallel computers using domain decomposition is presented. The integral formulation of the transfer equation is used to divide the problem into a local but compute-intensive part for calculating the intensity and optical depth integrals, and a nonlocal part for communicating the intensity between adjacent processors. The waiting time of idle processors during the nonlocal communication part does not have a severe impact on the scaling. The wall clock time thus scales nearly linearly with the inverse number of processors.

  3. Fast protocols for local implementation of bipartite nonlocal unitaries

    E-Print Network [OSTI]

    Li Yu; Robert B. Griffiths; Scott M. Cohen

    2012-01-06

    In certain cases the communication time required to deterministically implement a nonlocal bipartite unitary using prior entanglement and LOCC (local operations and classical communication) can be reduced by a factor of two. We introduce two such "fast" protocols and illustrate them with various examples. For some simple unitaries, the entanglement resource is used quite efficiently. The problem of exactly which unitaries can be implemented by these two protocols remains unsolved, though there is some evidence that the set of implementable unitaries may expand at the cost of using more entanglement.

  4. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  5. Saving Your Data (Data Transfer) Transfer Raw Data to Another Computer

    E-Print Network [OSTI]

    California at San Diego, University of

    Saving Your Data (Data Transfer) Transfer Raw Data to Another Computer 1. Open a terminal 2 the Data Manager window 2. Right click the scan you want to save or the whole study and select "Transfer

  6. Transfer Factors for Contaminant Uptake

    E-Print Network [OSTI]

    of supply, upon written request as follows: Address: U.S. Nuclear Regulatory Commission OfficeTransfer Factors for Contaminant Uptake by Fruit and Nut Trees Office of Nuclear Regulatory; licensee event reports; and Commission papers and their attachments. NRC publications in the NUREG series

  7. Spring 2014 Heat Transfer -1

    E-Print Network [OSTI]

    Virginia Tech

    Spring 2014 1 Heat Transfer - 1 Consider a cylindrical nuclear fuel rod of length L and diameter df and the tube at a rate m , and the outer surface of the tube is well insulated. Heat generation occurs within. The specific heat of water pc , and the thermal conductivity of the fuel rod fk are constants. The system

  8. A critical look at methods for calculating charge transfer couplings fast and accurately

    E-Print Network [OSTI]

    Ramos, Pablo; Pavanello, Michele

    2015-01-01

    We present here a short and subjective review of methods for calculating charge transfer couplings. Although we mostly focus on Density Functional Theory, we discuss a small subset of semiempirical methods as well as the adiabatic-to-diabatic transformation methods typically coupled with wavefunction-based electronic structure calculations. In this work, we will present the reader with a critical assessment of the regimes that can be modeled by the various methods their strengths and weaknesses. In order to give a feeling about the practical aspects of the calculations, we also provide the reader with a practical protocol for running coupling calculations with the recently developed FDE-ET method.

  9. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  10. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  11. Development and Validation of a Simple Protocol To Rapidly

    E-Print Network [OSTI]

    pollutants in waste air biofilters. The protocol involves the determination of two pollutant concentration with low concentrations of pollutants. Biofilters work by passing humidified polluted air through a bed > aromatics > alkanes. An attempt was made to correlate the pollutant elimination with Henry's coefficient

  12. Security Analysis of an Open Car Immobilizer Protocol Stack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    --apply the principle of open evaluation. A recent example is the specification of an open security protocol stack in principle be deployed on any suitable type of transponder chip. In this paper we re-evaluate the security] and the KeeLoq algo- rithm used in remote control systems [8] demonstrate the risks of this security

  13. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  14. Simplified VO M&V Protocol Simplified Voltage Optimization (VO)

    E-Print Network [OSTI]

    modeling is mentioned, it refers to using industry accepted distribution system power flow simulation tools the verification process. Calculations of all system improvements (reduction of line losses and no-load lossesSimplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification

  15. A Practical Hybrid-ARQ Protocol Using Noncoherent Orthogonal Modulation

    E-Print Network [OSTI]

    Valenti, Matthew C.

    requests. The proposed protocol is suitable for IEEE 802.15.4/Zigbee networks using commodity off networks that follow the Bluetooth standard or sensor networks that follow the IEEE 802.15.4/Zigbee. For instance, Bluetooth uses nonorthogonal binary Gaussian fre- quency shift keying (GFSK) while Zigbee uses 16

  16. Automating the Sandia Advanced Interoperability Test Protocols Jay Johnson1

    E-Print Network [OSTI]

    systems) interoperability and electrical behavior functionality as specified by the IEC technical reportAutomating the Sandia Advanced Interoperability Test Protocols Jay Johnson1 and Bob Fox2 1 Sandia -- As the penetration of non-dispatchable renewable energy increases around the world, there is greater need to have

  17. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  18. Fast Automatic Synthesis of Security Protocols Using Backward Search

    E-Print Network [OSTI]

    Foley, Simon

    backward. ---Sir Arthur Conan Doyle (Sherlock Holmes), A Study in Scarlet, 1887. Categories and Subject]: Protocol Verifica­ tion; K.6.5 [Security and Protection]: Authentication; D.2.4 [Software­ veloped such as [5, 10, 9, 19, 17, 22]. However, little work has been carried out on systematic approaches

  19. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    Mitchell, Chris

    ] as the 2nd edition of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks] is different to the Cheng- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  20. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of ISO/IEC 11770-2. In mid 2008, Mathuria and Sriram [19] described new type attacks on both mechanism- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack' refers proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  1. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  2. Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    E-Print Network [OSTI]

    Merro, Massimo

    , temperature); they are used as embedded systems (e.g., biomedical sensor engineering, smart homes) or mobile sensor networks. A simulation theory is developed to compare probabilistic protocols that have similar are usually based on discrete-event simulators (e.g., ns-2, Opnet and Glomosim). However, different simulators

  3. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  4. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  5. Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement Organization and oversee the field testing of the draft Regional Supplement. Field testing will be done in cooperation, the District coordinator will provide team members with an introduction to the Regional Supplement

  6. Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement Organization of field the field testing of the draft Regional Supplement. Field testing will be done in cooperation with regional, the District coordinator will provide team members with an introduction to the Regional Supplement

  7. Combining algorithms for deciding knowledge in security protocols #

    E-Print Network [OSTI]

    Doyen, Laurent

    protocols requires a precise un­ derstanding of the attacker knowledge. Two standard notions are usu­ ally ?? E and the ACI Jeunes Chercheurs JC9005. #12; completely unrealistic to require that the Boolean true and some standard bisimulation conditions. Both of these relations rel

  8. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABANorder cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  9. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  10. Communication-Efficient Private Protocols for Longest Common Subsequence

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark, gondree, mohassel}@cs.ucdavis.edu Abstract. We design communication efficient two-party and multi Russians" algorithmic de- sign. This result is the first improvement to the communication complex- ity

  11. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    E-Print Network [OSTI]

    Barrash, Warren

    An interactive Bayesian geostatistical inverse protocol for hydraulic tomography Michael N. Fienen April 2008; published 25 July 2008. [1] Hydraulic tomography is a powerful technique for characterizing, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose

  12. Completely positive classical structures and sequentializable quantum protocols

    E-Print Network [OSTI]

    Chris Heunen; Sergio Boixo

    2012-10-02

    We study classical structures in various categories of completely positive morphisms: on sets and relations, on cobordisms, on a free dagger compact category, and on Hilbert spaces. As an application, we prove that quantum maps with commuting Kraus operators can be sequentialized. Hence such protocols are precisely as robust under general dephasing noise when entangled as when sequential.

  13. Parallel and Concurrent Security of the HB and HB + Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ## Abstract Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB + protocol is proven secure against active computationallyintensive to be utilized. With this motivation in mind, Juels and Weis [20] --- building upon work

  14. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  15. Publickey cryptography and password protocols Shai Halevi \\Lambda

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this scenario, and show that the security of these protocols can be formally proven based on standard in situations where the client's machine does not have the means to validate the server's public key. Public devices. \\Lambda IBM T.J.Watson Research Center, PO Box 704, Yorktown Heights, New York 10598, USA Email

  16. The Accelerated Ring Protocol: Ordered Multicast for Modern Data Centers

    E-Print Network [OSTI]

    Amir, Yair

    performance in 1- Gig and 10-Gig networks. We also implemented the full protocol in the open-source Spread Toolkit and evaluated its performance relative to the previous version of the toolkit in a 1-Gig local area network, virtualized 1-Gig local area settings, and a 10-Gig local area network. The results

  17. Analysing the PGM Protocol with UPPAAL Batrice Brard Patricia Bouyer

    E-Print Network [OSTI]

    Doyen, Laurent

    the probability of negative acknowledgements (NAK) implosion and the load of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference, which turns out not to be always verified but to depend on the values of several parameters that we

  18. Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk1 , Stephan, or reuse of any copyrighted component of this work in other works. Abstract. Efficiency is the bottleneck adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting

  19. Abstraction and Implementation of a Lightweight Distributed Termination Protocol

    E-Print Network [OSTI]

    Dobson, Simon

    Abstraction and Implementation of a Lightweight Distributed Termination Protocol D.M. Goodeve , C, University of Leeds, UK Department of Computer Science, Trinity College Dublin, Eire Abstract Termination synchronisation on this state costly. Many parallel applica- tions are structured such that termination occurs

  20. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Design an anycast WSN for a wind turbine SHM application that is very energy efficient. meets reliability for turbine structural health monitoring Are composed of sensor nodes Are very resource constrained

  1. Scaling security in pairing-based protocols Michael Scott

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scaling security in pairing-based protocols Michael Scott School of Computing Dublin City potential advantage in smart-card and embedded applications security can be scaled up while continuing been addressed by Koblitz and Menezes [18] and Granger, Page and Smart [15]. As will be seen our

  2. EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Durresi, Arjan

    EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks Sasanka Madiraju Cariappa in an intelligent manner. We study the concept of energy fairness in routing in Sensor Networks so as to increase to route data based on the residual energy of the nodes. This algorithm divides the network into different

  3. An Energy-Aware Simulation Model and Transaction Protocol

    E-Print Network [OSTI]

    Pedram, Massoud

    functioning in a real world environment ! We study the effects of redistributing energy on the two network ! Communication energy: power consumption for SR transmission and reception ! Data transmission energy1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution

  4. TCP over Wireless Multi-hop Protocols: Simulation and Experiments

    E-Print Network [OSTI]

    Wang, Lan

    TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive http://www.cs.ucla.edu/NRL/wireless Abstract In this study we investigate the interaction between TCP

  5. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  6. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  7. Packet Drop Avoidance for High-speed network transmission protocol

    SciTech Connect (OSTI)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  8. BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects

    E-Print Network [OSTI]

    BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects Title: Principal) Study subjects: A total of _____ subjects were enrolled since the last report to the IRB. Since initial study approval on _____________ a total of _____ subjects have been enrolled in this study and ____ have

  9. ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ungerer, Theo

    of California, Irvine, USA, Phone: (949) 824-8720, email: nader@uci.edu mode. The energy cost rises enormouslyESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer and Nader Bagherzadeh Abstract--Most wireless sensor networks rely on battery energy. In applications

  10. Interactions Among Ionospheric Propagation, HF Modems, and Data Protocols

    E-Print Network [OSTI]

    Johnson, Eric E.

    Mexico State University Abstract The well-known challenges in using the ionospheric skywave channel to Internet-style network- and ap- plication-layer protocols, which have been designed with reliable, high that will form the basis of reliable Internet operation via next-generation HF radio networks. Introduction

  11. ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson

    E-Print Network [OSTI]

    Johnson, Eric E.

    ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson New Mexico State University ABSTRACT The explosion of interest in using Internet-style applica- tions over wireless links prompts investigation links with Internet-style workloads. The investigation is focused on high-frequency radio links

  12. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    A Review of Embedded Automotive Protocols Nicolas Navet 1 , Franoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  15. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  16. ASSEMBLY TRANSFER SYSTEM DESCRIPTION DOCUMENT

    SciTech Connect (OSTI)

    B. Gorpani

    2000-06-26

    The Assembly Transfer System (ATS) receives, cools, and opens rail and truck transportation casks from the Carrier/Cask Handling System (CCHS). The system unloads transportation casks consisting of bare Spent Nuclear Fuel (SNF) assemblies, single element canisters, and Dual Purpose Canisters (DPCs). For casks containing DPCs, the system opens the DPCs and unloads the SNF. The system stages the assemblies, transfer assemblies to and from fuel-blending inventory pools, loads them into Disposal Containers (DCs), temporarily seals and inerts the DC, decontaminates the DC and transfers it to the Disposal Container Handling System. The system also prepares empty casks and DPCs for off-site shipment. Two identical Assembly Transfer System lines are provided in the Waste Handling Building (WHB). Each line operates independently to handle the waste transfer throughput and to support maintenance operations. Each system line primarily consists of wet and dry handling areas. The wet handling area includes a cask transport system, cask and DPC preparation system, and a wet assembly handling system. The basket transport system forms the transition between the wet and dry handling areas. The dry handling area includes the dry assembly handling system, assembly drying system, DC preparation system, and DC transport system. Both the wet and dry handling areas are controlled by the control and tracking system. The system operating sequence begins with moving transportation casks to the cask preparation area. The cask preparation operations consist of cask cavity gas sampling, cask venting, cask cool-down, outer lid removal, and inner shield plug lifting fixture attachment. Casks containing bare SNF (no DPC) are filled with water and placed in the cask unloading pool. The inner shield plugs are removed underwater. For casks containing a DPC, the cask lid(s) is removed, and the DPC is penetrated, sampled, vented, and cooled. A DPC lifting fixture is attached and the cask is placed into the cask unloading pool. In the cask unloading pool the DPC is removed from the cask and placed in an overpack and the DPC lid is severed and removed. Assemblies are removed from either an open cask or DPC and loaded into assembly baskets positioned in the basket staging rack in the assembly unloading pool. A method called ''blending'' is utilized to load DCs with a heat output of less than 11.8 kW. This involves combining hotter and cooler assemblies from different baskets. Blending requires storing some of the hotter fuel assemblies in fuel-blending inventory pools until cooler assemblies are available. The assembly baskets are then transferred from the basket staging rack to the assembly handling cell and loaded into the assembly drying vessels. After drying, the assemblies are removed from the assembly drying vessels and loaded into a DC positioned below the DC load port. After installation of a DC inner lid and temporary sealing device, the DC is transferred to the DC decontamination cell where the top area of the DC, the DC lifting collar, and the DC inner lid and temporary sealing device are decontaminated, and the DC is evacuated and backfilled with inert gas to prevent prolonged clad exposure to air. The DC is then transferred to the Disposal Container Handling System for lid welding. In another cask preparation and decontamination area, lids are replaced on the empty transportation casks and DPC overpacks, the casks and DPC overpacks are decontaminated, inspected, and transferred to the Carrier/Cask Handling System for shipment off-site. All system equipment is designed to facilitate manual or remote operation, decontamination, and maintenance. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks and DPCs. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal WHB support systems.

  17. Hypertext as a debugging tool for knowledge-based systems

    E-Print Network [OSTI]

    Schuette, John Frederick

    1990-01-01

    . An AIN 14. An example ALN. 38 39 15. Agenda and rule interconnections. 16. Fact and rule interconnections. . . 41 42 17. Outline of network generation. . 18. Graph of mean task completion times. 19. Graph of mean idle times. 20. Ratio of mental...'s processing, or consultation, is called the recognize-act cycle. For each cycle, it builds an agenda of eligible rule instances that could fire in the current cycle. The agenda is called the conflict set in some systems. The pseudocode for a general...

  18. Authoring on Demand: Natural Language Generation in Hypertext Documents

    E-Print Network [OSTI]

    Dale, Robert

    Trusted Virtual Containers on Demand Katelin A. Bailey University of Washington kabailey on demand, and uses DTrace and other tools to extend attestation to more nuanced runtime properties. We. Flexibility. On demand from remote clients, our ker- nel creates containers according to a suite of trust at

  19. Authoring Large and Complex Hypertext with Reusable Components

    E-Print Network [OSTI]

    Park, Yung Ah

    2011-10-21

    from Petri net theory to select, categorize, and modify existing net fragments as building blocks for composing larger networks. Authors may switch modes between visual and textual authoring at will, thus combining the strengths of expressing large nets...

  20. A Probabilistic Relevance Propagation Model for Hypertext Retrieval

    E-Print Network [OSTI]

    Zhai, ChengXiang

    of Computer Science University of Illinois at Urbana-Champaign Illinois 61801 shakery@uiuc.edu ChengXiang Zhai Department of Computer Science University of Illinois at Urbana-Champaign Illinois 61801 czhai, effective and robust way of exploiting link in- formation. Our experiments also show that using multiple

  1. Distributed Hypertext Resource Discovery Through Examples Soumen Chakrabarti1

    E-Print Network [OSTI]

    California at Berkeley, University of

    to a page about oil and natural gas over the last year." A key problem in populating the database a page about environmental protection to a page related to oil and natural gas over the last year

  2. Chemistry Transfer Evaluations Before requesting a transfer evaluation, please look up your courses on the UO Transfer Credit

    E-Print Network [OSTI]

    Cina, Jeff

    Chemistry Transfer Evaluations Before requesting a transfer evaluation, please look up your courses://registrar.uoregon.edu/current_students/transfer-articulation If your Chemistry courses have not been evaluated, or if you feel the evaluation is not correct, then fill out this form and bring it and the associated documents to a Chemistry advisor. Name

  3. Dynamic collision reduction protocol for ultra-wide bandwidth multiple access networks

    E-Print Network [OSTI]

    Tomezak, Gregory John, 1980-

    2004-01-01

    In this thesis, we provide a cross-layer analysis of the throughput of the dynamic collision reduction (DCR) protocol, a multiple access protocol that requires frame synchronization. At the physical-layer, we develop the ...

  4. On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

  5. Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair NXP Semiconductors, Leuven, Belgium, ventzislav.nikov@nxp.com, marc.vauclair@nxp.com Abstract. Distance-bounding protocols

  6. A Backup Route Aware Routing Protocol Fast Recovery from Transient Routing Failures

    E-Print Network [OSTI]

    Gao, Lixin

    in experimental studies [14], [15]. Border Gateway Protocol (BGP), a path vector protocol for interdomain routing al [4] propose a solution using pre-established protection tunnels to reroute traffic during failures

  7. Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D

    2003-01-01

    Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc

  8. Benthic Community Assessment Rapid Bioassessment Protocol: Benthic Macroinvertebrates (EPA 1989, 1999) .........................665

    E-Print Network [OSTI]

    Pitt, Robert E.

    Macroinvertebrates (EPA 1989, 1999) .........................665 Sample Collection ......................................................................................................................................690 RAPID BIOASSESSMENT PROTOCOL: BENTHIC MACROINVERTEBRATES (EPA 1989, 1999) As with the habitat is presented below. However, the Rapid Bioassessment Protocols (RBP) outlined by the U.S. EPA (EPA 1989, 1999

  9. The influence of purification protocol and pH on tomato spotted wilt virions

    E-Print Network [OSTI]

    Shimek, Christina Marie

    1993-01-01

    particles within the final pellet, an immunosorbent electron microscopy (ISEM) assay was performed on the purified virons obtained from each of the protocols. When the pH level was varied using protocol B, the purified virions were observed without...

  10. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...

  11. Direct transfer of graphene onto flexible substrates

    E-Print Network [OSTI]

    Araujo, Paulo Antonio Trinidade

    In this paper we explore the direct transfer via lamination of chemical vapor deposition graphene onto different flexible substrates. The transfer method investigated here is fast, simple, and does not require an intermediate ...

  12. NERSC HPSS Bandwidth and Transfer Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Aggregate Transfer Bandwidth This graph shows the aggregate transfer rate to the storage systems as a function of time of day. The red line is the peak bandwidth observed within...

  13. Engineering nanocarbon interfaces for electron transfer

    E-Print Network [OSTI]

    Hilmer, Andrew J. (Andrew Joseph)

    2013-01-01

    Electron-transfer reactions at nanometer-scale interfaces, such as those presented by single-walled carbon nanotubes (SWCNTs), are important for emerging optoelectronic and photovoltaic technologies. Electron transfer also ...

  14. Power transfer through strongly coupled resonances

    E-Print Network [OSTI]

    Kurs, Andr

    2007-01-01

    Using self-resonant coils in a strongly coupled regime, we experimentally demonstrate efficient non-radiative power transfer over distances of up to eight times the radius of the coils. We use this system to transfer 60W ...

  15. Robust state transfer with high fidelity in spin-1/2 chains by Lyapunov control

    E-Print Network [OSTI]

    Z. C. Shi; X. L. Zhao; X. X. Yi

    2015-05-19

    Based on the Lyapunov control, we present a scheme to realize state transfer with high fidelity by only modulating the boundary spins in a quantum spin-1/2 chain. Recall that the conventional transmission protocols aim at nonstationary state (or information) transfer from the first spin to the end spin at a fixed time. The present scheme possesses the following advantages. First, the scheme does not require precise manipulations of the control time. Second, it is robust against uncertainties in the initial states and fluctuations in the control fields. Third, the controls are exerted only on the boundary sites of the chain. It works for variable spin-1/2 chains with different periodic structures and has good scalability. The feasibility to replace the control fields by square pules is explored, which simplifies the realization in experiments.

  16. Academic Knowledge Transfer in Social Networks

    E-Print Network [OSTI]

    Slater, Mark David

    2013-01-01

    4.3 Digital Library Requirements . . . . . . . . . . . 4.43.1.1 Digital Libraries . . . . . . . . . . . .A Prototype Personal Digital Library Knowledge Transfer

  17. Waste Feed Delivery Transfer System Analysis

    SciTech Connect (OSTI)

    JULYK, L.J.

    2000-05-05

    This document provides a documented basis for the required design pressure rating and pump pressure capacity of the Hanford Site waste-transfer system in support of the waste feed delivery to the privatization contractor for vitrification. The scope of the analysis includes the 200 East Area double-shell tank waste transfer pipeline system and the associated transfer system pumps for a11 Phase 1B and Phase 2 waste transfers from AN, AP, AW, AY, and A2 Tank Farms.

  18. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  19. A three-pass establishment protocol for real-time multiparty communication

    E-Print Network [OSTI]

    Yoon, Jaehee

    1996-01-01

    with a suite of simulation experiments which Compares the performance of our approach with that of other exisiting protocols....

  20. Submersible canned motor transfer pump

    DOE Patents [OSTI]

    Guardiani, R.F.; Pollick, R.D.; Nyilas, C.P.; Denmeade, T.J.

    1997-08-19

    A transfer pump is described which is used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass there through, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank. 17 figs.

  1. Enhanced heat transfer using nanofluids

    DOE Patents [OSTI]

    Choi, Stephen U. S. (Lisle, IL); Eastman, Jeffrey A. (Naperville, IL)

    2001-01-01

    This invention is directed to a method of and apparatus for enhancing heat transfer in fluids such as deionized water. ethylene glycol, or oil by dispersing nanocrystalline particles of substances such as copper, copper oxide, aluminum oxide, or the like in the fluids. Nanocrystalline particles are produced and dispersed in the fluid by heating the substance to be dispersed in a vacuum while passing a thin film of the fluid near the heated substance. The fluid is cooled to control its vapor pressure.

  2. Transferring to The University of New Mexico

    E-Print Network [OSTI]

    New Mexico, University of

    Transferring to The University of New Mexico From Central New Mexico College A Transfer Articulation Guide based on Central New Mexico Community College Catalog Year 2009 2011 Apply to UNM on-line at www.unm.edu #12;Transferring to The University of New Mexico from Central New Mexico Community College

  3. Transferring to The University of New Mexico

    E-Print Network [OSTI]

    New Mexico, University of

    Transferring to The University of New Mexico From Central New Mexico College A Transfer Articulation Guide based on Central New Mexico Community College Catalog Year 2007 2009 Apply to UNM on-line at www.unm.edu #12;Transferring to The University of New Mexico from Central New Mexico Community College

  4. Transferable Utility Planning Games Ronen I. Brafman

    E-Print Network [OSTI]

    Engel, Yagil

    Transferable Utility Planning Games Ronen I. Brafman Computer Science Dept. Ben-Gurion Univ between standard AI planning constructs and a clas- sical cooperative model of transferable-utility coalition games, we introduce the notion of transferable-utility (TU) planning games. The key

  5. Technology Transfer at Penn State University

    E-Print Network [OSTI]

    Lee, Dongwon

    Technology Transfer at Penn State University An Inventor's Guide to #12;Our mission is to protect on the University of Michigan's "Inventor's Guide to Technology Transfer," with adaptation for Penn State, and the staff of the UM Office of Technology Transfer for their kind permission to use their excellent material

  6. Page 1 of 2 Technology Transfer &

    E-Print Network [OSTI]

    Chapman, Michael S.

    Page 1 of 2 Technology Transfer & Business Development Incoming Material Transfer Request Form & Academic Collaborations Team (iACT) Technology Transfer & Business Development MTA@ohsu.edu (503) 494 the provider? No Yes If yes, please attach a copy to your MTA submission email. #12;Page 2 of 2 Technology

  7. Requirements Engineering Technology Transfer: An Experience Report

    E-Print Network [OSTI]

    Leite, Julio Cesar Sampaio do Prado

    Requirements Engineering Technology Transfer: An Experience Report Francisco A. C. Pinheiro1 Julio of software engineering technology transfer was identified by Pfleeger (1999). She came to the con- clusion Journal of Technology Transfer, 28, 159165, 2003 2003 Kluwer Academic Publishers. Manufactured

  8. Data Transfer Policy Version 1.1

    E-Print Network [OSTI]

    Aickelin, Uwe

    Data Transfer Policy Version 1.1 Last amended: 18 September 2014 Policy Owner: Governance Team The University of Nottingham ("the University") Tri-Campus Data Transfer Policy Background and Statement of Intention The University is required at times to transfer personal data between its campuses in Nottingham

  9. Code Number :.............. HEAT TRANSFER QUALIFYING EXAM

    E-Print Network [OSTI]

    Feeny, Brian

    is at 40 C, estimate the heat transfer per unit length by radiation and convection between the twoCode Number :.............. HEAT TRANSFER QUALIFYING EXAM January 2010 OPEN BOOK (only one book) The heat transfer coefficient c) The length of pipe needed for a 35 C increase in mean temperature d

  10. Alterna(ve Roadmap For Transfer Students

    E-Print Network [OSTI]

    Ravikumar, B.

    Alterna(ve Roadmap For Transfer Students 8/11/14 EE Program #12;Transfer with the roadmap NEXT STEP: Share this with all other transfer students and make 1 (LACKING ES220) SEE THE ROADMAP: h`p://www.sonoma.edu/engineering/bsee/bsee_roadmap

  11. ME 519: THEORY OF HEAT TRANSFER Instructor

    E-Print Network [OSTI]

    Lin, Xi

    ME 519: THEORY OF HEAT TRANSFER Fall 2014 Instructor: Class time: Classroom: Office Hours: Prof Tuesday 45pm or by appointment Class description This course will cover the fundamentals of heat transfer. An introductory course in heat transfer (ME 419 or equivalent) is pre-requisite. Grading 20% Homework 25% Exam 1

  12. Intellectual Property Protection and Technology Transfer: Evidence From US Multinationals

    E-Print Network [OSTI]

    Kanwar, Sunil

    2007-01-01

    International Technology Transfer? Empirical Evidence FromEffects on Investment, Technology Transfer, and Innovationr&d as a mode of technology transfer The median levels of

  13. Radiative Heat Transfer in Enhanced Hydrogen Outgassing of Glass

    E-Print Network [OSTI]

    Kitamura, Rei; Pilon, Laurent

    2009-01-01

    and J.R. Howell, Thermal radiation heat transfer, Hemispheremade: 1. The heat, mass, and radiation transfer are treatedOne- dimensional heat, mass, and radiation transfers were

  14. Radiative Heat Transfer in Enhanced Hydrogen Outgassing of Glass

    E-Print Network [OSTI]

    Kitamura, Rei; Pilon, Laurent

    2009-01-01

    Kaviany and B.P. Singh, Radiative heat transfer in porousmedia, Advances in Heat Transfer, vol. 23, no. 23, pp. 133Thermal radiation heat transfer, Hemisphere Publishing Co. ,

  15. Heat transfer via dropwise condensation on hydrophobic microstructured surfaces

    E-Print Network [OSTI]

    Ruleman, Karlen E. (Karlen Elizabeth)

    2009-01-01

    Dropwise condensation has the potential to greatly increase heat transfer rates. Heat transfer coefficients by dropwise condensation and film condensation on microstructured silicon chips were compared. Heat transfer ...

  16. Emulating quantum state transfer through a spin-1 chain on a 1D lattice of superconducting qutrits

    E-Print Network [OSTI]

    Joydip Ghosh

    2014-11-26

    Spin-1 systems, in comparison to spin-1/2 systems, offer a better security for encoding and transfer of quantum information, primarily due to their larger Hilbert spaces. Superconducting artificial atoms possess multiple energy-levels, thereby capable of emulating higher-spin systems. Here we consider a 1D lattice of nearest-neighbor-coupled superconducting transmon systems, and devise a scheme to transfer an arbitrary qutrit-state (a state encoded in a three-level quantum system) across the chain. We assume adjustable couplings between adjacent transmons, derive an analytic constraint for the control-pulse, and show how to satisfy the constraint to achieve a high-fidelity state-transfer under current experimental conditions. Our protocol thus enables enhanced quantum communication and information processing with promising superconducting qutrits.

  17. An Energy-conscious Transport Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    An Energy-conscious Transport Protocol for Multi-hop Wireless Networks Technical Report BUCS-2007 delivery requirements of applications. To meet its goal of energy efficiency, our transport protocol (1 We present a transport protocol whose goal is to reduce power consumption without compromising

  18. Implementation and evaluation of a 2 Channel MAC protocol to improve fairness in multihop networks

    E-Print Network [OSTI]

    Shankara, Smitha

    2001-01-01

    The standard 802.11 MAC protocol, for wireless networks, is a single channel implementation. In multihop wireless networks, scenarios can arise where a single channel MAC protocol may not perform as fairly as a 2-Channel MAC protocol. By having 2...

  19. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  20. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  1. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols (Full Version) Jos present a comprehensive spec- ification language and a certifying compiler for ZK-PoK protocols based on -protocols and composition techniques known in literature. The compiler allows the fully automatic

  2. Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks1 , Erik://weimerskirch.org/ 4 NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether presented at SAC 2003, the current paper proposes a new protocol the "Jane Doe Protocol" , and provides

  3. Hybrid Protocol For Password-based Key Exchange in Three-party Setting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou in modern cryptology. The critical of this approach is that designing a secure hybrid protocol and design a hybrid protocol that UC-securely realizes such task. That is, we firstly define an appropriate

  4. Cryptographic Protocol Analysis on Real C Code Jean Goubault-Larrecq

    E-Print Network [OSTI]

    Doyen, Laurent

    protocol the public-key Needham-Schroeder protocol in standard notation (right). The goal is not diverted, this should reach , who will decrypt this using his P Partially supported by the ACI jeunes chercheurs "Sécurité informatique, protocoles cryp- tographiques et détection d'intrusions" and the ACI

  5. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyn

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  6. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  7. KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE

    E-Print Network [OSTI]

    Laughlin, Robert B.

    KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE UNITED NATIONS 1998 #12;KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE The Parties to this Protocol, Being Parties to the United Nations Framework Convention on Climate Change, hereinafter referred

  8. Detection of Design Flaws in the Android Permission Protocol through Bounded

    E-Print Network [OSTI]

    Jackson, Daniel

    Detection of Design Flaws in the Android Permission Protocol through Bounded Verification Hamid of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential

  9. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  10. Comparison of two wireless ad hoc routing protocols on a hardware test-bed

    E-Print Network [OSTI]

    Brown, Timothy X.

    Comparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare of the rout- ing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through

  11. Performance of Routing Protocols in HF Wireless Networks Eric E. Johnson*

    E-Print Network [OSTI]

    Johnson, Eric E.

    Balakrishnan* , and Zibin Tang* Klipsch School of Electrical and Computer Engineering New Mexico State and Routing Protocol (WARRP) and the Internet standard Optimized Link State Routing (OLSR) protocol (RFC-3626 in the Internet. The Optimized Link State Routing (OLSR) protocol (RFC-3626) [1] is an optimization

  12. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: TESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as TESLA [1], LiSP [2

  13. ACM SIGCOMM -1-Computer Communication Review The Design Philosophy of the DARPA Internet Protocols

    E-Print Network [OSTI]

    Ratnasamy, Sylvia

    of ISO protocols has also been colored by the history of the Internet suite, so an understandingACM SIGCOMM -1- Computer Communication Review The Design Philosophy of the DARPA Internet Protocols (DARPA) under Contract No. N00014-83-K-0125 Abstract The Internet protocol suite, TCP/IP, was first

  14. Heat Transfer Research, 2010, Vol. 41, No. 6 Turbine Aero-Heat Transfer Studies

    E-Print Network [OSTI]

    Camci, Cengiz

    AU TH O R PR O O F Heat Transfer Research, 2010, Vol. 41, No. 6 Turbine Aero-Heat Transfer Studies in Rotating Research Facilities CENGIZ CAMCI Turbomachinery Aero-Heat Transfer Laboratory, Department The present paper deals with the experimental aero-heat transfer studies performed in rotating turbine

  15. Guidance for Preparing Annual Agency Technology Transfer Reports Under the Technology Transfer Commercialization Act

    E-Print Network [OSTI]

    Guidance for Preparing Annual Agency Technology Transfer Reports Under the Technology Transfer U.S. Department of Commerce in conjunction with The Interagency Working Group on Technology Transfer May 2013 #12;2 Introduction Under the Technology Transfer Commercialization Act of 2000 (P.L. 106

  16. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acn; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  17. Optimal continuous variable quantum teleportation protocol for realistic settings

    E-Print Network [OSTI]

    F. S. Luiz; Gustavo Rigolin

    2015-02-04

    We show the optimal setup that allows Alice to teleport coherent states to Bob giving the greatest fidelity (efficiency) when one takes into account two realistic assumptions. The first one says that in any actual implementation of the continuous variable teleportation protocol (CVTP) Alice and Bob necessarily share non-maximally entangled states (two-mode finitely squeezed states). The second one assumes that Alice's pool of possible coherent states to be teleported to Bob does not cover the whole complex plane. The optimal strategy is achieved by tuning three parameters in the original CVTP, namely, the beam splitter transmittance and the displacements in position and momentum implemented on the teleported state. These slight changes in the protocol are currently easy to be implemented and, as we show, give considerable gain in perfomance for a variety of possible pool of input states with Alice.

  18. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rod; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  19. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Mart Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  20. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  1. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  2. Dry Transfer Systems for Used Nuclear Fuel

    SciTech Connect (OSTI)

    Brett W. Carlsen; Michaele BradyRaap

    2012-05-01

    The potential need for a dry transfer system (DTS) to enable retrieval of used nuclear fuel (UNF) for inspection or repackaging will increase as the duration and quantity of fuel in dry storage increases. This report explores the uses for a DTS, identifies associated general functional requirements, and reviews existing and proposed systems that currently perform dry fuel transfers. The focus of this paper is on the need for a DTS to enable transfer of bare fuel assemblies. Dry transfer systems for UNF canisters are currently available and in use for transferring loaded canisters between the drying station and storage and transportation casks.

  3. A design protocol for tailoring ice-templated scaffold structure

    E-Print Network [OSTI]

    Pawelec, K. A.; Husmann, A.; Best, Serena Michelle; Cameron, Ruth Elizabeth

    2014-03-06

    engineering scaffolds are isotropic [2, 15]. As re- generative medicine begins to make strides, tissue engineering scaffolds are needed which are large enough to span critical sized defects, often larger than 10 mm in every direction. Thus, literature focusing... with isotropic scaffolds larger than 10 mm in all directions, regardless of the processing: set freezing protocol, slurry composition, filling height, or mold design. A universal link should prove a powerful tool to predict scaffold structure from the freezing...

  4. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Develops Student-StakeholdersProtocol for Addressing Induced Seismicity

  5. Superior Energy Performance Certification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department of EnergySummary:Performance Certification Protocol

  6. Protocol, Appraisal Process Guide - April 2008 | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department of EnergyNo.Implementation ofProtocol,

  7. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  8. Aggregate Transfers Historical Yearly Peak

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional KnowledgeAgenda Agenda NERSC User GroupTransfers Historical

  9. Aggregate Transfers Last 8 Days

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional KnowledgeAgenda Agenda NERSC User GroupTransfers

  10. Concurrent Transfers Last 8 Days

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsCluster Compatibilitydefault ChangesORNL's Jaguar beingConcreteTransfers

  11. Transfer Service (contracts/rd)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S.Week DayDr.Theories81TowardsTrackingCarbon2 - Summer2Transfer

  12. NREL: Technology Transfer Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12WorkingSolarTechnologies AvailableTransfer Photo

  13. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  14. INTRODUCTION TO THE TECHNOLOGY TRANSFER OFFICE The Technology Transfer Office directly contributes to the three-pronged mission of Dartmouth

    E-Print Network [OSTI]

    INTRODUCTION TO THE TECHNOLOGY TRANSFER OFFICE 1. Mission The Technology Transfer Office directly. The Technology Transfer Office contributes to the research mission of the College by commercializing inventions sources, and ensuring compliance with Government technology transfer regulations. The teaching mission

  15. COST TRANSFER REQUEST FORM This form is required for final approval of any expense transfer (ET) or labor distribution

    E-Print Network [OSTI]

    Capogna, Luca

    COST TRANSFER REQUEST FORM This form is required for final approval of any expense transfer (ET) or labor distribution (LD) transfers to sponsored program and required cost share cost centers: ____________________ Department: ________________ Phone: _______ Cost Transfer Document Number to be Approved

  16. Air Leakage and Air Transfer Between Garage and Living Space

    SciTech Connect (OSTI)

    Rudd, A.

    2014-09-01

    This research project focused on evaluation of air transfer between the garage and living space in a single-family detached home constructed by a production homebuilder in compliance with the 2009 International Residential Code and the 2009 International Energy Conservation Code. The project gathered important information about the performance of whole-building ventilation systems and garage ventilation systems as they relate to minimizing flow of contaminated air from garage to living space. A series of 25 multi-point fan pressurization tests and additional zone pressure diagnostic testing characterized the garage and house air leakage, the garage-to-house air leakage, and garage and house pressure relationships to each other and to outdoors using automated fan pressurization and pressure monitoring techniques. While the relative characteristics of this house may not represent the entire population of new construction configurations and air tightness levels (house and garage) throughout the country, the technical approach was conservative and should reasonably extend the usefulness of the results to a large spectrum of house configurations from this set of parametric tests in this one house. Based on the results of this testing, the two-step garage-to-house air leakage test protocol described above is recommended where whole-house exhaust ventilation is employed. For houses employing whole-house supply ventilation (positive pressure) or balanced ventilation (same pressure effect as the Baseline condition), adherence to the EPA Indoor airPLUS house-to-garage air sealing requirements should be sufficient to expect little to no garage-to-house air transfer.

  17. Cost Transfer Review Criteria Revised: 01/28/2011

    E-Print Network [OSTI]

    Oviedo, Nstor J.

    Cost Transfer Review Criteria Revised: 01/28/2011 Cost transfers should contain sufficient. The cost transfer narrative should include enough detail to determine who or what the cost transfer relates to, the type of cost transferred, where the cost is transferred from and to, when the cost

  18. Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place on stable surface. 2. Remove plants/ structure. Let debris settle out of water for a few minutes. 3. Count

  19. Air Leakage and Air Transfer Between Garage and Living Space

    SciTech Connect (OSTI)

    Rudd, Armin

    2014-09-01

    This research project focused on evaluation of air transfer between the garage and living space in a single-family detached home constructed by a production homebuilder in compliance with the 2009 International Residential Code and the 2009 International Energy Conservation Code. The project gathered important information about the performance of whole-building ventilation systems and garage ventilation systems as they relate to minimizing flow of contaminated air from garage to living space. A series of 25 multi-point fan pressurization tests and additional zone pressure diagnostic testing characterized the garage and house air leakage, the garage-to-house air leakage, and garage and house pressure relationships to each other and to outdoors using automated fan pressurization and pressure monitoring techniques. While the relative characteristics of this house may not represent the entire population of new construction configurations and air tightness levels (house and garage) throughout the country, the technical approach was conservative and should reasonably extend the usefulness of the results to a large spectrum of house configurations from this set of parametric tests in this one house. Based on the results of this testing, the two-step garage-to-house air leakage test protocol described above is recommended where whole-house exhaust ventilation is employed.

  20. Check Heat Transfer Services; Industrial Technologies Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the result of: * Low air:fuel ratios * Improper fuel preparation * Malfunctioning burners * Oxidation of heat transfer surfaces in high temperature applications * Corrosive...

  1. Heat transfer and heat exchangers reference handbook

    SciTech Connect (OSTI)

    Not Available

    1991-01-15

    The purpose of this handbook is to provide Rocky Flats personnel with an understanding of the basic concepts of heat transfer and the operation of heat exchangers.

  2. Transferring Data from Batch Jobs at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from Batch Jobs Transferring Data from Batch Jobs Examples Once you are set up for automatic authentication (see HPSS Passwords) you can access HPSS within batch scripts. You...

  3. NATIONAL ENERGY TECHNOLOGY LABORATORY Technology Transfer Basic...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in Technology Transfer" award from the Federal Laboratory Consortium. Application of this technology reduces the costs and energy associated with more conventional scrubbing...

  4. NREL: Awards and Honors - Technology Transfer Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Howard Branz and Team 2010 Excellence in Technology Transfer Award - Flexible Thin-Film Crystalline-Silicon Photovoltaics on RABiTS -NREL's National Center for Photovoltaics...

  5. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht, C. Metzger; Wilson, E.; Horowitz, S.

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the programs goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  6. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  7. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  8. Verifying a Simplified Fuel Oil Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, Hugh; Dentz, Jordan; Doty, Chris

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  9. BLM - State Protocol Agreement with Nevada | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNState Protocol Agreement

  10. Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View New PagesInformation Regional Inventory Protocol (GRIP) Website

  11. ESPC ENABLE Measurement and Verification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based|DepartmentStatementofApril 25, 2014 ERI-2142.17-1401/AprilDraftProtocol

  12. Supplement No. 2 to the FUSRAP Summary Protocol - Verification and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority forPerk |DepartmentProtocol | Department

  13. Miniature mechanical transfer optical coupler

    DOE Patents [OSTI]

    Abel, Philip (Overland Park, KS); Watterson, Carl (Kansas City, MO)

    2011-02-15

    A miniature mechanical transfer (MT) optical coupler ("MMTOC") for optically connecting a first plurality of optical fibers with at least one other plurality of optical fibers. The MMTOC may comprise a beam splitting element, a plurality of collimating lenses, and a plurality of alignment elements. The MMTOC may optically couple a first plurality of fibers disposed in a plurality of ferrules of a first MT connector with a second plurality of fibers disposed in a plurality of ferrules of a second MT connector and a third plurality of fibers disposed in a plurality of ferrules of a third MT connector. The beam splitting element may allow a portion of each beam of light from the first plurality of fibers to pass through to the second plurality of fibers and simultaneously reflect another portion of each beam of light from the first plurality of fibers to the third plurality of fibers.

  14. Acoustically Enhanced Boiling Heat Transfer

    E-Print Network [OSTI]

    Z. W. Douglas; M. K. Smith; A. Glezer

    2008-01-07

    An acoustic field is used to increase the critical heat flux (CHF) of a flat-boiling-heat-transfer surface. The increase is a result of the acoustic effects on the vapor bubbles. Experiments are performed to explore the effects of an acoustic field on vapor bubbles in the vicinity of a rigid-heated wall. Work includes the construction of a novel heater used to produce a single vapor bubble of a prescribed size and at a prescribed location on a flatboiling surface for better study of an individual vapor bubble's reaction to the acoustic field. Work also includes application of the results from the single-bubble heater to a calibrated-copper heater used for quantifying the improvements in CHF.

  15. Northern Blots (based on protocol from Mitch Smith Lab)

    E-Print Network [OSTI]

    Auble, David

    for RNA. Wipe apparatus with "RNase Away". 1% Agarose gel (100ml) 73 ml sterile water 1 g agarose Boil Blue 6 l (10%) Ethidium Bromide 25 l 4mg/ml Sterile water 75 l Transfer Rinse gel twice for 15 min each in sterile water. Cut nitrocellulose (Schleicher & Schuell Protran BA85, #10402580) to size of gel

  16. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  17. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  18. The Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Metzger, C.; Norton, Paul

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every four years, the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the "average occupant" in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  19. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A countrys adherence to the International Atomic Energy Agencys (IAEA) Additional Protocol is an important statement to the world of that countrys commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEAs regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  20. Technology Transfer award funding data* Figure 1. Current Technology Transfer awards

    E-Print Network [OSTI]

    Rambaut, Andrew

    6 1 4 3 48 23 30 10 Technology Transfer award funding data* Figure 1. Current Technology Transfer awards Numbers represent active grants as at 1 October 2013 Figure 2. Technology Transfer award expenditure 2012/13 by value On 1 October 2013 we were funding 125 active awards through our Technology

  1. Summary Weusedthreemethodstomeasureboundarylayer conductance to heat transfer (gbH) and water vapor transfer

    E-Print Network [OSTI]

    Martin, Timothy

    Summary Weusedthreemethodstomeasureboundarylayer conductance to heat transfer (gbH) and water vapor of transpiration). The boundary layer conductance to heat transfer is small enough that leaf temperature can become diffusion, the boundary layer around a leaf also provides resistance to the transfer of heat between a leaf

  2. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  3. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Supersedes DOE O 142.2. Admin Chg 1, dated 6-27-13, Supersedes DOE O 142.1A. Certified 12-3-14.

  4. TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer

    E-Print Network [OSTI]

    Page 1 TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer UT-Battelle, LLC (UT. One of the functions of UT-BATTELLE's Office of Technology Transfer is to negotiate license agreements for such intellectual property with companies for commercial applications of ORNL-developed technologies. Such licenses

  5. HEAT TRANSFER ANALYSIS OF A PULSE DETONATION

    E-Print Network [OSTI]

    Texas at Arlington, University of

    HEAT TRANSFER ANALYSIS OF A PULSE DETONATION ENGINE by NEELIMA KALIDINDI Presented to the Faculty support. November 23, 2009 #12;iv ABSTRACT HEAT TRANSFER ANALYSIS OF A PULSE DETONATION ENGINE NEELIMA thermal conductivity. The study showed a slow temperature rise along the walls of the combustion chamber

  6. WHICH MODEL OF TECHNOLOGY TRANSFER FOR NANOTECHNOLOGY?

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    1 WHICH MODEL OF TECHNOLOGY TRANSFER FOR NANOTECHNOLOGY? A Comparison with Biotech.genet@grenoble-em.com Website: www.nanoeconomics.eu Abstract. Nanotechnologies are often presented as breakthrough innovations. This article investigates the model of knowledge transfer in the nanotechnologies in depth, by comparing

  7. Transfer Matrix for Partially Quenched QCD

    E-Print Network [OSTI]

    Claude Bernard; Maarten Golterman

    2010-10-31

    We construct the transfer matrix for the ghost sector of partially quenched QCD. This transfer matrix is not hermitian, but we show that it is still bounded. We thus expect that all euclidean correlation functions will decay exponentially with distance (up to possible powers), and demonstrate that this is indeed the case for free ghost quarks.

  8. Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics

    E-Print Network [OSTI]

    Stewart, Frank J.

    Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

  9. A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes

    Broader source: Energy.gov [DOE]

    Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

  10. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  11. Reply to "Comment on 'Quantum search protocol for an atomic array' "

    E-Print Network [OSTI]

    Scully, Marlan O.; Zubairy, M. Suhail.

    2002-01-01

    Our quantum search protocol indicates that entanglement is not required for rootN speedup. We also reemphasize the quantum error correction mechanism in our scheme....

  12. Development of fan diagnostics methods and protocols for short term monitoring

    E-Print Network [OSTI]

    Webster, T; Barth, A

    2003-01-01

    Nexant California Energy Commission Total Site Energy & Costenergy and cost savings derived from the application of these protocols to the California

  13. 4. The Bounded Re-transmission Protocol Jean-Raymond Abrial

    E-Print Network [OSTI]

    Southampton, University of

    on the Receiver's site. FUN 8 #12;Pseudo-code for the Protocol 11 Acknowledgment Channel RCV_rcv RCV_snd Data

  14. Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  15. Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  16. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6...

    Broader source: Energy.gov (indexed) [DOE]

    H-35 DOE-H- Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information Technology (July 2011) Prescription: Use as appropriate. Consider using in solicitations...

  17. An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha

  18. Direct memory access transfer completion notification

    SciTech Connect (OSTI)

    Archer, Charles J. , Blocksome; Michael A. , Parker; Jeffrey J.

    2011-02-15

    Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.

  19. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  20. Technology Transfer at VTIP VTIP in 20 Minutes

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Technology Transfer at VTIP VTIP in 20 Minutes What You Need to Know Virginia Tech Intellectual Properties, Inc. #12;Technology Transfer at VTIP VTIP Overview Virginia Tech Intellectual Properties, Inc;Technology Transfer at VTIP Tech Transfer The tech transfer process typically includes: Identifying new

  1. Micro/Nanoscale Heat Transfer: Interfacial Effects Dominate the

    E-Print Network [OSTI]

    Kostic, Milivoje M.

    conduction 2. Convective heat transfer 3. Thermal radiation 4. Conclusions 1.1 Thermal conductivity3/15/2012 1 Micro/Nanoscale Heat Transfer: Interfacial Effects Dominate the Heat Transfer 1 Xing/nanoscale heat transfer becomes critical. What is the dominant factor in micro/nanosclae heat transfer

  2. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

  3. Excitation energy transfer in the photosystem I

    SciTech Connect (OSTI)

    Webber, Andrew N

    2012-09-25

    Photosystem I is a multimeric pigment protein complex in plants, green alage and cyanobacteria that functions in series with Photosystem II to use light energy to oxidize water and reduce carbon dioxide. The Photosystem I core complex contains 96 chlorophyll a molecules and 22 carotenoids that are involved in light harvesting and electron transfer. In eucaryotes, PSI also has a peripheral light harvesting complex I (LHCI). The role of specific chlorophylls in excitation and electron transfer are still unresolved. In particular, the role of so-called bridging chlorophylls, located between the bulk antenna and the core electron transfer chain, in the transfer of excitation energy to the reaction center are unknown. During the past funding period, site directed mutagenesis has been used to create mutants that effect the physical properties of these key chlorophylls, and to explore how this alters the function of the photosystem. Studying these mutants using ultrafast absorption spectroscopy has led to a better understanding of the process by which excitation energy is transferred from the antenna chlorophylls to the electron transfer chain chlorophylls, and what the role of connecting chlorophylls and A_0 chlorophylls is in this process. We have also used these mutants to investigate whch of the central group of six chlorophylls are involved in the primary steps of charge separation and electron transfer.

  4. Gas mass transfer for stratified flows

    SciTech Connect (OSTI)

    Duffey, R.B.; Hughes, E.D.

    1995-06-01

    We analyzed gas absorption and release in water bodies using existing surface renewal theory. We show a new relation between turbulent momentum and mass transfer from gas to water, including the effects of waves and wave roughness, by evaluating the equilibrium integral turbulent dissipation due to energy transfer to the water from the wind. Using Kolmogoroff turbulence arguments the gas transfer velocity, or mass transfer coefficient, is then naturally and straightforwardly obtained as a non-linear function of the wind speed drag coefficient and the square root of the molecular diffusion coefficient. In dimensionless form, the theory predicts the turbulent Sherwood number to be Sh{sub t} = (2/{radical}{pi})Sc{sup 1/2}, where Sh{sub t} is based on an integral dissipation length scale in the air. The theory confirms the observed nonlinear variation of the mass transfer coefficient as a function of the wind speed; gives the correct transition with turbulence-centered models for smooth surfaces at low speeds; and predicts experimental data from both laboratory and environmental measurements within the data scatter. The differences between the available laboratory and field data measurements are due to the large differences in the drag coefficient between wind tunnels and oceans. The results also imply that the effect of direct aeration due to bubble entrainment at wave breaking is no more than a 20% increase in the mass transfer for the highest speeds. The theory has importance to mass transfer in both the geo-physical and chemical engineering literature.

  5. Gas mass transfer for stratified flows

    SciTech Connect (OSTI)

    Duffey, R.B.; Hughes, E.D.

    1995-07-01

    We analyzed gas absorption and release in water bodies using existing surface renewal theory. We show a new relation between turbulent momentum and mass transfer from gas to water, including the effects of waves and wave roughness, by evaluating the equilibrum integral turbulent dissipation due to energy transfer to the water from the wind. Using Kolmogoroff turbulence arguments the gas transfer velocity, or mass transfer coefficient, is then naturally and straightforwardly obtained as a non-linear function of the wind speed drag coefficient and the square root of the molecular diffusion coefficient. In dimensionless form, the theory predicts the turbulent Sherwood number to be Sh{sub t} = (2/{radical}{pi}) Sc{sup 1/2}, where Sh{sub t} is based on an integral dissipation length scale in the air. The theory confirms the observed nonlinear variation of the mass transfer coefficient as a function of the wind speed; gives the correct transition with turbulence-centered models for smooth surfaces at low speeds; and predicts experimental data from both laboratory and environmental measurements within the data scatter. The differences between the available laboratory and field data measurements are due to the large differences in the drag coefficient between wind tunnels and oceans. The results also imply that the effect of direct aeration due to bubble entrainment at wave breaking is no more than a 20% increase in the mass transfer for the highest speeds. The theory has importance to mass transfer in both the geophysical and chemical engineering literature.

  6. Wireless Transfer of Electricity in Outer Space

    E-Print Network [OSTI]

    Bolonkin, A

    2007-01-01

    Author offers conclusions from his research of a revolutionary new idea - transferring electric energy in the hard vacuum of outer space wirelessly, using a plasma power cord as an electric cable (wire). He shows that a certain minimal electric currency creates a compressed force that supports the plasma cable in the compacted form. A large energy can be transferred hundreds of millions of kilometers by this method. The required mass of the plasma cable is only hundreds of grams. He computed the macroprojects: transference of hundreds kilowatts of energy to Earth's Space Station, transferring energy to the Moon or back, transferring energy to a spaceship at distance 100 million of kilometers, the transfer energy to Mars when one is located at opposed side of the distant Sun, transfer colossal energy from one of Earth's continents to another continent (for example, between Europe-USA) wirelessly-using Earth's ionosphere as cable, using Earth as gigantic storage of electric energy, using the plasma ring as huge...

  7. Wireless Transfer of Electricity in Outer Space

    E-Print Network [OSTI]

    Alexander Bolonkin

    2008-05-07

    Author offers conclusions from his research of a revolutionary new idea - transferring electric energy in the hard vacuum of outer space wirelessly, using a plasma power cord as an electric cable (wire). He shows that a certain minimal electric currency creates a compressed force that supports the plasma cable in the compacted form. A large energy can be transferred hundreds of millions of kilometers by this method. The required mass of the plasma cable is only hundreds of grams. He computed the macroprojects: transference of hundreds kilowatts of energy to Earth Space Station, transferring energy to the Moon or back, transferring energy to a spaceship at distance 100 million of kilometers, the transfer energy to Mars when one is located at opposed side of the distant Sun, transfer colossal energy from one of Earth's continents to another continent (for example, between Europe-USA) wirelessly-using Earth ionosphere as cable, using Earth as gigantic storage of electric energy, using the plasma ring as huge MagSail for moving of spaceships. He also demonstrates that electric currency in a plasma cord can accelerate or brake spacecraft and space apparatus.

  8. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  9. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rod

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  10. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  11. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  12. Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR

    SciTech Connect (OSTI)

    Bernal, SM

    2004-10-11

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated Luminescence Dosimetry'') for this research, ORNL's Standards-Based Management System or any other official guidelines.

  13. Hanford Waste Transfer Planning and Control - 13465

    SciTech Connect (OSTI)

    Kirch, N.W.; Uytioco, E.M.; Jo, J. [Washington River Protection Solutions, LLC, Richland, Washington (United States)] [Washington River Protection Solutions, LLC, Richland, Washington (United States)

    2013-07-01

    Hanford tank waste cleanup requires efficient use of double-shell tank space to support single-shell tank retrievals and future waste feed delivery to the Waste Treatment and Immobilization Plant (WTP). Every waste transfer, including single-shell tank retrievals and evaporator campaign, is evaluated via the Waste Transfer Compatibility Program for compliance with safety basis, environmental compliance, operational limits and controls to enhance future waste treatment. Mixed radioactive and hazardous wastes are stored at the Hanford Site on an interim basis until they can be treated, as necessary, for final disposal. Implementation of the Tank Farms Waste Transfer Compatibility Program helps to ensure continued safe and prudent storage and handling of these wastes within the Tank Farms Facility. The Tank Farms Waste Transfer Compatibility Program is a Safety Management Program that is a formal process for evaluating waste transfers and chemical additions through the preparation of documented Waste Compatibility Assessments (WCA). The primary purpose of the program is to ensure that sufficient controls are in place to prevent the formation of incompatible mixtures as the result of waste transfer operations. The program defines a consistent means of evaluating compliance with certain administrative controls, safety, operational, regulatory, and programmatic criteria and specifies considerations necessary to assess waste transfers and chemical additions. Current operations are most limited by staying within compliance with the safety basis controls to prevent flammable gas build up in the tank headspace. The depth of solids, the depth of supernatant, the total waste depth and the waste temperature are monitored and controlled to stay within the Compatibility Program rules. Also, transfer planning includes a preliminary evaluation against the Compatibility Program to assure that operating plans will comply with the Waste Transfer Compatibility Program. (authors)

  14. SWAMI II technology transfer plan

    SciTech Connect (OSTI)

    Ward, C.R.; Peterson, K.D.; Harpring, L.J.; Immel, D.M.; Jones, J.D.; Mallet, W.R.

    1995-12-31

    Thousands of drums of radioactive/hazardous/mixed waste are currently stored at DOE sites throughout US; they are stored in warehouse facilities on an interim basis, pending final disposition. Recent emphasis on anticipated decommissioning of facilities indicates that many more drums of waste will be generated, requiring additional storage. Federal and state regulations dictate that hazardous waste covered by RCRA be inspected periodically for container degradation and to verify inventories. All known DOE waste storage facilities are currently inspected manually. A system to perform robotic inspection of waste drums is under development by the SRTC Robotics Group of WSRC; it is called the Stored Waste Autonomous Mobile Inspector (SWAMI). The first version, SWAMI I, was developed by the Savannah River Technology Center (SRTC) as a proof of principle system for autonomous inspection of drums in a warehouse. SWAMI I was based on the Transitions Research Corporation (TRC) HelpMate mobile robot. TRC modified the Helpmate to navigate in aisles of drums. SRTC added subsystems to SWAMI I to determine its position in open areas, read bar code labels on the drums up to three levels high, capture images of the drums and perform a radiation survey of the floor in the aisles. The radiation survey was based on SRTC patented technology first implemented on the Semi-Intelligent Mobile Observing Navigator (SIMON). The radiation survey is not essential for the inspection of drums, but is an option that can increase the utility and effectiveness of SWAMI in warehouses with radioactive and/or mixed waste. All the sensors on SWAMI I were fixed on the vehicle. From the success of SWAMI I, a second version, SWAMI II, was developed; it will be evaluated at Fernald and tested with two other mobile robots. Intent is to transfer the technology developed for SWAMI I and II to industry so that it can supply additional units for purchase for drum inspection.

  15. Technology transfer at Lawrence Berkeley Laboratory

    SciTech Connect (OSTI)

    Johnson, D. (ed.)

    1992-09-01

    Lawrence Berkeley Laboratory (LBL) is dedicated to commercializing new technology in such fields as advanced materials, biotechnology, and electronics. Technology transfer between national laboratories and the industrial community is important in maintaining America's competitive edge. This document examines opportunities to establish working relationships with LBL. Streamlined methods for technology transfer are available with the aid of the Technology Transfer Department and the Patent Department at LBL. Research activities at LBL are concentrated in three major program areas: Energy Sciences, General Sciences, and Biosciences. Each program area consists of three research divisions. LBL welcomes both requests for information and proposals to conduct research.

  16. Technology transfer at Lawrence Berkeley Laboratory

    SciTech Connect (OSTI)

    Johnson, D. [ed.

    1992-09-01

    Lawrence Berkeley Laboratory (LBL) is dedicated to commercializing new technology in such fields as advanced materials, biotechnology, and electronics. Technology transfer between national laboratories and the industrial community is important in maintaining America`s competitive edge. This document examines opportunities to establish working relationships with LBL. Streamlined methods for technology transfer are available with the aid of the Technology Transfer Department and the Patent Department at LBL. Research activities at LBL are concentrated in three major program areas: Energy Sciences, General Sciences, and Biosciences. Each program area consists of three research divisions. LBL welcomes both requests for information and proposals to conduct research.

  17. Radiative heat transfer between dielectric bodies

    E-Print Network [OSTI]

    Svend-Age Biehs

    2011-03-16

    The recent development of a scanning thermal microscope (SThM) has led to measurements of radiative heat transfer between a heated sensor and a cooled sample down to the nanometer range. This allows for comparision of the known theoretical description of radiative heat transfer, which is based on fluctuating electrodynamics, with experiment. The theory itself is a macroscopic theory, which can be expected to break down at distances much smaller than 10-8m. Against this background it seems to be reasonable to revisit the known macroscopic theory of fluctuating electrodynamics and of radiative heat transfer.

  18. Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda

    E-Print Network [OSTI]

    Leite, Julio Cesar Sampaio do Prado

    Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda technology transfer. In addition, major incentives for using RE methods are discussed, along with ideas engineering; Technology transfer 1. Introduction In a 1993 evaluation of requirements engineering (RE

  19. Light Transfer Simulation Tools in Photobiological Fuel Production

    E-Print Network [OSTI]

    Lee, Euntaek

    2013-01-01

    and M. P. Meng uc, Radiation heat transfer in combustionand radiation in the Atlas plume, Journal of Thermophysics and Heat Transfer,Thermal radiation is a dominant mode of heat transfer in

  20. Modified Method of Characteristics for Transient Radiative Transfer

    E-Print Network [OSTI]

    Katika, Kamal M.; Pilon, Laurent

    2006-01-01

    dimensional transient radiation heat transfer modeling usingradiation transport and laser applications, Advances in Heat Transfer,Radiation element method for transient hyperbolic radiative transfer in plane parallel inhomogenous media, Numerical Heat

  1. Heat transfer pathways in underfloor air distribution (UFAD) systems

    E-Print Network [OSTI]

    Bauman, F.; Jin, H.; Webster, T.

    2006-01-01

    is little radiative heat transfer and little impact on thereturn air extrac- tion and heat transfer to the plenum. ItUFAD is often used and heat transfer out of the room through

  2. IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

    E-Print Network [OSTI]

    Miles, Will

    IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks Hala El on wireless networks is calling for the development of a protocol that is both TCP-friendly and capable of conforming to the constraints of wireless networks. This paper presents IFTP-W, an end-to-end congestion

  3. A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Sahoo, Anirudha

    A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks Sandip Dalvi in WSN such as battery power and memory. In this paper, we propose a transport protocol which provides based on their residual energies and average MAC layer data rate. The event rate distribution happens

  4. JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks (Technical Report BUCS the energy gains of JTP over one-size-fits-all transport protocols. I. INTRODUCTION Motivation and Scope physical to transport [8], [9]. JAVeLEN's design ensures that energy gains obtained in one layer would

  5. Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor within a virtual grid. The proposed approach, termed location-aided flooding (LAF), achieves energy--Communication protocol, location, energy management, information dissemination, flooding. 1 INTRODUCTION ADVANCES

  6. CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ravindran, Binoy

    CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks Bo networks. We present a constrained flooding protocol, called CFlood that enhances the deadline satisfaction-time perfor- mance by flooding, but effectively constrains energy consumption by controlling the scale

  7. A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards March 12, 2012 Helger Lipmaa Institute of Computer Science, University of Tartu, Estonia Abstract. We propose a simple cast, is significantly more secure (in the sense of "cast-as-intended") and convenient to use than the e-voting protocol

  8. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Naim Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  9. Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development

    E-Print Network [OSTI]

    Borissova, Daniela

    3 0 Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development Rumiana). The next items present a general description and application of the newest wireless protocols ZigBee PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 55 . 2005 . Sofia #12;3 1 ZigBee 802.15.4; Ultra Wide

  10. Declarative Transport No more transport protocols to design, only policies to specify #

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify # Karim ABSTRACT Transport protocols are an integral part of the interprocess communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  11. Declarative Transport No more transport protocols to design, only policies to specify

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify Karim Mattar Transport protocols are an integral part of the inter-process communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  12. Mobile Agent Based Advanced Service Architecture for H.323 Internet Protocol

    E-Print Network [OSTI]

    architecture addresses the full management life-cycle of advanced services, from open third party creationMobile Agent Based Advanced Service Architecture for H.323 Internet Protocol Telephony by Jingrong Advanced Service Architecture for H.323 Internet Protocol Telephony" submitted by Jingrong Tang, B

  13. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    ?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

  14. T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells

    E-Print Network [OSTI]

    Lamond, Angus I.

    T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells This protocol uses centrifugal the centrifuge at 1000 rpm to remove bubbles trapped in the elutriation chamber. Stop centrifuge and flow rate centrifuge at 1800 rpm. 6. Set FS to 102. 7. If the back pressure increases above 5 psi, stop centrifuge

  15. Next Generation BotNet Protocol Analysis Felix S. Leder and Peter Martini

    E-Print Network [OSTI]

    Clausen, Michael

    The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards. For commonly used protocols like IRC and HTTP, there is a wide range of automated analysis and monitoring tools botnets are sticking to traditional IRC communication [22] but more and more botnets are moving towards

  16. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  17. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  18. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  19. Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp in EAXprime [5], an AE block cipher mode derived from EAX [8], standardized as ANSI C12.22-2008 for Smart Grid scheme, which is deployed in the Open Smart Grid Protocol (OSGP) [15]. The latter is an application layer

  20. ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor

    E-Print Network [OSTI]

    New South Wales, University of

    ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor and Engineering The University of New South Wales Sydney 2052, Australia #12;Abstract Emerging data streaming applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18