National Library of Energy BETA

Sample records for ieo2006 kyoto protocol

  1. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  2. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  3. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  4. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  5. KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE

    E-Print Network [OSTI]

    Laughlin, Robert B.

    KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE UNITED NATIONS 1998 #12;KYOTO PROTOCOL TO THE UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE The Parties to this Protocol, Being Parties to the United Nations Framework Convention on Climate Change, hereinafter referred

  6. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  7. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry S.

    A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight Larry Karp University of California, Berkeley Jinhua Zhao Iowa Sate University February 23, 2007 Abstract A reform be designed. We propose a reform to the Kyoto Proto- col that allows signatories to avoid achieving the target

  8. The effects on developing countries of the Kyoto Protocol and CO? emissions trading

    E-Print Network [OSTI]

    Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelčne.

    This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

  9. A Proposal for the Design of the Successor to the Kyoto Protocol

    E-Print Network [OSTI]

    Karp, Larry S.

    of carbon leakage. Keywords: Kyoto protocol, escape clause, emissions trade, clean development mechanism JEL option is similar to the often-discussed "safety valve", in that it puts a ceiling on actual abatement. Within developed countries, potential "carbon leakage" is either perceived as a problem or is used

  10. A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?

    E-Print Network [OSTI]

    Bugnion, Véronique.; Reiner, David M.

    EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

  11. Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol

    E-Print Network [OSTI]

    conversion to wood chips Due to funds from the emissions reduction units sell, under the Kyoto ProtocolPresentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol Andrey

  12. The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny Ellerman, Henry D. Jacoby and Annelne Decaux*

    E-Print Network [OSTI]

    The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny by the scope of CO2 emissions trading, by various limitations that Annex I countries might place on emissions.1 Trade in Goods with No Emissions Trading

  13. Japanese nuclear power and the Kyoto agreement

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

    We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

  14. Kyoto Protocol | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville, Pennsylvania: Energy Resources Jump to:Kyle, Texas:

  15. The evolution of a climate regime: Kyoto to Marrakech

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

    At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

  16. fter 8 days of fractious negotiating, delegates at the 1997 climate conference in Kyoto, Japan, were running out of

    E-Print Network [OSTI]

    Toohey, Darin W.

    Global emissions: 22.7billion tonnes of CO2 1997Global emissions: 24.4billion tonnes of CO2 2011Global emissions: 33.9billion tonnes of CO2 Kyoto Protocol agreed Commitments made under the Kyoto climate treaty their emissions, something that they had objected to doing before the developed world acted. By the time the Kyoto

  17. Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman and Annelne Decaux

    E-Print Network [OSTI]

    Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman the advantages of emissions trading. In this paper, the authors derive MACs from EPPA, the MIT Joint Program the benefits of emissions trading in achieving the emission reduction targets implied by the Kyoto Protocol

  18. Correction to NF 3 , the greenhouse gas missing from Kyoto

    E-Print Network [OSTI]

    Prather, Michael J; Hsu, Juno

    2010-01-01

    J. Hsu (2008), NF 3 , the greenhouse gas missing from Kyoto,Correction to “NF 3 , the greenhouse gas missing from Kyoto”2010), Correction to “NF 3 , the greenhouse gas missing from

  19. Responsible Academic Research Kyoto University Research Integrity Committee

    E-Print Network [OSTI]

    Takada, Shoji

    Responsible Academic Research March 2015 Kyoto University Research Integrity Committee Code Integrity Research Integrity Hotlines Proper Use of Research Grants For all involved in research at Kyoto. Education is the transmission of learning and culture, and develops students' abilities and personalities

  20. Carbon emissions and the Kyoto commitment in the European Union

    E-Print Network [OSTI]

    Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

    We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

  1. http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html

    E-Print Network [OSTI]

    2011 P6 http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html web #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html () ( #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html X MeV X Astro-H 2013 TeV10m) #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html 2010 ASTRO-H CCD X (2) () (2) (2

  2. Erratum: NF3, the greenhouse gas missing from Kyoto (Geophysical Research Letters (2010) 37 (L11807))

    E-Print Network [OSTI]

    Prather, MJ; Hsu, J

    2010-01-01

    J. Hsu (2008), NF 3 , the greenhouse gas missing from Kyoto,Correction to “NF 3 , the greenhouse gas missing from Kyoto”2010), Correction to “NF 3 , the greenhouse gas missing from

  3. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    ............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

  4. Greetings from Kyoto-U SPRING 2007 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    Exchange Seminar House Essay Thakur S. Powdyel, Director, Centre for Educational Research & Development-President of Kyoto Universsity Forefronts of Research at Kyoto University Tetsuro Matsuzawa, Professor, Primate Research Institute Masami Kobayashi, Professor, Graduate School of Global Environmental Studies FEATURES

  5. Non-Kyoto Radiative Forcing in Long-Run Greenhouse Gas Emissions and Climate Change Scenarios

    SciTech Connect (OSTI)

    Rose, Steven K.; Richels, Richard G.; Smith, Steven J.; Riahi, Keywan; Stefler, Jessica; Van Vuuren, Detlef

    2014-04-27

    Climate policies designed to achieve climate change objectives must consider radiative forcing from the Kyoto greenhouse gas, as well as other forcing constituents, such as aerosols and tropospheric ozone. Net positive forcing leads to global average temperature increases. Modeling of non-Kyoto forcing is a relatively new component of climate management scenarios. Five of the nineteen models in the EMF-27 Study model both Kyoto and non-Kyoto forcing. This paper describes and assesses current non-Kyoto radiative forcing modeling within these integrated assessment models. The study finds negative forcing from aerosols masking significant positive forcing in reference non-climate policy projections. There are however large differences across models in projected non-Kyoto emissions and forcing, with differences stemming from differences in relationships between Kyoto and non-Kyoto emissions and fundamental differences in modeling structure and assumptions. Air pollution and non-Kyoto forcing decline in the climate policy scenarios. However, non-Kyoto forcing appears to be influencing mitigation results, including allowable carbon dioxide emissions, and further evaluation is merited. Overall, there is substantial uncertainty related to non-Kyoto forcing that must be considered.

  6. Toward a Post-Kyoto Climate Change Architecture: A Political Analysis

    E-Print Network [OSTI]

    Raustiala, Kal; Keohane, Robert O.

    2009-01-01

    FOR INTERNATIONAL GHG EMISSIONS TRADING (2000), http://al. , International Emissions Trading Rules as a Compliancethe Economic Benefits of Emissions Trading Under the Kyoto

  7. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    Progress on Post-2012 Emissions Trading Scheme, 39 ENV'T R!generally EUROPEAN UNION EMISSIONS TRADING SCHEME (EU ETS),LLP, Phase III of the Emissions Trading Scheme: Your .Q&A

  8. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2007-01-01

    size of its associated IEA, rather than by the identities ofM j+1 are the same type of IEA, and were they are differentM 1 ). Consequently, at any IEA M j , j < k, a group of M k

  9. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    2 8 During the mid-year G8 summit in 2009, the majorsee supra note 26. (last 29. James Kirkup, G8 summit: Chinaand India Reject G8 Calls for Climate Targets, TELEGRAPH,

  10. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    the deployment of renewable power generation in the U.S.240nations to shift power generation bases to sustainable low-of fos- sil fuel fired power generation facilities, is

  11. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    by Seeking Phaseout of Coal-Fired Plants, 39 ENV'Tr Rvr'. (power stations in China and India will be coal-fired; not 'may be coal-fired,' will be." '44 In 2007 alone, China built

  12. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    Country Analysis Briefs: India, ENERGY INFO. ADMIN. (Aug.Blog/Blogging-Clean-Energy/india-rejects-mandatory-ghg-cuts/India and Thailand are from SPP independent renewable energy

  13. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    India and Thailand are from SPP independent renewable energyRenewable Energy Controlled period Sri Lanka No Hydro Open offer India:

  14. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01

    use a percentage of renewable energy for the production ofprograms subsidize renewable energy SPPs. Thailand does soto Promote Needed Renewable Energy, 37 B.C. ENVTL. AI-F. L.

  15. A Proposal for the Design of the Successor to the Kyoto Protocol

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2008-01-01

    understanding of climate science and technology. The secondproblem of climate change. reductions, technology transfers,technology transfer; and it enhances the prospect of an agreement that will reduce the risk they face of climate-

  16. After Kyoto, science still probes global warming causes

    SciTech Connect (OSTI)

    Westbrook, G.

    1998-01-19

    The Kyoto meeting has come and gone. In the US, the treaty still has to be signed by President Bill Clinton and ratified by the Senate, an action that is most unlikely in view of last year`s 95-0 vote on the issue. In the short term 36 senators are up for reelection in November and therefore likely to come under intense pressure to change their positions, to support the Kyoto treaty, and to push for Senate action. Senators will need support, additional inputs, and overall reinforcement of their positions. One area that this writer believes still has much to offer in this context is the quality--more specifically, the lack of quality--of much of the scientific evidence behind this treaty. Part of that subject is the natural variability in the climate. Natural climate variability is based on cyclical forces, random events, and the Earth`s response to these two factors. These forces create the variability in the climate, the background noise above which any signal of anthropogenic warming must rise in order to be detected. A review of key climatic cycles is the subject of this article.

  17. Kyoto University Libraries Reference Guide Ver.1.1 2012.11.1 Information Services Division of Main Library

    E-Print Network [OSTI]

    Takada, Shoji

    Library New Arrival Alert (Serials Alert) 4 You can select the material types and holding libraries. 5 1Kyoto University Libraries Reference Guide 1 Ver.1.1 2012.11.1 Information Services Division of Main Library Kyoto University MyKULINE is... A web library that be customized for every Kyoto

  18. International Energy Conference, 19 -21 May 2003 Energy Technologies for post-Kyoto targets in the medium term

    E-Print Network [OSTI]

    of CO2 from fossil fuel combustion, through the study of the subsurface potential in a numberInternational Energy Conference, 19 - 21 May 2003 Energy Technologies for post-Kyoto targets the Kyoto target? Cost for carbon dioxide avoidance [USD/ton CO2] 0 50 100 Potential [Percent] 0 20 40 60 80

  19. Golden Mountains The Altai Republic in the Russian Federation Kyoto University Research Reactor Institute Kobayashi Tooru

    E-Print Network [OSTI]

    Taskaev, Sergey Yur'evich

    1 Golden Mountains ­ The Altai Republic in the Russian Federation Kyoto University Research Reactor Institute Kobayashi Tooru It is said that Altai also means golden mountains. The development to these mountains easier especially during the warm summer season. Being geographically located at the central

  20. LBNL-46509 Rebuttal to Testimony on `Kyoto and the Internet: The Energy

    E-Print Network [OSTI]

    summarize the key points in our rebuttal as follows: In his Congressional testimony, Mills attemptedLBNL- 46509 Rebuttal to Testimony on `Kyoto and the Internet: The Energy Implications, and Joseph Romm testified. Mills' testimony was an attempt to defend his earlier analysis. Hakes' testimony

  1. Greetings from Kyoto-U AUTUMN 2013 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    through Primary Sources and Fieldwork Yasushi KOSUGI, Professor, Graduate School of Asian and African Area. The Kyoto University Library owns his series of 12 copperplate engravings, with motifs range from snow University Library owns many valuable historical materials, including books published during the Edo Period

  2. The 10th International Symposium on Flow Visualization August 26-29, 2002, Kyoto, Japan

    E-Print Network [OSTI]

    Texas at Arlington, University of

    The 10th International Symposium on Flow Visualization August 26-29, 2002, Kyoto, Japan F0224 the non-reactive air flow from the injectors. Preliminary whistler nozzle and sonic generator flows were visualized and evaluated. The acoustic wave frequency was measured on the basis of schlieren pictures

  3. Greetings from Kyoto-U AUTUMN 2009 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    neither is presently used. 1 Kyoto University's strategic policy and activities for collaboration Keiichi TODA Editorial Collaborator KOSOSHA CO.,LTD. Printed by KOSAIDO CO.,LTD. © The Committee of Public-Yu are written in given name/family name order. Editor's Notes It is our great pleasure to present you

  4. Greetings from Kyoto-U SPRING 2010 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    of a globalized world. To become cosmopolitan in today's globalized context, we face new challenges: how to expand an egalitarian world order. Multitudes of actions at various levels are required in order to realize this dream.,LTD. © The Committee of Public Relations of Kyoto University A Note on Order of Names As a general rule, names

  5. What Does the Kyoto Protocol Mean to U.S. Energy Markets and the U.S. Economy?

    Reports and Publications (EIA)

    1998-01-01

    A briefing paper on the Energy Information Administration's analysis and report prepared for the Committee on Science, U.S. House of Representatives.

  6. Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements

    E-Print Network [OSTI]

    reductions are carried out, where they are cheapest and that measures to reduce CO2 emissions Biomass (CHP) Cofiring 10% Costs of CO2 /MWhel. Biomass (electricity) #12;First model results Biomass use

  7. Energy Use in China: Sectoral Trends and Future Outlook

    E-Print Network [OSTI]

    2008-01-01

    2001, International Energy Outlook 2001 , Report No. DOE/The International Energy Outlook 2006 (IEO2006) , WashingtonEnergy Outlook .

  8. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  9. Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EAInvervar HydroElectric Cooperative JumpKotakKut Energy PvtCorpKyoto:

  10. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil

  11. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  12. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  13. Integrated field spectroscopy of E+A (post-starburst) galaxies with the Kyoto3DII

    E-Print Network [OSTI]

    Tomotsugu Goto; Atsushi Kawai; Atsushi Shimono; Hajime Sugai; Masafumi Yagi; Takashi Hattori

    2008-01-07

    We have performed a two-dimensional spectroscopy of three nearby E+A (post-starburst) galaxies with the Kyoto3DII integral field spectrograph. In all the cases, Hdelta absorption is stronger at the centre of the galaxies, but significantly extended in a few kpc scale. For one galaxy (J1656), we found a close companion galaxy at the same redshift. The galaxy turned out to be a star-forming galaxy with a strong emission in Hgamma. For the other two galaxies, we have found that the central post-starburst regions possibly extend toward the direction of the tidal tails. Our results are consistent with the merger/interaction origin of E+A galaxies, where the infalling-gas possibly caused by a galaxy-galaxy merging creates a central-starburst, succeeded by a post-starburst (E+A) phase once the gas is depleted.

  14. The 6th International Symposium on Gas Transfer at Water Surfaces Kyoto, Japan, May 17-21, 2010

    E-Print Network [OSTI]

    Garbe, Christoph S.

    The 6th International Symposium on Gas Transfer at Water Surfaces Kyoto, Japan, May 17-21, 2010 A new approach for 3C3D measurements of aqueous boundary layer ows relative to the wind-wave undulated thermographic images of the air-water interface show coherent pat- terns, probably generated by Langmuir

  15. Application Protocols o Multimedia

    E-Print Network [OSTI]

    Biagioni, Edoardo S.

    Application Protocols o Telnet o FTP o WWW o SMTP o NNTP o IRC 7 #12; IRC o Internet Relay Chat o similar to telnet o chat

  16. INTERNET PROTOCOL DARPA INTERNET PROGRAM

    E-Print Network [OSTI]

    McBrien, Peter

    RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared Way Marina del Rey, California 90291 #12;#12;September 1981 Internet Protocol TABLE OF CONTENTS ...................................................... 9 3. SPECIFICATION ................................................... 11 3.1 Internet Header Format

  17. The 6th International Symposium on Gas Transfer at Water Surfaces Kyoto, Japan, May 17-21, 2010

    E-Print Network [OSTI]

    Garbe, Christoph S.

    .Schimpf,Christoph.Garbe,Bernd.Jähne}@iwr.uni-heidelberg.de The impact of wind, rain, and surface slicks on the transport of heat and gas at the water surfaceThe 6th International Symposium on Gas Transfer at Water Surfaces Kyoto, Japan, May 17-21, 2010 Combined Visualization of Wind Waves and Water Surface Temperature R. Rocholz1 , U. Schimpf1 , C. S. Garbe1

  18. Wumpus Protocol Analysis

    E-Print Network [OSTI]

    White, Barbara Y.

    The goal of this research was to assist in the creation of a new, improved Wumpus advisor by taking protocols of ten people learning to play Wumpus with a human coach. It was hoped that by observing these subjects learn ...

  19. Evolving Custom Communication Protocols

    E-Print Network [OSTI]

    Fernandez, Thomas

    Evolving Custom Communication Protocols by Wes Faler of Part-Time Scientists for 28C3, Berlin One-at-time simulation #12;Easy as 1...2...3... Parameter sweep int driver_movesPerTransaction[] = { 1, 20 }; int driver_wheelTicksPerCommand[] = { 512, 4096 }; int driver_commandsPerPacket[] = { 1, 25

  20. House Simulation Protocols Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols Report House Simulation Protocols Report Report cover Building America's House Simulation Protocols report is designed to assist researchers in tracking...

  1. Superior Energy Performance Certification Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance cm Certification Protocol December 7, 2012 D R A F T f o r R E V I E W Superior Energy Performance cm Certification Protocol 1 December 7, 2012 2012...

  2. Energy Use in China: Sectoral Trends and Future Outlook

    E-Print Network [OSTI]

    2008-01-01

    Sectoral Trends and Future Outlook Nan Zhou, Michael A.2001, International Energy Outlook 2001 , Report No. DOE/The International Energy Outlook 2006 (IEO2006) , Washington

  3. Thesis Research Protocol November 2013 1 Thesis Research Protocol

    E-Print Network [OSTI]

    van Vliet, Lucas J.

    Thesis Research Protocol November 2013 1 Thesis Research Protocol November 2013 Thesis Research Project The master's programme Industrial Ecology is completed by the Thesis Research Project (TRP Ecology. The Thesis Research Project is composed of two modules: a Thesis Preparation Module (6 EC

  4. Sex GENOTYPING PROTOCOL PCR PROTOCOL NAME: Sex1

    E-Print Network [OSTI]

    Shoubridge, Eric

    Sex GENOTYPING PROTOCOL GENE NAME: PCR PROTOCOL NAME: Sex1 PCR REAGENTS: 10X NEB THERMOPOL PCR) PRIMERS: Sex1 Forward (20uM Standard Working Concentration) Sex1 Reverse (20uM Standard Working CONDITIONS: Sex (or Sex1) 95 C for 3 min 95 C for 30 sec 60 C for 1 min 35 cycles

  5. Satellite Transport Protocol (STP): An SSCOPbased Transport Protocol for Datagram Satellite Networks

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 Satellite Transport Protocol (STP): An SSCOP­based Transport Protocol for Datagram Satellite Networks Thomas R. Henderson * and Randy H. Katz University of California at Berkeley {tomh­based protocol, the Service Specific Connection Oriented Protocol (SSCOP), for use as a transport protocol

  6. Expressive Analytical Model for Routing Protocols infor Routing Protocols in

    E-Print Network [OSTI]

    Julien, Christine

    Taesoo Jun Angela Dalton Sh h k B dShreeshankar Bodas Christine Julien Sriram Vishwanath TR-UTEDGE-2007 in Mobile Ad Hoc Networks Taesoo Jun, Angela Dalton, Shreeshankar Bodas, Christine Julien, and Sriram, sriram}@ece.utexas.edu Abstract--Many routing protocols exist for mobile ad hoc networks. To select

  7. Reviews and approves OG protocol Publishes New protocols, Revisions,

    E-Print Network [OSTI]

    Kay, Mark A.

    CIRB reviews/approves Study-Specific Worksheet; notifies researcher & local IRB of acceptance Confirms- Specific Worksheet Worksheet Acceptance (site accepted) New protocols Revisions Renewals DSMB rpts Local local site closure to Researcher and to local IRB Oncology Group (OG) Scientific review at CTEP takes

  8. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  9. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  10. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    April 2015 (Revision 1) - PROTOCOL - EA-30-02 Office of Environment, Safety and Health Assessments Protocol for Required Reading, April 2015 (Revision 1) - PROTOCOL -...

  11. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and Alexandre Juin 1994 #12; Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v the existing hardware and software testing methods would be adequate for the testing of communication protocols

  12. Protocol Testing: Review of Methods and Relevance

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Protocol Testing: Review of Methods and Relevance for Software Testing G. v. Bochmann and AlexandreZal Juin 1994 #12;Protocol Testing: Review of Methods and Relevance for Software Testing Gregor v. Bochmann and software testing methods would be adequate for the testing of communication protocols. The purpose

  13. The Pulse Protocol: Energy Efficient Infrastructure Access

    E-Print Network [OSTI]

    Awerbuch, Baruch

    The Pulse Protocol: Energy Efficient Infrastructure Access Baruch Awerbuch, David Holmer, herb}@cs.jhu.edu Abstract-- We present the Pulse protocol which is designed for multi-hop wireless. The Pulse protocol utilizes a periodic flood initiated at the network gateways which provides both routing

  14. TEC Working Group Topic Groups Archives Protocols

    Broader source: Energy.gov [DOE]

    The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  15. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  16. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  17. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  18. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  20. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  3. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  4. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Office of Environmental Management (EM)

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  5. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform...

    Energy Savers [EERE]

    Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  6. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov [DOE]

    This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007.

  7. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  8. Improving the Security of Cryptographic Protocol Standards

    E-Print Network [OSTI]

    Basin, David

    for their implementation. This generality is enabled by standards and technical documents such as Request for CommentsImproving the Security of Cryptographic Protocol Standards David Basin Cas Cremers Kunihiko Miyazaki Sasa Radomirovic Dai Watanabe May 1, 2014 Keywords: Standards, Network Protocols, Security

  9. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  10. Protocols for Processes Munindar P. Singh

    E-Print Network [OSTI]

    Protocols for Processes Munindar P. Singh (Students: Amit K. Chopra, Nirmit V. Desai, Ashok U. Mallya) singh@ncsu.edu Department of Computer Science North Carolina State University http://www.csc.ncsu.edu/faculty/mpsingh/ c Munindar P. Singh, July 2004 ­ p.1/25 #12;Why Processes and Protocols? Heavy interest from

  11. Positron: Composing Commitment Protocols No Institute Given

    E-Print Network [OSTI]

    to a specific role). We evaluate our contributions by modeling well-known protocols in the insurance, manufactur with how they relate to one another. Such a description, even if supported by standards such as BPMN [20 exchanged by the business partners. In contrast, a commitment protocol emphasizes the social state

  12. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  13. Measuring Transport Protocol Potential for Energy Efficiency

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras. Several attempts have been made to measure the energy efficiency of trans- port protocols, (e.g. [10], [12-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

  14. Context-Aware Protocol Engines for  Ad Hoc Networks

    E-Print Network [OSTI]

    Garcia-Luna-Aceves, J.J.

    2009-01-01

    Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation

  15. Adapting a delay-based protocol to heterogeneous environments 

    E-Print Network [OSTI]

    Kotla, Kiran

    2008-10-10

    We investigate the issues in making a delay-based protocol adaptive to heterogeneous environments. We assess and address the problems a delay-based protocol faces when competing with a loss-based protocol such as TCP. We ...

  16. An Alternative Quantization Protocol for the History Dependent Parrondo Game

    E-Print Network [OSTI]

    Faisal Shah Khan

    2008-06-09

    Earlier work on the quantization of the history dependent (HD) Parrondo game by Flitney, Ng, and Abbott led to the FNA protocol. We propose an alternative quantization protocol for this game which differs from the FNA protocol in various aspects.

  17. Office of Environment, Safety and Health Assessments Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    April 2015 Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 The purpose of this protocol is to establish...

  18. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department...

  19. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  20. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

  1. High Performance Computing Data Center Metering Protocol | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

  2. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

  3. TEC Working Group Topic Groups Archives Protocols Meeting Summaries...

    Office of Environmental Management (EM)

    Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 Jacksonville TEC Meeting,...

  4. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  5. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Office of Environmental Management (EM)

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design...

  6. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  7. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  8. The Development of Rapid Aging and Poisoning Protocols for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices...

  9. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at...

  10. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments Protocol for the Development and Maintenance of Criteria Review and...

  11. Optimizing local protocols implementing nonlocal quantum gates

    E-Print Network [OSTI]

    Scott M. Cohen

    2010-02-02

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and are deterministic while also being "one-shot", in that they use only one copy of an entangled resource state. The optimization is in the sense of minimizing the amount of entanglement used, and it is often the case that less entanglement is needed than with an alternative protocol using two-way teleportation.

  12. Energy Assessment Protocol for Glass Furnaces 

    E-Print Network [OSTI]

    Plodinec, M. J.; Kauffman, B. M.; Norton, O. P.; Richards, C.; Connors, J.; Wishnick, D.

    2005-01-01

    of the protocol are implemented, resulting in cost savings of greater than $200,000 per year. PROJECT OVERVIEW The glass industry is a major energy consumer. Depending on the market sector, a glass furnace heated by oxy-fuel burners may use from 3..., the manufacturer of the burners used in the PPG furnace, brought extensive field experience to the team, as well as in-depth knowledge of burner performance. ENERGY ASSESSMENT PROTOCOL The project team developed the protocol based on DIAL, Eclipse and PPG...

  13. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  14. A SECURE TEXT MESSAGING PROTOCOL Gary Belvin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in conformity with the requirements for the degree of Master of Science in Security Informatics. Baltimore Key Agreement Protocol for SMS (KAPS) 12 3.1 Retransmission Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.9 Key Agreement

  15. Privacy of encrypted Voice Over Internet Protocol 

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10

    In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the ...

  16. Verifying the Mascara Protocol | A rst step |

    E-Print Network [OSTI]

    Sidorova, Natalia

    Verifying the Mascara Protocol | A #12;rst step | Dragan Bosnacki Dennis Dams Susanne Graf Leszek list properties associated with the di#11;erent entities which we intend to verify or for which we

  17. An Algorithm for Evolving Protocol Constraints 

    E-Print Network [OSTI]

    Collins, Mark

    We present an investigation into the design of an evolutionary mechanism for multiagent protocol constraint optimisation. Starting with a review of common population based mechanisms we discuss the properties of the ...

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    "B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson, C.E. Hancock

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  20. On the Complexity of Verifying Cyber-Physical Security Protocols

    E-Print Network [OSTI]

    Nigam, Vivek

    On the Complexity of Verifying Cyber-Physical Security Protocols Max Kanovich, Tajana Ban Kirigin agents. We classify such security protocols as Cyber-Physical.6 The key elements of such protocols important class of Bounded Memory Cyber-Physical Security19 Protocols with a Memory Bounded Intruder

  1. Validating a token coherence protocol for scientific Fernandez-Pascual

    E-Print Network [OSTI]

    Acacio, Manuel

    Validating a token coherence protocol for scientific workloads Ricardo Fern´andez-Pascual r.fernandez

  2. Automatic Protocol Selection in Secure Two-Party Computations

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Protocol Selection in Secure Two-Party Computations (Full Version) Florian Kerschbaum1 for the best performance. In this paper we propose automatic protocol selection which selects a protocol, based on an extended performance model we automatically select the best protocol for a sub

  3. Hybrid protocol of remote implementations of quantum operations

    E-Print Network [OSTI]

    Ning Bo Zhao; An Min Wang

    2007-08-04

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

  4. Transport Protocol Services (TAPS) Problem: more and more transport protocols available, with various features,

    E-Print Network [OSTI]

    Welzl, Michael

    Transport Protocol Services (TAPS) · Problem: more and more transport protocols that would not offer "TCP or UDP" but "transport services" ­ A transport system: transport-services@ifi.uio.no hXps://sympa.uio.no/ifi.uio.no/info/transport-services · Problem

  5. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  6. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  7. Quantum Communication Protocol Employing Weak Measurements

    E-Print Network [OSTI]

    Alonso Botero; Benni Reznik

    1999-09-27

    We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin. In our protocol, Alice, first generates a "code" by performing weak measurements on a sample of N spins. The sample is sent to Bob, who later performs a post-selection by measuring the spin along either of two certain directions. The results of the post-selection define the "key', which he then broadcasts publicly. Using both her previously generated code and this key, Alice is able to infer the {\\em direction} chosen by Bob in the post-selection. Alternatively, if Alice broadcasts publicly her code, Bob is able to infer from the code and the key the direction chosen by Alice for her weak measurement. Two possible experimental realizations of the protocols are briefly mentioned.

  8. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chaneličre; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  9. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  10. Comparing Communication Protocols under Cooperative Pressure

    E-Print Network [OSTI]

    Eiben, A.E. "Guszti"

    Comparing Communication Protocols under Cooperative Pressure A.E. Eiben M.C. Schut N. Vink largely on the abilities of the agents to cooperate and communicate. In environments where coordination is essential for goal accomplishment, agents must thus appropriately communicate for cooperative task

  11. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode · end-to-end tunnel mode · security-gateway to security-gateway transport mode and tunnel model can coexist #12;7© Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi

  12. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  13. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  14. Efficiency Limitations for -Protocols for Group Homomorphisms

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Limitations for -Protocols for Group Homomorphisms (Full Version) Endre Bangerter1 , Jan stephan.krenn@bfh.ch Abstract. Efficient zero-knowledge proofs of knowledge for group ho- momorphisms be performed very efficiently within groups of known order, for hidden order groups the respective proofs

  15. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    structure called the blockchain. The protocol requires from miners to solve a "proof of work" (POW, aka-forcing a hash inequality based on SHA-256, in order to generate new blocks for the blockchain. The blocks that comprise the blockchain contain sets of transactions that are generated at will by owners of bitcoins, who

  16. Increasing Communications Security through Protocol Parameter Diversity

    E-Print Network [OSTI]

    New Mexico, University of

    of the protocol more difficult to predict. This form of diversity is designed to mitigate the shrew attack [16 Rica, 2060 gbarrantes@ecci.ucr.ac.cr and Stephanie Forrest University of New Mexico, Department. Recently, several projects have addressed the problem of widely replicated attacks through a technique

  17. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  18. Adaptive best effort protocols for video delivery 

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01

    data when transmitted over best-effort networks like the Internet. The protocols are end-to-end, and do not propose any modifications (like reservations) to the network infrastructure-hence, they can be used over the existing Internet. The design...

  19. GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO

    E-Print Network [OSTI]

    Delaware, University of

    for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy, YU-MI MUN, NOAH TOLY & YOUNG-DOO WANG Position Paper prepared for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy tel: 302.831.8405 · web: www

  20. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  1. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  2. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  3. Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley

    E-Print Network [OSTI]

    Foley, Simon

    and relies on the skill of the protocol designer. Saidi [32] proposes a semi-automatic design tool based

  4. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    E-Print Network [OSTI]

    Jump, David

    2014-01-01

    for   Proprietary  Software  Testing  Protocols”  (vendors   value   software   testing   as   a   means   to  and  requirements  for  testing  software  vendor  energy  

  5. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    Deng, Yuxin

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1 , St´ephane Grumbach2 , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  6. A Framework for Verifying Data-Centric Protocols

    E-Print Network [OSTI]

    A Framework for Verifying Data-Centric Protocols Yuxin Deng1,2, , St´ephane Grumbach3, , and Jean on the network (in a physical or a virtual sense), e.g. routing tables. Such protocols are qualified as data-centric in the sequel. Correctness proofs of data-centric protocols are even more complex than those for control

  7. Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko

    E-Print Network [OSTI]

    Goddard, Wayne

    Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet

  8. Concrete Security for Entity Recognition: The Jane Doe Protocol

    E-Print Network [OSTI]

    Zenner, Erik

    Concrete Security for Entity Recognition: The Jane Doe Protocol Stefan Lucks1 , Erik Zenner2 , Andr NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether ­ the "Jane Doe Protocol" ­, and provides a formal proof of its concrete security. The protocol neither

  9. Automated protocol selection for energy efficient WSN applications

    E-Print Network [OSTI]

    Atkinson, Robert C

    Automated protocol selection for energy efficient WSN applications C. Shen, S. Harte, E. Popovici the implementation of different protocols for different topology and appli- cation scenarios to optimise the overall Heterogeneous Automated Wireless Sensor (THAWS), embedding a reactive routing protocol, an energy

  10. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  11. An Evaluation of UDP Transport Protocols

    SciTech Connect (OSTI)

    Carter, S

    2004-12-21

    Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

  12. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later algorithm � cipher spec · encryption algorithm · message digest algorithm � master secret · 48 byte shared secret � is resumable flag · can be used to initiate new connections 10© Ravi Sandhu 2001 SSL CONNECTION

  13. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    -2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later secret · 48 byte shared secret is resumable flag · can be used to initiate new connections 10© Ravi each keys generated from master secret, client/server random client_write_MAC_secret server_write_MAC_secret

  14. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. A Protocol for Quantum Energy Distribution

    E-Print Network [OSTI]

    Masahiro Hotta

    2008-07-10

    A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

  16. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  17. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  18. Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France

    E-Print Network [OSTI]

    Grigoriadis, Theocharis N

    2009-01-01

    Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/Energy Agency. "Nuclear Energy and the Kyoto Protocol" OECD/et al. "Perception of Nuclear Energy and Coal in France and

  19. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  20. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  1. California's Greenhouse Gas Policies: Local Solutions to a Global Problem?

    E-Print Network [OSTI]

    Bushnell, Jim B; Peterman, Carla Joy; Wolfram, Catherine D

    2007-01-01

    physical limits on how much hydro power flows south from thethe Kyoto protocol, the hydro power in British Columbia and

  2. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  3. US - Voice Over Internet Protocol Phone Service Providers Market Analysis

    E-Print Network [OSTI]

    Srinivasan, Vijaybabu

    2006-05-19

    .263 Bit stream in the Real-time Transport Protocol Vijaybabu Srinivasan Spring 2006 17 EMGT835 RTCP RTP Control protocol RTP Real-Time Transport H.323 Protocols... Total 100 Reputation/ Image: Evaluation Criteria: Reputation is the current sum total of the specific traits attributed to a company by people. A company?s reputation is produced by the memory impressions of its perceived actions over time. 13...

  4. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    Nevada State Protocol Agreement for Implementing the National Historic Preservation Act Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory...

  5. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the process for...

  6. Sandia Energy - Sandia to Discuss Energy-Storage Test Protocols...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    communication within the power system. These protocols will provide for evaluation of energy storage interoperability and functionality, providing frequency and voltage stability...

  7. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  8. Chapter 15: Commercial New Construction Protocol. The Uniform...

    Energy Savers [EERE]

    Construction Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of...

  9. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  10. A ClassChest for Deriving Transport Protocols W. Timothy Strayer

    E-Print Network [OSTI]

    Strayer, William Timothy

    , California strayer@ca.sandia.gov Abstract Development of new transport protocols or protocol algo­ rithmsA Class­Chest for Deriving Transport Protocols W. Timothy Strayer Sandia National Laboratories to transport protocols, so that the focus is placed on the protocol­specific aspects. The Meta­ Transport

  11. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  12. Attacking and Repairing the Improved ModOnions Protocol

    E-Print Network [OSTI]

    Borisov, Nikita

    Attacking and Repairing the Improved ModOnions Protocol Nikita Borisov1 , Marek Klonowski2 presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. How- ever, ModOnions allowed the detour attack

  13. Implementing a Low Power TDMA Protocol Over 802.11

    E-Print Network [OSTI]

    and contrast our protocol to other wireless power- saving mechanisms, then discuss the design, or wind energy to power themselves and their wireless network interface. The availability of low- powerImplementing a Low Power TDMA Protocol Over 802.11 Jim Snow, Wu-chi Feng, Wu-chang Feng (jsnow

  14. FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and dis- tributed control applications. We present formal for systematic and extensive testing of Modbus devices. Keywords: SCADA Protocol, Modbus, Test-case Generation, Formal Methods 1. Introduction A distributed digital control system--sometimes called a SCADA system

  15. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single

  16. On the Design and Implementation of Secure Network Protocols

    E-Print Network [OSTI]

    Paterson, Kenny

    On the Design and Implementation of Secure Network Protocols Nadhem J. AlFardan Thesis submitted Hart, for providing all what I needed to carry out my laboratory work. Finally, thanks to everyone who kept asking me "are you done yet?". 4 #12;Abstract Network Protocols are critical to the operation

  17. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ˘ˇ¤Ł Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  18. Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation

    E-Print Network [OSTI]

    Han, Qi "Chee"

    Realistic Performance Analysis of WSN Protocols Through Trace Based Simulation Alan Marchiori, Lin It is a difficult endeavor to realistically evaluate the perfor- mance of wireless sensor network (WSN) protocols. Generic network simulators are often used, but they tend to rely on synthetic models. Because WSN

  19. Rational Protocol Design: Cryptography Against Incentive-driven Adversaries

    E-Print Network [OSTI]

    Maurer, Ueli

    in part by NSF awards #0830464, #1111599, and #1223623, the Army Research Laboratory under Cooperative Research Projects Agency through the U.S. Office of Naval Research under Contract N00014-Cryptographic Protocols, Game Theory, Se- cure Computation, Composition I. INTRODUCTION Consider a cryptographic protocol

  20. Secure Wireless Payment Protocol School of Computer Science

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Secure Wireless Payment Protocol Hong Wang School of Computer Science Carleton University 1125 Colonel By Drive, Ottawa, Canada Abstract With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols

  1. Design of a PSi header processor for the internet protocol 

    E-Print Network [OSTI]

    Bai, Jinxia

    1995-01-01

    bottleneck is the network transport component, i.e. the network I/O at the end system. To overcome this performance bottleneck, a standard data communication protocol, such as TCP/IP, could be implemented by using hardware to speedup the protocol throughput...

  2. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  3. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  4. ''GANGS'' MAC Protocol Proposal Saad Biaz Dai Yawen

    E-Print Network [OSTI]

    consumption. This paper presents a MAC layer protocol, named ''GANGS'', as a method of saving energy in sensor is not necessarily engineered or predetermined. Because of this, sensor network protocols and algorithms must be self the most energy, followed by radios. Processor and sensor power consumption are usually less important [8

  5. Bliss: Specifying Declarative Service Protocols Munindar P. Singh

    E-Print Network [OSTI]

    Bliss: Specifying Declarative Service Protocols Munindar P. Singh North Carolina State University Raleigh, NC 27695-8206, USA singh@ncsu.edu Abstract--BSPL, the Blindingly Simple Protocol Language, dispensing with conventional control flow features such as sequencing and choice. Singh [1] previously showed

  6. Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn

    E-Print Network [OSTI]

    Lam, Simon S.

    Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn Dong-Young Lee. For a system under churn, it is impossible to maintain a correct distributed DT continually. We define of protocols maintains high accuracy for systems under churn and each system converges to 100% accuracy after

  7. Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks Masaya Yoshida ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy protocols for power-efficient data collection have been proposed [1][2]. Recently, energy harvesting has

  8. Alternative Experimental Protocol for a PBR-Like Result

    E-Print Network [OSTI]

    D. J. Miller

    2012-02-29

    Pusey, Barrett and Rudolph (PBR) have recently proven an important new theorem in the foundations of quantum mechanics. Here we propose alternative experimental protocols which lead to the PBR result for a special case and a weaker PBR-like result generally. Alternative experimental protocols support the assumption of measurement independence required for the PBR theorem.

  9. Improving the Battery Performance of Ad-Hoc Routing Protocols

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department-- In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism

  10. Transport Protocol Behavior and Energy-Saving Lefteris Mamatas

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    networks [1]. Several attempts have been made to measure the energy efficiency of transport protocols, (eTransport Protocol Behavior and Energy-Saving Potential Lefteris Mamatas Demokritos University of the transport level needs to be associated with some energy potential index which, unlike energy expenditure

  11. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  12. Design and Analysis of Communication Protocols for Quantum Repeater Networks

    E-Print Network [OSTI]

    Cody Jones; Danny Kim; Matthew T. Rakher; Paul G. Kwiat; Thaddeus D. Ladd

    2015-05-06

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol ("MidpointSource") delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

  13. Combinatorial Evolution and Forecasting of Communication Protocol ZigBee

    E-Print Network [OSTI]

    Levin, Mark Sh; Kistler, Rolf; Klapproth, Alexander

    2012-01-01

    The article addresses combinatorial evolution and forecasting of communication protocol for wireless sensor networks (ZigBee). Morphological tree structure (a version of and-or tree) is used as a hierarchical model for the protocol. Three generations of ZigBee protocol are examined. A set of protocol change operations is generated and described. The change operations are used as items for forecasting based on combinatorial problems (e.g., clustering, knapsack problem, multiple choice knapsack problem). Two kinds of preliminary forecasts for the examined communication protocol are considered: (i) direct expert (expert judgment) based forecast, (ii) computation of the forecast(s) (usage of multicriteria decision making and combinatorial optimization problems). Finally, aggregation of the obtained preliminary forecasts is considered (two aggregation strategies are used).

  14. Fast controlled unitary protocols using group or quasigroup structures

    E-Print Network [OSTI]

    Li Yu

    2013-03-12

    A nonlocal bipartite unitary gate can sometimes be implemented using prior entanglement and only one round of classical communication in which the two parties send messages to each other simultaneously. This cuts the classical communication time by a half compared to the usual protocols, which require back-and-forth classical communication. We introduce such a "fast" protocol that can implement a class of controlled unitaries exactly, where the controlled operators form a subset of a projective representation of a finite group, which may be Abelian or non-Abelian. The entanglement cost is only related to the size of the group and is independent of the dimension of the systems. We also introduce a second fast protocol that can implement any given controlled unitary approximately. This protocol uses the algebraic structure of right quasigroups, which are generalizations of quasigroups, the latter being equivalent to Latin squares. This second protocol could optionally use shared classical randomness as a resource, in addition to using entanglement. When compared with other known fast unitary protocols, the entanglement cost of this second protocol is lower for general controlled unitaries except for some rare cases.

  15. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Energy Savers [EERE]

    727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

  16. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-08-05

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  17. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  18. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  19. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  20. Delayed response protocols for high-delay wireless networks 

    E-Print Network [OSTI]

    Sadry, Nauzad Erach

    2002-01-01

    Wireless networks have become more prevalent over the last few years. These networks introduce different types of errors, which are due to the unpredictable nature of the wireless channel. The congestion control algorithms of existing TCP protocols...

  1. Rapid designs for cache coherence protocol engines in Bluespec

    E-Print Network [OSTI]

    Ng, Man Cheuk, 1980-

    2005-01-01

    In this thesis, we present the framework for Rapid Protocol Engine Development (RaPED). We implemented the framework in Bluespec, which is a high level hardware language based on Term Rewriting Systems (TRSs). The framework ...

  2. A Secure Routing Protocol for Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Klappenecker, Andreas

    't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification ­ Tunneling Two

  3. LDP : location discovery protocol for data center networks

    E-Print Network [OSTI]

    Pamboris, Andreas

    2009-01-01

    3.1 Data center network topology . . . . . . . 3.2 De?ningA Scalable, Commodity Data Center Network Architecture. InDiscovery Protocol for Data Center Networks A thesis

  4. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingŐumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  5. A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures

    E-Print Network [OSTI]

    Acacio, Manuel

    A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures Ricardo Fern Murcia SPAIN {r.fernandez,jmgarcia,meacacio}@ditec.um.es Jos´e Duato Dpto. Inform´atica de Sistemas y

  6. Joint Architecture Standard (JAS) Reliable Data Delivery Protocol (RDDP) specification.

    SciTech Connect (OSTI)

    Enderle, Justin Wayne; Daniels, James W.; Gardner, Michael T.; Eldridge, John M.; Hunt, Richard D.; Gallegos, Daniel E.

    2011-05-01

    The Joint Architecture Standard (JAS) program at Sandia National Laboratories requires the use of a reliable data delivery protocol over SpaceWire. The National Aeronautics and Space Administration at the Goddard Spaceflight Center in Greenbelt, Maryland, developed and specified a reliable protocol for its Geostationary Operational Environment Satellite known as GOES-R Reliable Data Delivery Protocol (GRDDP). The JAS program implemented and tested GRDDP and then suggested a number of modifications to the original specification to meet its program specific requirements. This document details the full RDDP specification as modified for JAS. The JAS Reliable Data Delivery Protocol uses the lower-level SpaceWire data link layer to provide reliable packet delivery services to one or more higher-level host application processes. This document specifies the functional requirements for JRDDP but does not specify the interfaces to the lower- or higher-level processes, which may be implementation-dependent.

  7. 2002/11/12 Roberto Innocente 1 Transport protocols

    E-Print Network [OSTI]

    Innocente, Roberto

    that that the receiver is flooded by the sender · TCP as many other protocols uses a sliding window mechanism · in every congestion control · It had an importance similar to that the Watt's Flyball regulator had for the steam

  8. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  9. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  10. O C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol

    E-Print Network [OSTI]

    Segall, Adrian

    , j}.At the end, the east table of node a is {b, c, d, e, j}. a i f ec g h db j 100 200 300 400 500 with updated information. f c g h a b d 100 200 300 400 500 600 100 200 300 400 h? source access target h? h! hO C T O P U SO C T O P U S Scalable Routing ProtocolScalable Routing Protocol For Wireless Ad Hoc

  11. A FAST MENTAL POKER PROTOCOL TZER-JEN WEI AND LIH-CHUNG WANG

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a fast and secure mental poker protocol. It is twice as fast as similar protocols, namely Barnett, 27, 28, 29], see [7] for a survey). Barnett-Smart's protocol is proposed in 2003 ([3]). It canGamal-based version. Castellŕ-Roca's protocol is proposed in 2004 ([7]). It is similar to Barnett-Smart, but faster

  12. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  13. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  14. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  15. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  16. Protocol: Rat Cardiac CINE with Tagging, Page 1 of 4 Author: rgb 3/16/2012 Protocol: Rat Cardiac CINE with Tagging

    E-Print Network [OSTI]

    California at San Diego, University of

    the heart at isocenter. Water Phantom Place a 15 mL tube containing water and sealed with a screw top.5 mm 5cmx5cm 15 min Protocol Steps 1. Set up the physio equipment. Follow the instructions below. See the "Positioning" section below. 4. Protocol directory. The protocols can be loaded from

  17. New York City Paid Time Off and Sick Leave Protocol The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This

    E-Print Network [OSTI]

    New York City Paid Time Off and Sick Leave Protocol 1. Scope The purpose of this protocol is to comply with the New York City Earned Sick Time Act. This protocol applies only to employees of Carnegie Mellon University who work at least eighty (80) hours per calendar year within the City of New York, NY

  18. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  19. A complete Randomized Benchmarking Protocol accounting for Leakage Errors

    E-Print Network [OSTI]

    T. Chasseur; F. K. Wilhelm

    2015-07-09

    Randomized Benchmarking allows to efficiently and scalably characterize the average error of an unitary 2-design such as the Clifford group $\\mathcal{C}$ on a physical candidate for quantum computation, as long as there are no non-computational leakage levels in the system. We investigate the effect of leakage errors on Randomized Benchmarking induced from an additional level per physical qubit and provide a modified protocol that allows to derive reliable estimates for the error per gate in their presence. We assess the variance of the sequence fidelity corresponding to the number of random sequences needed for valid fidelity estimation. Our protocol allows for gate dependent error channels without being restricted to perturbations. We show that our protocol is compatible with Interleaved Randomized Benchmarking and expand to benchmarking of arbitrary gates. This setting is relevant for superconducting transmon qubits, among other systems.

  20. Continuous-Variable Protocols in the Noisy-Storage Model

    E-Print Network [OSTI]

    Fabian Furrer; Christian Schaffner; Stephanie Wehner

    2015-09-30

    We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achieve security by establishing a trade-off between quantum uncertainty generated in the protocol and the classical capacity of the memory channel. As our main technical tool, we study and derive new uncertainty relations for continuous-variable systems. Finally, we provide explicit security parameters for realistic memory models.

  1. Local quantum protocols for separable measurements with many parties

    E-Print Network [OSTI]

    Scott M. Cohen

    2013-03-20

    In a recent paper \\cite{mySEPvsLOCC}, we showed how to construct a quantum protocol for implementing a bipartite, separable quantum measurement using only local operations on subsystems and classical communication between parties (LOCC) within any fixed number of rounds of communication, whenever such a protocol exists. Here, we generalize that construction to one that applies for any number of parties. One important observation is that the construction automatically determines the ordering of the parties' measurements, overcoming a significant apparent difficulty in designing protocols for more than two parties. We also present various other results about LOCC, including showing that if, in any given measurement operator of the separable measurement under consideration, the local parts for two different parties are rank-1 operators that are not repeated in any other measurement operator of the measurement, then this separable measurement cannot be exactly implemented by LOCC in any finite number of rounds.

  2. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chevassut, Olivier [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-11-12

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  3. Fast protocols for local implementation of bipartite nonlocal unitaries

    E-Print Network [OSTI]

    Li Yu; Robert B. Griffiths; Scott M. Cohen

    2012-01-06

    In certain cases the communication time required to deterministically implement a nonlocal bipartite unitary using prior entanglement and LOCC (local operations and classical communication) can be reduced by a factor of two. We introduce two such "fast" protocols and illustrate them with various examples. For some simple unitaries, the entanglement resource is used quite efficiently. The problem of exactly which unitaries can be implemented by these two protocols remains unsolved, though there is some evidence that the set of implementable unitaries may expand at the cost of using more entanglement.

  4. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  5. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  6. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  7. Development and Validation of a Simple Protocol To Rapidly

    E-Print Network [OSTI]

    pollutants in waste air biofilters. The protocol involves the determination of two pollutant concentration with low concentrations of pollutants. Biofilters work by passing humidified polluted air through a bed > aromatics > alkanes. An attempt was made to correlate the pollutant elimination with Henry's coefficient

  8. Security Analysis of an Open Car Immobilizer Protocol Stack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    --apply the principle of open evaluation. A recent example is the specification of an open security protocol stack in principle be deployed on any suitable type of transponder chip. In this paper we re-evaluate the security] and the KeeLoq algo- rithm used in remote control systems [8] demonstrate the risks of this security

  9. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  10. Simplified VO M&V Protocol Simplified Voltage Optimization (VO)

    E-Print Network [OSTI]

    modeling is mentioned, it refers to using industry accepted distribution system power flow simulation tools the verification process. · Calculations of all system improvements (reduction of line losses and no-load lossesSimplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification

  11. A Practical Hybrid-ARQ Protocol Using Noncoherent Orthogonal Modulation

    E-Print Network [OSTI]

    Valenti, Matthew C.

    requests. The proposed protocol is suitable for IEEE 802.15.4/Zigbee networks using commodity off networks that follow the Bluetooth standard or sensor networks that follow the IEEE 802.15.4/Zigbee. For instance, Bluetooth uses nonorthogonal binary Gaussian fre- quency shift keying (GFSK) while Zigbee uses 16

  12. Automating the Sandia Advanced Interoperability Test Protocols Jay Johnson1

    E-Print Network [OSTI]

    systems) interoperability and electrical behavior functionality as specified by the IEC technical reportAutomating the Sandia Advanced Interoperability Test Protocols Jay Johnson1 and Bob Fox2 1 Sandia -- As the penetration of non-dispatchable renewable energy increases around the world, there is greater need to have

  13. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  14. Fast Automatic Synthesis of Security Protocols Using Backward Search

    E-Print Network [OSTI]

    Foley, Simon

    backward. ---Sir Arthur Conan Doyle (Sherlock Holmes), A Study in Scarlet, 1887. Categories and Subject]: Protocol Verifica­ tion; K.6.5 [Security and Protection]: Authentication; D.2.4 [Software­ veloped such as [5, 10, 9, 19, 17, 22]. However, little work has been carried out on systematic approaches

  15. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    Mitchell, Chris

    ] as the 2nd edition of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks] is different to the Cheng- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  16. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    of ISO/IEC 11770-2. · In mid 2008, Mathuria and Sriram [19] described new type attacks on both mechanism- Comley fix, and is not subject to the Mathuria-Sriram attacks. The term `type attack' refers proceeding we note that the Mathuria-Sriram attacks require three consecutive fields in one protocol message

  17. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  18. Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    E-Print Network [OSTI]

    Merro, Massimo

    , temperature); they are used as embedded systems (e.g., biomedical sensor engineering, smart homes) or mobile sensor networks. A simulation theory is developed to compare probabilistic protocols that have similar are usually based on discrete-event simulators (e.g., ns-2, Opnet and Glomosim). However, different simulators

  19. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  20. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  1. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  2. Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Western Mountains, Valleys and Coast Regional Supplement Organization and oversee the field testing of the draft Regional Supplement. Field testing will be done in cooperation, the District coordinator will provide team members with an introduction to the Regional Supplement

  3. Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Field Testing Protocol Atlantic and Gulf Coastal Plain Regional Supplement Organization of field the field testing of the draft Regional Supplement. Field testing will be done in cooperation with regional, the District coordinator will provide team members with an introduction to the Regional Supplement

  4. Combining algorithms for deciding knowledge in security protocols #

    E-Print Network [OSTI]

    Doyen, Laurent

    protocols requires a precise un­ derstanding of the attacker knowledge. Two standard notions are usu­ ally â?? E and the ACI Jeunes Chercheurs JC9005. #12; completely unrealistic to require that the Boolean true and some standard bisimulation conditions. Both of these relations rel

  5. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  6. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  7. An Oblivious Transfer Protocol with Log-Squared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6-computation and communication (k · log2 n + · log n), where k is a possibly non-constant security parameter. The new proto- col communication and is private in the standard complexity-theoretic model. Keywords. Computationally

  8. An Oblivious Transfer Protocol with LogSquared Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Oblivious Transfer Protocol with Log­Squared Communication Helger Lipmaa 1 Cybernetica AS, Lai 6­computation and communication #(k · log 2 n + # · log n), where k is a possibly non­constant security parameter. The new proto the same asymptotic communication and is private in the standard complexity­theoretic model. Keywords

  9. Communication-Efficient Private Protocols for Longest Common Subsequence

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark, gondree, mohassel}@cs.ucdavis.edu Abstract. We design communication efficient two-party and multi Russians" algorithmic de- sign. This result is the first improvement to the communication complex- ity

  10. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    E-Print Network [OSTI]

    Barrash, Warren

    An interactive Bayesian geostatistical inverse protocol for hydraulic tomography Michael N. Fienen April 2008; published 25 July 2008. [1] Hydraulic tomography is a powerful technique for characterizing, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose

  11. Completely positive classical structures and sequentializable quantum protocols

    E-Print Network [OSTI]

    Chris Heunen; Sergio Boixo

    2012-10-02

    We study classical structures in various categories of completely positive morphisms: on sets and relations, on cobordisms, on a free dagger compact category, and on Hilbert spaces. As an application, we prove that quantum maps with commuting Kraus operators can be sequentialized. Hence such protocols are precisely as robust under general dephasing noise when entangled as when sequential.

  12. Parallel and Concurrent Security of the HB and HB + Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ## Abstract Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB + protocol is proven secure against active computationally­intensive to be utilized. With this motivation in mind, Juels and Weis [20] --- building upon work

  13. Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate

    E-Print Network [OSTI]

    Morozov, Kirill

    . Building on their result, we extend it in two ways: 1) we construct ef- ficient passively-secure protocols-theoretic security for both parties, hence building OT as- suming noisy resources (channels or correlations channel or correlation in the case of passive cheaters. Their construction was inefficient. The OT

  14. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  15. Publickey cryptography and password protocols Shai Halevi \\Lambda

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this scenario, and show that the security of these protocols can be formally proven based on standard in situations where the client's machine does not have the means to validate the server's public key. Public devices. \\Lambda IBM T.J.Watson Research Center, PO Box 704, Yorktown Heights, New York 10598, USA Email

  16. The Accelerated Ring Protocol: Ordered Multicast for Modern Data Centers

    E-Print Network [OSTI]

    Amir, Yair

    performance in 1- Gig and 10-Gig networks. We also implemented the full protocol in the open-source Spread Toolkit and evaluated its performance relative to the previous version of the toolkit in a 1-Gig local area network, virtualized 1-Gig local area settings, and a 10-Gig local area network. The results

  17. Analysing the PGM Protocol with UPPAAL Batrice Brard Patricia Bouyer

    E-Print Network [OSTI]

    Doyen, Laurent

    the probability of negative acknowledgements (NAK) implosion and the load of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference, which turns out not to be always verified but to depend on the values of several parameters that we

  18. Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk1 , Stephan, or reuse of any copyrighted component of this work in other works. Abstract. Efficiency is the bottleneck adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting

  19. Abstraction and Implementation of a Lightweight Distributed Termination Protocol

    E-Print Network [OSTI]

    Dobson, Simon

    Abstraction and Implementation of a Lightweight Distributed Termination Protocol D.M. Goodeve , C, University of Leeds, UK Department of Computer Science, Trinity College Dublin, Eire Abstract Termination synchronisation on this state costly. Many parallel applica- tions are structured such that termination occurs

  20. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Design an anycast WSN for a wind turbine SHM application that is very energy efficient. meets reliability for turbine structural health monitoring Are composed of sensor nodes Are very resource constrained

  1. Scaling security in pairing-based protocols Michael Scott

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scaling security in pairing-based protocols Michael Scott School of Computing Dublin City potential advantage in smart-card and embedded applications ­ security can be scaled up while continuing been addressed by Koblitz and Menezes [18] and Granger, Page and Smart [15]. As will be seen our

  2. EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Durresi, Arjan

    EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks Sasanka Madiraju Cariappa in an intelligent manner. We study the concept of energy fairness in routing in Sensor Networks so as to increase to route data based on the residual energy of the nodes. This algorithm divides the network into different

  3. An Energy-Aware Simulation Model and Transaction Protocol

    E-Print Network [OSTI]

    Pedram, Massoud

    functioning in a real world environment ! We study the effects of redistributing energy on the two network ! Communication energy: power consumption for SR transmission and reception ! Data transmission energy1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution

  4. TCP over Wireless Multi-hop Protocols: Simulation and Experiments

    E-Print Network [OSTI]

    Wang, Lan

    TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive http://www.cs.ucla.edu/NRL/wireless Abstract In this study we investigate the interaction between TCP

  5. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute without the contraint of special hardware and dependency on physical medium of wireless network. BAAP and router at the same time. Most of the previous research has focused on problems of routing

  6. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    synchronised clock and the protocol is also independent of physical medium of wireless network. After the route. Typically, the nodes act as both host and router at the same time i.e each node participates in routing like a flood, tornado, hurricane or earth- quake. However, the open nature of the wireless communica

  7. Packet Drop Avoidance for High-speed network transmission protocol

    SciTech Connect (OSTI)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  8. BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects

    E-Print Network [OSTI]

    BARNARD COLLEGE Termination of a Research Protocol Involving Human Subjects Title: Principal) Study subjects: A total of _____ subjects were enrolled since the last report to the IRB. Since initial study approval on _____________ a total of _____ subjects have been enrolled in this study and ____ have

  9. ESTR -Energy Saving Token Ring Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ungerer, Theo

    of California, Irvine, USA, Phone: (949) 824-8720, email: nader@uci.edu mode. The energy cost rises enormouslyESTR - Energy Saving Token Ring Protocol for Wireless Sensor Networks Faruk Bagci, Theo Ungerer and Nader Bagherzadeh Abstract--Most wireless sensor networks rely on battery energy. In applications

  10. Interactions Among Ionospheric Propagation, HF Modems, and Data Protocols

    E-Print Network [OSTI]

    Johnson, Eric E.

    Mexico State University Abstract The well-known challenges in using the ionospheric skywave channel to Internet-style network- and ap- plication-layer protocols, which have been designed with reliable, high that will form the basis of reliable Internet operation via next-generation HF radio networks. Introduction

  11. ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson

    E-Print Network [OSTI]

    Johnson, Eric E.

    ARQ PROTOCOL FEATURES FOR HF RADIO LINKS Eric E. Johnson New Mexico State University ABSTRACT The explosion of interest in using Internet-style applica- tions over wireless links prompts investigation links with Internet-style workloads. The investigation is focused on high-frequency radio links

  12. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  15. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  16. Dynamic collision reduction protocol for ultra-wide bandwidth multiple access networks

    E-Print Network [OSTI]

    Tomezak, Gregory John, 1980-

    2004-01-01

    In this thesis, we provide a cross-layer analysis of the throughput of the dynamic collision reduction (DCR) protocol, a multiple access protocol that requires frame synchronization. At the physical-layer, we develop the ...

  17. On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan Rajkumar

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    On Predictable Operating System Protocol Processing Clifford W. Mercer, Jim Zelenka, and Ragunathan, protocol processing, resource reservation, operating systems, predictability, reservation, admission that incorporate digital audio and video require predictable response from the operating system and the network

  18. Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov and Marc Vauclair NXP Semiconductors, Leuven, Belgium, ventzislav.nikov@nxp.com, marc.vauclair@nxp.com Abstract. Distance-bounding protocols

  19. A Backup Route Aware Routing Protocol Fast Recovery from Transient Routing Failures

    E-Print Network [OSTI]

    Gao, Lixin

    in experimental studies [14], [15]. Border Gateway Protocol (BGP), a path vector protocol for interdomain routing al [4] propose a solution using pre-established protection tunnels to reroute traffic during failures

  20. Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D

    2003-01-01

    Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc

  1. Benthic Community Assessment Rapid Bioassessment Protocol: Benthic Macroinvertebrates (EPA 1989, 1999) .........................665

    E-Print Network [OSTI]

    Pitt, Robert E.

    Macroinvertebrates (EPA 1989, 1999) .........................665 Sample Collection ......................................................................................................................................690 RAPID BIOASSESSMENT PROTOCOL: BENTHIC MACROINVERTEBRATES (EPA 1989, 1999) As with the habitat is presented below. However, the Rapid Bioassessment Protocols (RBP) outlined by the U.S. EPA (EPA 1989, 1999

  2. The influence of purification protocol and pH on tomato spotted wilt virions 

    E-Print Network [OSTI]

    Shimek, Christina Marie

    1993-01-01

    particles within the final pellet, an immunosorbent electron microscopy (ISEM) assay was performed on the purified virons obtained from each of the protocols. When the pH level was varied using protocol B, the purified virions were observed without...

  3. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks 

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...

  4. 14MIB*ft* * * Kyoto Japan

    E-Print Network [OSTI]

    Sparks, Donald L.

    of molybdate and sulfate sorption/ desorption on goethite. For molybdate, a postulated reaction mechanism triple layer model (TLM) was employed to calculate the distribution of ionic species on the goethite mechanisms indicating they were operational for sulfate adsorption on goethite. Using calcu- lated ki and k

  5. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 of Nigeria 2 Republic of South Africa 2 The Republic of the Sudan 1 United Republic of Tanzania 3 Republic

  6. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    and Environmental Studies 129 127 150 161 - - 86 44 Energy Science - - 135 107 - - 14 15 Asian and African Area of Senegal 1 United Republ;ic of Tanzania 2 Republic of Tunisia 3 Federal Republic of Nigeria 2 Republic

  7. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Integrated Human Studies/ Human and Environmental Studies 127 112 140 155 - - 70 46 Energy Science - - 128 Georgia 2 Egypt 13 Sudan 3 Libya 2 Tunisia 3 Kenya 6 Tanzania 1 Democratic Republic of the Congo 2 Nigeria

  8. Kyoto University Facilities in Japan Supporting Research

    E-Print Network [OSTI]

    Takada, Shoji

    ... ...................................................... Kamitakara Earthquake Prediction Observatory, Gifu... ..................... Hodaka Sedimentation Observatory, Gifu............................................. Hokuriku Earthquake Prediction Observatory, Fukui........................... Osakayama Earthquake Prediction Observatory, Otsu, Shiga............... Abuyama Earthquake Prediction

  9. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  10. A three-pass establishment protocol for real-time multiparty communication 

    E-Print Network [OSTI]

    Yoon, Jaehee

    1996-01-01

    with a suite of simulation experiments which Compares the performance of our approach with that of other exisiting protocols....

  11. An Energy-conscious Transport Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    An Energy-conscious Transport Protocol for Multi-hop Wireless Networks Technical Report BUCS-2007 delivery requirements of applications. To meet its goal of energy efficiency, our transport protocol (1 We present a transport protocol whose goal is to reduce power consumption without compromising

  12. Implementation and evaluation of a 2 Channel MAC protocol to improve fairness in multihop networks 

    E-Print Network [OSTI]

    Shankara, Smitha

    2001-01-01

    The standard 802.11 MAC protocol, for wireless networks, is a single channel implementation. In multihop wireless networks, scenarios can arise where a single channel MAC protocol may not perform as fairly as a 2-Channel MAC protocol. By having 2...

  13. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  14. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  15. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on -Protocols (Full Version) Jos present a comprehensive spec- ification language and a certifying compiler for ZK-PoK protocols based on -protocols and composition techniques known in literature. The compiler allows the fully automatic

  16. Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks1 , Erik://weimerskirch.org/ 4 NEC Europe Ltd Dirk.Westhoff@nw.neclab.eu Abstract. Entity recognition does not ask whether presented at SAC 2003, the current paper proposes a new protocol ­ the "Jane Doe Protocol" ­, and provides

  17. Hybrid Protocol For Password-based Key Exchange in Three-party Setting

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou in modern cryptology. The critical of this approach is that designing a secure hybrid protocol and design a hybrid protocol that UC-securely realizes such task. That is, we firstly define an appropriate

  18. Cryptographic Protocol Analysis on Real C Code Jean Goubault-Larrecq

    E-Print Network [OSTI]

    Doyen, Laurent

    protocol the public-key Needham-Schroeder protocol in standard notation (right). The goal is not diverted, this should reach , who will decrypt this using his P Partially supported by the ACI jeunes chercheurs "Sécurité informatique, protocoles cryp- tographiques et détection d'intrusions" and the ACI

  19. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyán

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely ´Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  20. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  1. Detection of Design Flaws in the Android Permission Protocol through Bounded

    E-Print Network [OSTI]

    Jackson, Daniel

    Detection of Design Flaws in the Android Permission Protocol through Bounded Verification Hamid of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential

  2. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  3. Comparison of two wireless ad hoc routing protocols on a hardware test-bed

    E-Print Network [OSTI]

    Brown, Timothy X.

    Comparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare of the rout- ing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through

  4. Performance of Routing Protocols in HF Wireless Networks Eric E. Johnson*

    E-Print Network [OSTI]

    Johnson, Eric E.

    Balakrishnan* , and Zibin Tang* Klipsch School of Electrical and Computer Engineering New Mexico State and Routing Protocol (WARRP) and the Internet standard Optimized Link State Routing (OLSR) protocol (RFC-3626 in the Internet. The Optimized Link State Routing (OLSR) protocol (RFC-3626) [1] is an optimization

  5. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  6. ACM SIGCOMM -1-Computer Communication Review The Design Philosophy of the DARPA Internet Protocols

    E-Print Network [OSTI]

    Ratnasamy, Sylvia

    of ISO protocols has also been colored by the history of the Internet suite, so an understandingACM SIGCOMM -1- Computer Communication Review The Design Philosophy of the DARPA Internet Protocols (DARPA) under Contract No. N00014-83-K-0125 Abstract The Internet protocol suite, TCP/IP, was first

  7. Detection attacks on cryptographic protocols and bound randomness

    E-Print Network [OSTI]

    Antonio Acín; Daniel Cavalcanti; Elsa Passaro; Stefano Pironio; Paul Skrzypczyk

    2015-04-30

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. The derived critical detection efficiencies for security imply that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

  8. Optimal continuous variable quantum teleportation protocol for realistic settings

    E-Print Network [OSTI]

    F. S. Luiz; Gustavo Rigolin

    2015-02-04

    We show the optimal setup that allows Alice to teleport coherent states to Bob giving the greatest fidelity (efficiency) when one takes into account two realistic assumptions. The first one says that in any actual implementation of the continuous variable teleportation protocol (CVTP) Alice and Bob necessarily share non-maximally entangled states (two-mode finitely squeezed states). The second one assumes that Alice's pool of possible coherent states to be teleported to Bob does not cover the whole complex plane. The optimal strategy is achieved by tuning three parameters in the original CVTP, namely, the beam splitter transmittance and the displacements in position and momentum implemented on the teleported state. These slight changes in the protocol are currently easy to be implemented and, as we show, give considerable gain in perfomance for a variety of possible pool of input states with Alice.

  9. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  10. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Martí Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  11. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  12. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  13. A design protocol for tailoring ice-templated scaffold structure

    E-Print Network [OSTI]

    Pawelec, K. A.; Husmann, A.; Best, Serena Michelle; Cameron, Ruth Elizabeth

    2014-03-06

    engineering scaffolds are isotropic [2, 15]. As re- generative medicine begins to make strides, tissue engineering scaffolds are needed which are large enough to span critical sized defects, often larger than 10 mm in every direction. Thus, literature focusing... with isotropic scaffolds larger than 10 mm in all directions, regardless of the processing: set freezing protocol, slurry composition, filling height, or mold design. A universal link should prove a powerful tool to predict scaffold structure from the freezing...

  14. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Develops Student-StakeholdersProtocol for Addressing Induced Seismicity

  15. Superior Energy Performance Certification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department of EnergySummary:Performance Certification Protocol

  16. Protocol, Appraisal Process Guide - April 2008 | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget || Department of EnergyNo.Implementation ofProtocol,

  17. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  18. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  19. Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place on stable surface. 2. Remove plants/ structure. Let debris settle out of water for a few minutes. 3. Count

  20. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht, C. Metzger; Wilson, E.; Horowitz, S.

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program’s goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  1. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  2. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  3. Verifying a Simplified Fuel Oil Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, Hugh; Dentz, Jordan; Doty, Chris

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  4. BLM - State Protocol Agreement with Nevada | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNState Protocol Agreement

  5. Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View New PagesInformation Regional Inventory Protocol (GRIP) Website

  6. ESPC ENABLE Measurement and Verification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based|DepartmentStatementofApril 25, 2014 ERI-2142.17-1401/AprilDraftProtocol

  7. Supplement No. 2 to the FUSRAP Summary Protocol - Verification and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority forPerk |DepartmentProtocol | Department

  8. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  9. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  10. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  11. The Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Metzger, C.; Norton, Paul

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every four years, the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the "average occupant" in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  12. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  13. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  14. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Supersedes DOE O 142.2. Admin Chg 1, dated 6-27-13, Supersedes DOE O 142.1A. Certified 12-3-14.

  15. Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics

    E-Print Network [OSTI]

    Stewart, Frank J.

    Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

  16. A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes

    Broader source: Energy.gov [DOE]

    Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

  17. Reply to "Comment on 'Quantum search protocol for an atomic array' " 

    E-Print Network [OSTI]

    Scully, Marlan O.; Zubairy, M. Suhail.

    2002-01-01

    Our quantum search protocol indicates that entanglement is not required for rootN speedup. We also reemphasize the quantum error correction mechanism in our scheme....

  18. Development of fan diagnostics methods and protocols for short term monitoring

    E-Print Network [OSTI]

    Webster, T; Barth, A

    2003-01-01

    Nexant California Energy Commission Total Site Energy & Costenergy and cost savings derived from the application of these protocols to the California

  19. 4. The Bounded Re-transmission Protocol Jean-Raymond Abrial

    E-Print Network [OSTI]

    Southampton, University of

    on the Receiver's site. FUN 8 #12;Pseudo-code for the Protocol 11 Acknowledgment Channel RCV_rcv RCV_snd Data

  20. Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  1. Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  2. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6...

    Broader source: Energy.gov (indexed) [DOE]

    H-35 DOE-H- Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information Technology (July 2011) Prescription: Use as appropriate. Consider using in solicitations...

  3. An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen

    E-Print Network [OSTI]

    Sen, Sandip

    An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha

  4. Postdoctoral Fellowship Fukui Institute for Fundamental Chemistry, Kyoto University, Kyoto, Japan

    E-Print Network [OSTI]

    Sano, Masaki

    Artificial Photosynthesis Ryoichi Yamamoto Soft Matters, Complex Fluids Shoji Takada Theoretical Biophysics

  5. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

  6. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  7. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  8. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  9. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  10. Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR

    SciTech Connect (OSTI)

    Bernal, SM

    2004-10-11

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated Luminescence Dosimetry'') for this research, ORNL's Standards-Based Management System or any other official guidelines.

  11. IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

    E-Print Network [OSTI]

    Miles, Will

    IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks Hala El on wireless networks is calling for the development of a protocol that is both TCP-friendly and capable of conforming to the constraints of wireless networks. This paper presents IFTP-W, an end-to-end congestion

  12. A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Sahoo, Anirudha

    A MAC-aware Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks Sandip Dalvi in WSN such as battery power and memory. In this paper, we propose a transport protocol which provides based on their residual energies and average MAC layer data rate. The event rate distribution happens

  13. JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks (Technical Report BUCS the energy gains of JTP over one-size-fits-all transport protocols. I. INTRODUCTION Motivation and Scope physical to transport [8], [9]. JAVeLEN's design ensures that energy gains obtained in one layer would

  14. Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor within a virtual grid. The proposed approach, termed location-aided flooding (LAF), achieves energy--Communication protocol, location, energy management, information dissemination, flooding. ć 1 INTRODUCTION ADVANCES

  15. CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ravindran, Binoy

    CFlood: A Constrained Flooding Protocol for Real-Time Data Delivery in Wireless Sensor Networks Bo networks. We present a constrained flooding protocol, called CFlood that enhances the deadline satisfaction-time perfor- mance by flooding, but effectively constrains energy consumption by controlling the scale

  16. A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards March 12, 2012 Helger Lipmaa Institute of Computer Science, University of Tartu, Estonia Abstract. We propose a simple cast, is significantly more secure (in the sense of "cast-as-intended") and convenient to use than the e-voting protocol

  17. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  18. Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development

    E-Print Network [OSTI]

    Borissova, Daniela

    3 0 Application of Wireless Protocols Bluetooth and ZigBee in Telemetry System Development Rumiana). The next items present a general description and application of the newest wireless protocols ­ ZigBee PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 55 . 2005 . Sofia #12;3 1 ZigBee 802.15.4; Ultra Wide

  19. Declarative Transport No more transport protocols to design, only policies to specify #

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify # Karim ABSTRACT Transport protocols are an integral part of the inter­process communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  20. Declarative Transport No more transport protocols to design, only policies to specify

    E-Print Network [OSTI]

    Declarative Transport No more transport protocols to design, only policies to specify Karim Mattar Transport protocols are an integral part of the inter-process communication (IPC) service used on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true

  1. Mobile Agent Based Advanced Service Architecture for H.323 Internet Protocol

    E-Print Network [OSTI]

    architecture addresses the full management life-cycle of advanced services, from open third party creationMobile Agent Based Advanced Service Architecture for H.323 Internet Protocol Telephony by Jingrong Advanced Service Architecture for H.323 Internet Protocol Telephony" submitted by Jingrong Tang, B

  2. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    Ă?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

  3. T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells

    E-Print Network [OSTI]

    Lamond, Angus I.

    T. Ly, Lamond Lab protocol Centrifugal Elutriation of NB4 Cells This protocol uses centrifugal the centrifuge at 1000 rpm to remove bubbles trapped in the elutriation chamber. Stop centrifuge and flow rate centrifuge at 1800 rpm. 6. Set FS to 102. 7. If the back pressure increases above 5 psi, stop centrifuge

  4. Next Generation BotNet Protocol Analysis Felix S. Leder and Peter Martini

    E-Print Network [OSTI]

    Clausen, Michael

    The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards. For commonly used protocols like IRC and HTTP, there is a wide range of automated analysis and monitoring tools botnets are sticking to traditional IRC communication [22] but more and more botnets are moving towards

  5. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  6. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  7. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  8. Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp in EAXprime [5], an AE block cipher mode derived from EAX [8], standardized as ANSI C12.22-2008 for Smart Grid scheme, which is deployed in the Open Smart Grid Protocol (OSGP) [15]. The latter is an application layer

  9. ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor

    E-Print Network [OSTI]

    New South Wales, University of

    ERTP: Energy-Efficient and Reliable Transport Protocol for Data Streaming in Wireless Sensor and Engineering The University of New South Wales Sydney 2052, Australia #12;Abstract Emerging data streaming applications in Wireless Sensor Networks require re- liable and energy-efficient transport protocols [17] [18

  10. Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud that the protocol can not provide secure data storage for users. Key words: Cloud Computing, public auditing, secure it brings, Cloud Computing has introduced some new security threats and challenges. If we could not solve

  11. On Security Models and Compilers for Group Key Exchange Protocols (Full version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security Models and Compilers for Group Key Exchange Protocols (Full version) Emmanuel Bresson1-known generic solutions (compilers) for AKE- and MA-security of GKE pro- tocols proposed based compiler which provides AKE- and MA-security for any GKE protocol, under standard cryptographic assumptions

  12. On a Rate Control Protocol for Networked Estimation Vaibhav Katewa , Vijay Gupta

    E-Print Network [OSTI]

    Gupta, Vijay

    On a Rate Control Protocol for Networked Estimation Vaibhav Katewa , Vijay Gupta Department. A stochastic rate control protocol is developed using the network utility maximization (NUM) framework. The presence of estimation costs poses new challenges; however, for low congestion levels, the form of rate

  13. EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Wallach, Dan

    EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks Lei Tang ACM 978-1-4503-0722-2 ...$5.00. 1. INTRODUCTION Energy efficiency is crucial in wireless sensor networks. To this end, many energy-efficient wireless MAC protocols (e.g., [3, 6, 20­22]) have been

  14. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  15. Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior

    E-Print Network [OSTI]

    Ravindran, Binoy

    Utility Accrual Real-Time Resource Access Protocols with Assured Individual Activity Timeliness Behavior Abstract We present a class of utility accrual resource access protocols for real-time embedded systems. The proto- cols consider application activities that are subject to time/utility function time

  16. Wetlands Regional Monitoring Program Plan 2002 Part 2: Data Collection Protocols Sediment Contaminants

    E-Print Network [OSTI]

    Wetlands Regional Monitoring Program Plan 2002 Part 2: Data Collection Protocols Sediment Contaminants WRMP Version 1 June 2002 1 Data Collection Protocol Tidal Wetland Sediment Contamination Joshua N Concerns about intertidal sediment contamination are increasing in the Bay Area. There is concern

  17. An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Zhuang, Weihua

    1 An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Abstract--Energy efficiency is an important performance mea- sure of wireless network protocols, especially for battery-powered mobile devices such as smartphones. This paper presents a new energy-efficient medium

  18. Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed

  19. HUMANITIES CONFERENCE ROOMS A. Protocol for the Divisional-Assigned Conference Rooms

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    HUMANITIES CONFERENCE ROOMS A. Protocol for the Divisional-Assigned Conference Rooms B. Policies & Procedures Governing Humanities Conference Rooms C. Room Descriptions D. Detailed Reservation Instructions and Form A. Protocol for the Divisional-Assigned Conference Rooms: Humanities 1: Rooms 202, 210, 402, 408

  20. 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET

  1. When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol Changyu Dong1 to scale up smoothly when data being protected is big. Efficiency and scalability become critical criteria for privacy preserving protocols in the age of Big Data. In this paper, we present a new Private Set

  2. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  3. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  4. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  5. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  6. BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Braun, Torsten

    BEAM: A Burst-Aware Energy-Efficient Adaptive MAC Protocol for Wireless Sensor Networks Markus for supporting hop-to-hop reliability, lowering the overall energy expenditures of the network for end-to-end transmissions. The protocol itself is IEEE 802.15.4 conform and can easily be used for energy-efficient TCP

  7. A Methodology to Evaluate Demand Response Communication Protocols for the Smart Grid

    E-Print Network [OSTI]

    Tronci, Enrico

    A Methodology to Evaluate Demand Response Communication Protocols for the Smart Grid Emad Ebeid between the consumer and the grid operator. Currently, there exist many evaluations of demand response of demand response protocols for the Smart Grid in combination with a demand response strategy

  8. A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords Junghyun Nam Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do 440-746, Republic of Korea Abstract Recently, Sun, Chen. In this paper, we show that both of Sun-Chen-Hwang's protocols are insecure against an active adversary who can

  9. Non-Monotonic-Offers Bargaining Protocol PINATA WINOTO piw410@mail.usask.ca

    E-Print Network [OSTI]

    Vassileva, Julita

    Non-Monotonic-Offers Bargaining Protocol PINATA WINOTO piw410@mail.usask.ca Department of Computer, Canada Abstract. This paper concerns the strengths and weaknesses of non-monotonic-offers in alternating-offer bargaining protocols. It is commonly assumed that bargainers submit monotonic offers over time corre

  10. RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols

    E-Print Network [OSTI]

    Neves, Nuno

    RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

  11. RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols

    E-Print Network [OSTI]

    Neves, Nuno

    RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

  12. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  13. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  14. A Modular Action Description Language for Protocol Composition Nirmit Desai and Munindar P. Singh

    E-Print Network [OSTI]

    A Modular Action Description Language for Protocol Composition Nirmit Desai and Munindar P. Singh Department of Computer Science North Carolina State University Raleigh, NC 27695-8206, USA {nvdesai, singh). Chopra and Singh (2006) show how to express protocols in C+. MAD-P enhances Chopra and Singh's approach

  15. Semantics and Verification of Information-Based Protocols Munindar P. Singh

    E-Print Network [OSTI]

    Semantics and Verification of Information-Based Protocols Munindar P. Singh Department of Computer Science North Carolina State University Raleigh, NC 27695-8206, USA singh@ncsu.edu ABSTRACT Information protocols, agent communication 1. INTRODUCTION We take as our point of departure Singh's [13] recent work

  16. Failure recovery for structured p2p networks: Protocol design and performance under churn q

    E-Print Network [OSTI]

    Lam, Simon S.

    Failure recovery for structured p2p networks: Protocol design and performance under churn q Simon S,000 s of simulated time. In each such ``churn'' experiment, we took a ``snapshot'' of neighbor tables in the network of the churn rate, timeout value in failure recovery, and K. We found our protocols to be effective, efficient

  17. Internet Protocol version 6 Overview* Albert Cabellos-Aparicio, Jordi Domingo-Pascual

    E-Print Network [OSTI]

    Politècnica de Catalunya, Universitat

    Internet Protocol version 6 Overview* Albert Cabellos-Aparicio, Jordi Domingo-Pascual Departament d stands for "Internet Protocol" and it was designed during the `70s with the purpose of interconnecting heterogeneous network technologies. IP was a huge success, and made it possible to create today's Internet

  18. Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks

    E-Print Network [OSTI]

    California at Berkeley, University of

    1 Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks Stephen Dawson instances of point-to-point traffic. We present Hydro, a hybrid routing protocol that combines local agility. Evaluations across testbeds and deployments demonstrate the performance and functionality of Hydro across

  19. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  20. The past, present and future of protocol checking with CSP and FDR

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 The past, present and future of protocol checking with CSP and FDR Bill Roscoe1 Oxford of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe's discovery the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols

  1. Towards a Wireless Building Management System Requiring no Change to Upper-layer Protocols

    E-Print Network [OSTI]

    Wang, Dan

    communications to support transmission, design protocols for sensor networking and conduct application that converts existing wired sensor network into wireless without changing upper layer protocols decent understanding on the design within a wireless sensor network, e.g., OS, programming languages

  2. Structural Weaknesses in the Open Smart Grid Protocol Klaus Kursawe Christiane Peters

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Structural Weaknesses in the Open Smart Grid Protocol Klaus Kursawe Christiane Peters European The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in large-scale Smart, a smart meter can also give input to grid control algorithms, be used for electricity markets, communicate

  3. A History of the Improvement of Internet Protocols Over Satellites Using ACTS \\Lambda

    E-Print Network [OSTI]

    Kruse, Hans

    A History of the Improvement of Internet Protocols Over Satellites Using ACTS \\Lambda Mark Allman of ACTS experiments on the efficacy of using standard Internet pro­ tocols over long­delay satellite­delay networks with non­zero bit­error rates on the performance of the suite of Internet protocols. In par

  4. A History of the Improvement of Internet Protocols Over Satellites Mark Allman

    E-Print Network [OSTI]

    Kruse, Hans

    A History of the Improvement of Internet Protocols Over Satellites Using ACTS Mark Allman NASA GRC on the efficacy of using standard Internet pro- tocols over long-delay satellite channels. These experi- ments-error rates on the performance of the suite of Internet protocols. In par- ticular, we have focused

  5. EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.

    SciTech Connect (OSTI)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.); Marathe, A. (Achla)

    2001-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.

  6. Quantum Brachistochrone Curves as Geodesics: Obtaining Accurate Minimum-Time Protocols for the Control of Quantum Systems

    E-Print Network [OSTI]

    Wang, Xiaoting

    Most methods of optimal control cannot obtain accurate time-optimal protocols. The quantum brachistochrone equation is an exception, and has the potential to provide accurate time-optimal protocols for a wide range of ...

  7. Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL 

    E-Print Network [OSTI]

    Steel, G.; Maidl, M.; Bundy, Alan

    We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...

  8. A preference-based extension for the scalable consensus-based bandwidth allocation protocol in a multicast video conference environment 

    E-Print Network [OSTI]

    Christensen, Eric Joseph

    2000-01-01

    This thesis develops a protocol extension, the Preference-based Allocation eXtension for Layered Sources (PAXLS), to complement the existing Scalable ConsensUs based Bandwidth Allocation (SCUBA) protocol used in allocation ...

  9. Protocol number: ###### Protocol date: ##/##/####

    E-Print Network [OSTI]

    Casagrandi, Renato

    /07/2012 PROBLEMS 072648 TECNOLOGIES OF AERONAUTICS CONTROL 7.50 26 26/06/2012 SYSTEMS 072652 DYNAMIC MODELS

  10. nature protocols | VOL.5 NO.3 | 2010 | 395 puorGgnihsilbuPerutaN0102natureprotocols/moc.erutan.www//:ptth

    E-Print Network [OSTI]

    Yanik, Mehmet Fatih

    ,is then described.The protocol then details the installation of a periscope to raise the beam from the table

  11. Monitoring protocol for Gas Research Institute natural gas vehicle field test projects. Topical report, March-October 1991

    SciTech Connect (OSTI)

    Londos, T.C.; Agan, D.D.

    1991-10-01

    In order to ensure the consistency and comparability of natural gas vehicle (NGV) operation and performance data, a data collection protocol was developed. Recommendations were also made for emission testing of NGVs. The protocol utilizes an online database management and reporting system for timely dissemination of data to interested parties within industry and government. Further evaluation and testing of the protocol will be completed before final documentation of the protocol.

  12. A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    master keys essentially transforms an arbitrary secure pre-master key agreement protocol into a secure master-key agreement protocol. Similarly, the transforma- tion used to derive application keys works when applied to an arbitrary secure master-key agreement protocol. These results are in the random oracle model

  13. Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim

    E-Print Network [OSTI]

    Lee, Ben

    Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

  14. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 2, APRIL 2011 561 Energy-Efficient Protocol for Cooperative Networks

    E-Print Network [OSTI]

    Haas, Zygmunt J.

    placement our cooperative protocol can save up to 40% in energy consumption relative to the other protocols. The reduction in error rate and the energy savings translate into increased lifetime of cooperative sensor networks. Index Terms--Clustering, cooperative networks energy-efficient protocols, cooperative

  15. Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik

    E-Print Network [OSTI]

    Holliday, JoAnne

    Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday power control protocols have been proposed to address the limited power supplies in ad hoc networks. Recent protocols suggest varying the transmission power such that the RTS/CTS handshake is done

  16. This paper reevaluates the multicast protocols for MANETs in terms of energy efficiency and proposes a new

    E-Print Network [OSTI]

    Lee, Ben

    Abstract This paper reevaluates the multicast protocols for MANETs in terms of energy efficiency energy efficient than multicast meshes. This is because mesh-based protocols depend on broadcast flooding, to improve energy efficiency compared to the mesh-based protocols and to offer a better energy balance

  17. Visibility: A New Metric For Protocol Design Megan Wachs, Jung Il Choi, Jung Woo Lee, Kannan Srinivasan,

    E-Print Network [OSTI]

    Levis, Philip

    - bility metric to evaluate and compare protocols, where visi- bility is defined as the energy cost, to increase its visibility and efficiency. 1 Introduction Traditional metrics for sensornet protocol design in network protocols, in order to isolate the causes of failure and address them. If we could trace all

  18. Browser Models for Usable Authentication Protocols Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi and Jorg Schwenk

    E-Print Network [OSTI]

    Manulis, Mark

    -based protocols requires security models that take into account (i) the protocol definition, (ii) Web 2.0 In this paper we argue that the deployment of browser-based protocols that make use of Web 2.0 technologies Web 2.0 refers to a perceived second generation of web-based services that emphasize online

  19. AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS

    E-Print Network [OSTI]

    Shang, Li

    AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS Li, Princeton, NJ 08544, USA ABSTRACT In this paper, we present a new economics-based power- aware protocol, called the distributed economic subcontracting protocol (DESP), that dynamically distributes task

  20. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  1. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  2. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    SciTech Connect (OSTI)

    Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

    2012-06-18

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  3. Bildspektroskopie und Bildspektrometrie Vorlesung Satellitenfernerkundung

    E-Print Network [OSTI]

    Giger, Christine

    Energy Carbon Storage Soil Moisture Soil Temperature H O2 CO2 ·· Kyoto ProtocolKyoto Protocol ·· SPECTRA spectrometry ... is the engineering task and science of making the hyperspectral data available, e.g defining Cycle and Land Surface Processes Carbon & Nutrients Slow process: seasonal or longer Fast process: hour

  4. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol, and environmental effects. In turn, the greenhouse gas and atmospheric aerosol assumptions underlying climate://mit.edu/globalchange/ Printed on recycled paper #12;Russia's Role in the Kyoto Protocol A. Bernarda , S. Paltsevb , J. Reillyb

  5. UNIVERSITY OF TORONTO Faculty of Law

    E-Print Network [OSTI]

    potential impacts3 , concerns over climate change led to the Kyoto Protocol to the United Nations Framework with the climate system.'5 The Parties to the Kyoto Protocol agree to collectively reduce greenhouse gas emissions' in Grainne de Burca and Joanne Scott, eds., The EU and the WTO: Legal and Constitutional Issues (Oxford: Hart

  6. A DECISION MATRIX APPROACH TO EVALUATING THE IMPACTS OF LAND-USE ACTIVITIES UNDERTAKEN TO MITIGATE

    E-Print Network [OSTI]

    Kueppers, Lara M.

    CLIMATE CHANGE An Editorial Essay LARA M. KUEPPERS1, PAUL BAER2, JOHN HARTE1, 2, BARBARA HAYA2, LAURA E and Marrakech agreements on implementation of the Kyoto Protocol. However some still fear that land-use projects under the Kyoto Protocol, decisions at the last several meetings of the Confer- ence of the Parties (COP

  7. A lightweight transport protocol for multi-resolution and real-time multimedia communications over heterogenous networks 

    E-Print Network [OSTI]

    Cheng, Sheng-Te

    1995-01-01

    ) REQUIREMENTS AND A LIGHTWEIGHT TRANSPORT PROTOCOL (LWTP) A. QOS Requirements 1. Low Delay 2. Low Jitter 3. Adequate Bandwidth 4. Media Synchronization 5. Reliability B. Lightweight Transport Protocol (LWTP) and QOS (Qual- ity of Service) 1. Why... Lightweight Transport Protocols 2. Previous LWTP Research C. An Overview of RTP (Real-time Transport Protocol) 1. The RTP Headers 2. RTP Header Extension 3. RTP Control Protocol (RTCP) 12 13 13 17 18 19 19 20 21 22 23 24 24 24 III THE LWTP...

  8. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  9. October 11, 2006 Formal Modeling and Analysis of the Modbus Protocol

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and distributed control ap- plications. This report systems --sometimes called SCADA systems-- have been used for many years in manufacturing, transport

  10. COLLABORATIVE DEVELOPMENT OF AUTOMATED ADVANCED INTEROPERABILITY CERTIFICATION TEST PROTOCOLS FOR PV SMART GRID INTEGRATION

    E-Print Network [OSTI]

    renewable energy sources are connected to the electric power system, the ability of grid operators inverters and energy storage systems (ESS), have the ability to assist grid operators control feederCOLLABORATIVE DEVELOPMENT OF AUTOMATED ADVANCED INTEROPERABILITY CERTIFICATION TEST PROTOCOLS

  11. Protocol for the fabrication of enzymatically crosslinked gelatin microchannels for microfluidic

    E-Print Network [OSTI]

    Beebe, David J.

    Protocol for the fabrication of enzymatically crosslinked gelatin microchannels for microfluidic.256 We have developed a technique for fabricating microfluidic devices from gelatin using a natural, gelatin can be molded into microchannel geometries. The gelatin is crosslinked with the naturally

  12. Implementation of two-party protocols in the noisy-storage model

    SciTech Connect (OSTI)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-15

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  13. Bounds on the leakage of the input's distribution in information-hiding protocols

    E-Print Network [OSTI]

    Palamidessi, Catuscia

    and the observables. This is the case, for example, of many anonymity protocols, such as Crowds [22], Onion Routing [27], Tor [13], Tarzan [14], Mix-Nets [7], DC Nets [6], etc. A common framework for studying

  14. Computing Augmented Finite Transition Systems to Synthesize Switching Protocols for Polynomial Switched Systems

    E-Print Network [OSTI]

    Ozay, Necmiye

    Computing Augmented Finite Transition Systems to Synthesize Switching Protocols for Polynomial algorithms to compute abstractions for polynomial switched systems. Moreover, we define a refinement relation Switched Systems Necmiye Ozay, Jun Liu, Pavithra Prabhakar, and Richard M. Murray Abstract-- This work

  15. New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New attacks on ISO key establishment protocols Anish Mathuria and G. Sriram DA-IICT Near Indroda Circle Gandhinagar-382007 INDIA anish mathuria@daiict.ac.in, g.sriram.248@gmail.com July 29, 2008

  16. Enhancing the expressivity and automation of an interactive theorem prover in order to verify multicast protocols 

    E-Print Network [OSTI]

    Ridge, Thomas

    This thesis was motivated by a case study involving the formalisation of arguments that simplify the verification of tree-oriented multicast protocols. As well as covering the case study itself, it discusses our solution ...

  17. Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems

    E-Print Network [OSTI]

    Stankovic, John A.

    Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems Chanjung Park constraints and security requirements, a new method, called the freezing method, is proposed. In order to show

  18. An enhanced algorithm for protocol conformance test sequence generation based on the UIO method 

    E-Print Network [OSTI]

    Allada, Ravindra

    1993-01-01

    An Enhanced Algorithm for Protocol Conformance Test Sequence Generation Based on the UIO Method. (December 1993) Ravindra Allada, B.E., Osmania University, Hyderabad, India Chair of Advisory Committee: Dr. Hosame Abu-Amara ...

  19. Asymptotic Throughput of the FED-STD-1052 Data Link Protocol Eric E. Johnson

    E-Print Network [OSTI]

    Johnson, Eric E.

    Asymptotic Throughput of the FED-STD-1052 Data Link Protocol Eric E. Johnson New Mexico State. · Diurnal and seasonal variations in usable channels from hour to hour and day to day. · Solar cycle effects

  20. Some Notes on the History of Protocol Engineering Gregor v. Bochmann1

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Some Notes on the History of Protocol Engineering Gregor v. Bochmann1 , Dave Rayner2 and Colin H Technology and Engineering (SITE) at the University of Ottawa, Canada. 2 Dave Rayner rayner

  1. Fish Community Assessment Rapid Bioassessment Protocol V --Fish (EPA 1989, 1999).......................................................693

    E-Print Network [OSTI]

    Pitt, Robert E.

    , 1999).......................................................693 Sample Processing ......................................................................................................................................707 RAPID BIOASSESSMENT PROTOCOL V -- FISH (EPA 1989, 1999) The following are excerpts from U.S. EPA (1989, 1999; www.epa.gov/owow/monitoring/rbp) guidance manuals. For more extensive information

  2. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  3. Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications

    E-Print Network [OSTI]

    semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications

  4. The DYMO Routing Protocol in VANET Scenarios Christoph Sommer and Falko Dressler

    E-Print Network [OSTI]

    Breu, Ruth

    The DYMO Routing Protocol in VANET Scenarios Christoph Sommer and Falko Dressler Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany {christoph.sommer

  5. The role of social factors in a dyadic training protocol: implications for computer-based instruction 

    E-Print Network [OSTI]

    Tubre, Travis Charles

    1997-01-01

    was unobtrusively recorded while participants performed the task. Within the dyadic protocol, extroverts and low-interaction-anxiety participants engaged in more communication than introverts and high-interaction-anxiety participants. Task-related communication...

  6. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.pettai@ut.ee, peeter.laud@cyber.ee Abstract We describe an automatic analysis to check secure multiparty computation

  7. A dyadic protocol for training complex skills: a replication using female participants 

    E-Print Network [OSTI]

    Sanchez-Ku, Maria Luisa

    1999-01-01

    The effectiveness and efficiency of the active interlocked modeling (AIM) dyadic protocol in training complex skills has been extensively demonstrated (e.g., Arthur, Day, Bennett, McNelly, & Jordan, 1997., Shebilske, Regian, Arthur, & Jordan, 1992...

  8. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based rout- ing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more equitable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effective- ness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  9. Ontario’s Protocols for Evaluating the Energy and Bill Savings from Industrial Energy Efficiency Programs 

    E-Print Network [OSTI]

    Messenger, M.

    2007-01-01

    of the monitoring process. 22 International Performance Measurement and Verification Protocol Committee, Volume 1 Concepts and Options for Determining Energy and Water Savings : IPMVP Protocol series Revised.... 3 ASHRAE, Measurement of Energy and Demand Savings:ASHRAE guideline 14-2002 ( published in June of 2002) See chapter 6, Specific Approaches and IPMVP, Ibid, Volume 1 , Chapter 3, Basic Concepts Key Issue 3- Ensuring that the value...

  10. TEEX tackles toxins: TEEX develops ECLOX protocols to detect toxins in drinking water 

    E-Print Network [OSTI]

    Jordan, Leslie

    2010-01-01

    by Leslie Jordan tx H2O | pg. 8 Thanks to the Texas Engineering Extension Service (TEEX), utilities personnel across Texas can monitor water safety and quality using a highly effective machine? ECLOX?that was once shelved and forgotten because... completing the joint project with TCEQ in which TEEX developed the specific ECLOX protocols, TEEX is now known for its expertise in ECLOX baseline data develop- ment, protocols, and training. McLeroy conducted a custom- ized, one-day ECLOX training...

  11. Measurement and verification protocols -- Facts and fiction, news from the field

    SciTech Connect (OSTI)

    Schiller, S.R.; Kromer, J.S.

    1998-07-01

    This paper provides descriptions of the 1997 International Performance Measurement and Verification Protocol (IPMVP), the 1996 Federal Energy Management Program's (FEMP) Measurement Verification Guidelines, and the draft ASHRAE 13-P Measurement of Energy and Demand Savings Guideline. These protocols and guidelines are establishing a framework for measurement and verification (M and V) activities throughout the world. The M and V protocols are also being used by the energy performance contracting industry as an educational tool and as the starting point for program specific M and V guidelines. Beyond descriptions of the documents the paper covers how the documents are being sued and the perspective of various user groups--such as government entities, utilities, private companies, and energy services companies. The protocols were designed around four main M and V options to allow flexibility in their application to different types of projects. However, this intentional flexibility has caused confusion among some users who are now required to select the appropriate option, method, level or rigor, and accuracy for their projects. Eventually though, as the protocols are more widely used and more documentation is available on M and V costs and accuracy the industry will become more comfortable selecting the best option and applying the M and V protocols in a more consistent manner for different types of projects and programs.

  12. Software Testing: Protocol Comparison James Yen, David Banks, P. Black, L. J. Gallagher, C. R. Hagwood, R. N. Kacker, and L.

    E-Print Network [OSTI]

    Black, Paul E.

    Software Testing: Protocol Comparison James Yen, David Banks, P. Black, L. J. Gallagher, C. R 20899 USA March 28, 1998 Abstract: Software testing is hard, expensive, and uncertain. Many protocols to choose the best protocol for a given application. 1 #12;Software Testing: Protocol Comparison 1 Software

  13. Quantum Error Correcting Codes and the Security Proof of the BB84 Protocol

    E-Print Network [OSTI]

    Ramesh Bhandari

    2014-08-30

    We describe the popular BB84 protocol and critically examine its security proof as presented by Shor and Preskill. The proof requires the use of quantum error correcting codes called the Calderbank-Shor-Steanne (CSS) quantum codes. These quantum codes are constructed in the quantum domain from two suitable classical linear codes, one used to correct for bit-flip errors and the other for phase-flip errors. Consequently, as a prelude to the security proof, the report reviews the essential properties of linear codes, especially the concept of cosets, before building the quantum codes that are utilized in the proof. The proof considers a security entanglement-based protocol, which is subsequently reduced to a "Prepare and Measure" protocol similar in structure to the BB84 protocol, thus establishing the security of the BB84 protocol. The proof, however, is not without assumptions, which are also enumerated. The treatment throughout is pedagogical, and this report, therefore, serves a useful tutorial for researchers, practitioners, and students, new to the field of quantum information science, in particular, quantum cryptography, as it develops the proof in a systematic manner, starting from the properties of linear codes, and then advancing to the quantum error correcting codes, which are critical to the understanding of the security proof.

  14. Application of the NREL Test-to-Failure Protocol for PV Modules

    SciTech Connect (OSTI)

    Hacke, P.; Osterwald, C.; Trudell, D.; Terwilliger, K.; Bosco, N.; Oelak, E.; Kurtz, S.

    2011-02-01

    Initial results of application of the NREL Test-to-Failure Protocol are presented and discussed. Six commercially available multicrystalline Si-cell flat-plate modules were subjected to the protocol with controls. The samples were divided among three test sequences, (1) 1000 hours of 85C/85% relative humidity with positive or negative 600 V bias to the active layers with respect to the grounded frame, (2) -40/85C thermal cycling with electrical load at the rated module power, and (3) an alternating sequence between tests (1) and (2). Application of the protocol manifested in the acceleration of degradation mechanisms seen in the field including backsheet delamination, corrosion, bubble formation within the laminate, discoloration of the antireflective coating, and localized heating with degradation of the backsheet as a result of moisture ingress, corrosion, and concentrated current flow. Significant differences in performance after one round of the protocol are seen in damp heat depending on the polarity of the bias applied to the active layer (the short-circuited power leads of the module). The protocol is found to successfully accelerate module degradation mechanisms that have been observed in the field and will help to differentiate the performance and reliability of various module technologies.

  15. Behavior Protocols: Fighting the "Spearhead" Problem* Charles University Prague, Faculty of Mathematics and Physics, Prague, Czech Republic.

    E-Print Network [OSTI]

    Behavior Protocols: Fighting the "Spearhead" Problem* J. Kofro Charles University Prague, Faculty: Fighting the "Spearhead" Problem approximate information about states, and (iii) use a symbolic state space

  16. OpenWeather: a peer-to-peer weather data transmission protocol

    E-Print Network [OSTI]

    Yanes, Adrian

    2011-01-01

    The study of the weather is performed using instruments termed weather stations. These weather stations are distributed around the world, collecting the data from the different phenomena. Several weather organizations have been deploying thousands of these instruments, creating big networks to collect weather data. These instruments are collecting the weather data and delivering it for later processing in the collections points. Nevertheless, all the methodologies used to transmit the weather data are based in protocols non adapted for this purpose. Thus, the weather stations are limited by the data formats and protocols used in them, not taking advantage of the real-time data available on them. We research the weather instruments, their technology and their network capabilities, in order to provide a solution for the mentioned problem. OpenWeather is the protocol proposed to provide a more optimum and reliable way to transmit the weather data. We evaluate the environmental factors, such as location or bandwi...

  17. Development of a dynamic quality assurance testing protocol for multisite clinical trial DCE-CT accreditation

    SciTech Connect (OSTI)

    Driscoll, B.; Keller, H.; Jaffray, D.; Coolens, C.; Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2; Techna Institute, University Health Network, 124-100 College Street, Toronto, Ontario M5G 1L5

    2013-08-15

    Purpose: Credentialing can have an impact on whether or not a clinical trial produces useful quality data that is comparable between various institutions and scanners. With the recent increase of dynamic contrast enhanced-computed tomography (DCE-CT) usage as a companion biomarker in clinical trials, effective quality assurance, and control methods are required to ensure there is minimal deviation in the results between different scanners and protocols at various institutions. This paper attempts to address this problem by utilizing a dynamic flow imaging phantom to develop and evaluate a DCE-CT quality assurance (QA) protocol.Methods: A previously designed flow phantom, capable of producing predictable and reproducible time concentration curves from contrast injection was fully validated and then utilized to design a DCE-CT QA protocol. The QA protocol involved a set of quantitative metrics including injected and total mass error, as well as goodness of fit comparison to the known truth concentration curves. An additional region of interest (ROI) sensitivity analysis was also developed to provide additional details on intrascanner variability and determine appropriate ROI sizes for quantitative analysis. Both the QA protocol and ROI sensitivity analysis were utilized to test variations in DCE-CT results using different imaging parameters (tube voltage and current) as well as alternate reconstruction methods and imaging techniques. The developed QA protocol and ROI sensitivity analysis was then applied at three institutions that were part of clinical trial involving DCE-CT and results were compared.Results: The inherent specificity of robustness of the phantom was determined through calculation of the total intraday variability and determined to be less than 2.2 ± 1.1% (total calculated output contrast mass error) with a goodness of fit (R{sup 2}) of greater than 0.99 ± 0.0035 (n= 10). The DCE-CT QA protocol was capable of detecting significant deviations from the expected phantom result when scanning at low mAs and low kVp in terms of quantitative metrics (Injected Mass Error 15.4%), goodness of fit (R{sup 2}) of 0.91, and ROI sensitivity (increase in minimum input function ROI radius by 146 ± 86%). These tests also confirmed that the ASIR reconstruction process was beneficial in reducing noise without substantially increasing partial volume effects and that vendor specific modes (e.g., axial shuttle) did not significantly affect the phantom results. The phantom and QA protocol were finally able to quickly (<90 min) and successfully validate the DCE-CT imaging protocol utilized at the three separate institutions of a multicenter clinical trial; thereby enhancing the confidence in the patient data collected.Conclusions: A DCE QA protocol was developed that, in combination with a dynamic multimodality flow phantom, allows the intrascanner variability to be separated from other sources of variability such as the impact of injection protocol and ROI selection. This provides a valuable resource that can be utilized at various clinical trial institutions to test conformance with imaging protocols and accuracy requirements as well as ensure that the scanners are performing as expected for dynamic scans.

  18. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    SciTech Connect (OSTI)

    Zhang, J; Adams, C; Lumby, C; Dillon, J [University of Kentucky, Lexington, KY (United States); Woods, E [University of kentucky, Lexington, KY (United States); Richer, E [University of Kentucky, Lexington, Lexington (United States)

    2014-06-01

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatric patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to achieve the goal of providing the most appropriate radiation dose for pediatric patients of varying sizes.

  19. Confidential Continuous Variable Direct Communication Protocol by Using Fock-Coherent Entangled States

    E-Print Network [OSTI]

    Soudeh Jahanshahi; Soroosh Alighanbari; Alireza Bahrampour; Mohammad Hossein Zandi

    2015-02-02

    We propose a scheme for the secure direct communication based on the entangled phase-coherent states, which shows an elevated level of confidentiality. The protocol gives a simultaneous security control for every bit of transferred information. The security-check-per-bit is provided by sending an additional mode to prove the legitimate parties' authenticity. Other benefit include increased transfer rate, since a separate control sequences is unnecessary. We study the security of the scheme for both ideal and realistic quantum channel. The protocol shows a robust security and prepares 50% probability to detect the presence of the eavesdropper.

  20. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

    2009-03-27

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

  1. Abstract -In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    Abstract - In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol basic mechanisms are compared in respect to bandwidth efficiency and energy efficiency. We have this problem. Energy efficiency can be improved at various layers of the communication protocol stack. However

  2. 0-7803-7016-3/01/$10.00 2001 IEEE A Power Controlled Multiple Access Protocol for

    E-Print Network [OSTI]

    Chen, Yuanzhu Peter

    for uplink and downlink channels and base stations provide centralized control [2], [3]. Distributed power0-7803-7016-3/01/$10.00 ©2001 IEEE A Power Controlled Multiple Access Protocol for Wireless Packet avoidance MAC protocols have typically used fixed transmission power, and have not considered power control

  3. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 49, NO. 3, MAY 2000 1029 Performance Analysis of a Downlink MAC Protocol

    E-Print Network [OSTI]

    Chamzas, Christodoulos

    of a Downlink MAC Protocol with Power-Saving Support Apostolis K. Salkintzis, Member, IEEE, and Christodoulos protocol, which features power-saving character- istics and has been previously proposed [3], [7 makes it different from the other power-saving alternatives, is that it does not require system

  4. A Conference Control Protocol for Highly Interactive Video-conferencing Ruibiao Qiu Fred Kuhns Jerome R. Cox

    E-Print Network [OSTI]

    A Conference Control Protocol for Highly Interactive Video-conferencing Ruibiao Qiu Fred Kuhns demand for video-conferences conducting over broad- band wide area networks. In this paper, we present a conference control protocol for a highly interactive conference paradigm and its collaboration environment

  5. Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng, Luminita Vasiu and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng, Luminita Vasiu and Richard Comley School of Computing Science, Middlesex University White Hart Lane, London N17 8HR, United-round tripartite key agreement pro- tocol [13], many authenticated protocols have been proposed. However most

  6. Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli and Francesca Lonetti

    E-Print Network [OSTI]

    Scheuermann, Peter

    Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks Maurizio A. Bonuccelli In this paper, we approach the problem of identifying a set of objects in an RFID network. We propose a modified version of Slotted Aloha protocol to reduce the number of transmission collisions. All tags select a slot

  7. A High Speed Protocol for Bursty Traffic in Optical Networks \\Lambda Myungsik Yoo and Myoungki Jeong and Chunming Qiao

    E-Print Network [OSTI]

    Qiao, Chunming

    Jeong and Chunming Qiao Department of Electrical and Computer Engineering State University of New York­way reser­ vation protocol called Just­Enough­Time (JET), which is suitable for switching bursty traffic in a high speed optical backbone network. The JET protocol has two unique, integrated features, namely

  8. Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    Brown, Timothy X.

    1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc at Boulder Boulder, CO-80309 Abstract--A minimum energy routing protocol reduces the energy con- sumption of energy to get the packets to their destination. This paper identifies the necessary features of an on

  9. LA-DCF: A New Multiple Access Protocol for Ad-Hoc Wireless Richard Akester & Stephen Hailes

    E-Print Network [OSTI]

    Haddadi, Hamed

    during backoff, the host "freezes" the backoff timer. Once the carrier is sensed idle again, the backoff-to-end transport protocol, but this can take too long to detect the loss and take action, causing channel variations in delay affects the calculation of round trip times in transport protocols. Also, they are only

  10. LLaannggeerrhhaannss LLaabb PPrroottooccoollss Live Fish Photography Protocol.docx revised 10/1/13 by JW Page 1 of 2

    E-Print Network [OSTI]

    Langerhans, Brian

    LLaannggeerrhhaannss LLaabb PPrroottooccoollss Live Fish Photography Protocol.docx revised 10/1/13 by JW Page 1 of 2 Live Fish Photography Protocol Set up: Stand the white board used for preserved to the white board. Position camera so that fish area fills view. Make sure auto focus is on. Make camera

  11. Appears as IBM Research Report RC 19981, March 1994. Secure Transport Protocols for HighSpeed Networks

    E-Print Network [OSTI]

    Bellare, Mihir

    Appears as IBM Research Report RC 19981, March 1994. Secure Transport Protocols for High are most naturally associated with the transport level and best addressed by the design of secure transport secure transport protocol. \\Lambda IBM T.J. Watson Research Center, P.O. Box 704, Yorktown Heights, NY

  12. Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang

    E-Print Network [OSTI]

    Li, Xiaolin "Andy"

    battery life, energy saving is of paramount importance in the design of sensor network protocols. Recent transmission path is greatly shortened and energy consumption for relaying is reduced. However, data gatheringTrailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu

  13. Design and Analysis of Highway Safety Communication Protocol in 5.9 GHz Dedicated Short Range Communication Spectrum

    E-Print Network [OSTI]

    Sengupta, Raja

    Design and Analysis of Highway Safety Communication Protocol in 5.9 GHz Dedicated Short Range among high- way vehicles in the newly-assigned 5.9 GHz Dedicated Short Range Communication (DSRC parameters are found for certain requirements on protocol performance. I. INTRODUCTION DSRC (Dedicated Short

  14. IP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance

    E-Print Network [OSTI]

    Dunkels, Adam

    , smart cities, structural health management systems, smart grid and energy management, and transportationIP for Smart Objects Internet Protocol for Smart Objects (IPSO) Alliance White paper #1 Adam, Cisco Systems September 2008 Executive Summary The emerging application space for smart objects requires

  15. CAS-based Channel Access Protocol for IEEE 802.11ah WLANs

    E-Print Network [OSTI]

    Bellalta, Boris

    Cities and Smart Grids concepts have motivated the growth of wireless networks based on sensor will extend IEEE 802.11 potential to applications such as smart metering, plan automation, eHealth or surveillance. In this paper we propose a novel channel access protocol for IEEE 802.11ah WLANs based on a smart

  16. A Context and Content-Based Routing Protocol for Mobile Sensor Networks

    E-Print Network [OSTI]

    Cugola, Gianpaolo

    -sink, mobile WSNs. CCBR adopts content-based addressing to effectively support the data-centric commu- nication of data-aware routing protocols. Indeed, one of the main peculiarities of WSNs is the data-centric form at the typical scenarios of usage of a WSN, we may notice that communication is not only data-centric

  17. Single-Database Private Information Retrieval Protocols : Overview, Usability and Trends.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Single-Database Private Information Retrieval Protocols : Overview, Usability and Trends. Carlos and Ostrovsky in 1997 and up to the latest trends in single-database PIR research such as trusted hardware usage be : · an electronic library, and which books we are interested in may provide information about our politic

  18. EHS-Net Cooling Study EHS-Net Cooling Study Protocol

    E-Print Network [OSTI]

    EHS-Net Cooling Study 1 EHS-Net Cooling Study Protocol 1. Title EHS-Net Cooling Study 2. Research of foodborne illness in foodservice establishments. Improper cooling significantly contributes to the overall temperature abuse opportunities. The purpose of this study is to collect descriptive data on cooling policies

  19. A Survey on Routing Protocols for Wireless Sensor Networks Kemal Akkaya and Mohamed Younis

    E-Print Network [OSTI]

    Younis, Mohamed

    nodes are constrained in energy supply and bandwidth. Such constraints combined with a typical Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County Baltimore to many new protocols specifically designed for sensor networks where energy awareness is an essential

  20. 2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario

    E-Print Network [OSTI]

    López-Sánchez, Maite

    2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario Jordi CAMPOS a&1 , Maite review our Multi-Agent System (MAS) architecture (2- LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS system and an additional meta-level in charge

  1. PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    , a hybrid protocol like the CMMBCR (Conditional Max-Min Battery Capacity Routing) mechanism has been devised-Max Battery Cost Routing) scheme tries to consider the remaining battery power of nodes to prolong- gardless of the remaining battery power of nodes. Since the transmission network2002: submitted to World

  2. LIMITING THE CLIENT BANDWIDTH OF BROADCASTING PROTOCOLS FOR VIDEOS ON DEMAND

    E-Print Network [OSTI]

    Pâris, Jehan-François

    LIMITING THE CLIENT BANDWIDTH OF BROADCASTING PROTOCOLS FOR VIDEOS ON DEMAND Jehan­François Pâris 1 was supported by the National Science Foundation under grant PO­10152754. KEYWORDS video­on­demand, broadcasting of video­on­ demand services by more efficiently distributing all videos that are simultaneously watched

  3. AN EVALUATION OF COMMUNICATION DEMAND OF AUCTION PROTOCOLS IN GRID ENVIRONMENTS

    E-Print Network [OSTI]

    Melbourne, University of

    1 AN EVALUATION OF COMMUNICATION DEMAND OF AUCTION PROTOCOLS IN GRID ENVIRONMENTS MARCOS DIAS DE regarding the high demand of communication when applied to large-scale scenarios. In a complex Grid environment, the communication demand can become a bottleneck; that is, a number of messages need

  4. Simulation-based optimization of communication protocols for large-scale wireless sensor networks1

    E-Print Network [OSTI]

    Maróti, Miklós

    everyday life more comfortable, e.g. Intelligent Spaces [3]. These sensor networks often use distributed of the wireless sensors may vary greatly, but invariably each of the intelligent sensors is a compact device1 Simulation-based optimization of communication protocols for large-scale wireless sensor networks

  5. Lecture: Coherence Protocols Topics: wrap-up of memory systems, multi-thread

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Lecture: Coherence Protocols · Topics: wrap-up of memory systems, multi-thread programming models scaling properties and eventually higher density: phase change memory (PCM), spin torque transfer (STT-RAM), etc. · PCM: heat and cool a material with elec pulses ­ the rate of heat/cool determines

  6. CPS-IP: Cyber Physical Systems Interconnection Protocol Department of Computer

    E-Print Network [OSTI]

    He, Tian

    heterogeneity of CPS systems at three different levels: function interoperability, policy regulation of the devices used in cyber physical system have very limited memory, computing capability and energy, whichCPS-IP: Cyber Physical Systems Interconnection Protocol Shan Lin Department of Computer Science

  7. Communication Protocols and Applications for ZigBee-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Tseng, Yu-Chee

    ]. For interoperability among different systems, standards such as ZigBee [17] have been developed. In the ZigBee protocol interoperability issues from the physical layer to the application layer. ZigBee supports three kinds of networks power management. Therefore, the tree topology is preferred, especially when energy saving

  8. EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Shihada, Basem

    EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks Lei Tang, including energy-efficient operation and robust support for varying traffic loads, in spite of effects control channel. EM-MAC achieves high energy efficiency by enabling a sender to predict the receiver

  9. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    Ă?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real­Time Maude Peter and the Maude formal methodology to the specification and analy­ sis of the AER/NCA suite of active network and the composability of its components, AER/NCA poses challenging new problems for its formal specification

  10. SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li

    E-Print Network [OSTI]

    Goldberg, Ian

    SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad {hmohajer,b5li,mderakhs,iang}@cs.uwaterloo.ca ABSTRACT The Tor network is designed to provide users with low- latency anonymous communications. Tor clients build cir- cuits with publicly listed relays to anonymously

  11. Outage performance of an energy-efficient relaying protocol over Nakagami fading channels

    E-Print Network [OSTI]

    Blostein, Steven D.

    Outage performance of an energy-efficient relaying protocol over Nakagami fading channels Viet only when the first-hop signal-to-noise ratio(SNR) is above the outage threshold, otherwise, relay transmission is stopped as it leads in that case to an outage. Closed-form expressions of CG outage probability

  12. Wireless Reliable Messaging Protocol for Web Services (WS WRM) Sangmi Lee and Geoffrey Fox

    E-Print Network [OSTI]

    Pallickara, Sangmi

    Wireless Reliable Messaging Protocol for Web Services (WS ­WRM) Sangmi Lee and Geoffrey Fox Community Grid Laboratory, Indiana University {leesangm, gcf}@indiana.edu Abstract By employing Web services addressed for quality of services in Web services. In this paper, we propose a reliable message scheme

  13. Indoor experiments of self-organization and localization protocols for hybrid networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    to constitute a wireless testbed and to test any protocol for ad hoc or hybrid networks. I. INTRODUCTION Mobile. Because a source can be not in the radio range of the destination, intermediary nodes must relay on how to provide an efficient hybrid network, connected to the Internet, and test in one scenario

  14. Transmission Costs, Selfish Nodes, and Protocol Design Peter Marbach and Ran Pang

    E-Print Network [OSTI]

    Marbach, Peter

    Transmission Costs, Selfish Nodes, and Protocol Design Peter Marbach and Ran Pang Department of Computer Science University of Toronto Abstract-- We study the influence of transmission costs on the behavior of selfish nodes in wireless local area networks. Intu- itively, it seems that transmission costs

  15. Transmission Costs, Selfish Nodes, and Protocol Design Peter Marbach and Ran Pang

    E-Print Network [OSTI]

    Marbach, Peter

    Transmission Costs, Selfish Nodes, and Protocol Design Peter Marbach and Ran Pang Department of Computer Science University of Toronto Abstract--- We study how selfish nodes react to transmission costs in wireless networks. Intuitively, it seems that transmission costs should have a stabilizing effect

  16. ACT-MAC: An Asynchronous Cooperative Transmission MAC Protocol for WSNs

    E-Print Network [OSTI]

    Ingram, Mary Ann

    ACT-MAC: An Asynchronous Cooperative Transmission MAC Protocol for WSNs Lakshmikanth Guntupalli1 {jlin61, maweit}@gatech.edu Abstract-- Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission

  17. A protocol to develop crack-free biomimetic coatings on Ti6Al4V substrates

    E-Print Network [OSTI]

    Tas, A. Cuneyt

    A protocol to develop crack-free biomimetic coatings on Ti6Al4V substrates Sahil Jalota,a) Sutapa/Kadikoy, Istanbul 34755, Turkey (Received 22 November 2006; accepted 16 February 2007) Biomimetic coating in implantology. While this paper specifically refers to coating Ti6Al4V, the results are valid with other related

  18. Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland

    E-Print Network [OSTI]

    Radiation Detection Instruments 3. Compliance Level Information Instrument under test might meet allTesting and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland and Transportable Radiation Monitors Used for Homeland Security EFF. DATE 2013-05-28 REV. 2.00 PAGE 1 of 5 Testing

  19. Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland

    E-Print Network [OSTI]

    Procedures and General Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland Radiation Detectors (SPRDs) for Homeland Security. EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 5 Testing

  20. Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security

    E-Print Network [OSTI]

    Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3. Compliance Level InformationTesting and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T Radiation Detectors for Homeland Security EFF. DATE 2013-05-17 REV. 3.00 PAGE 1 of 5 Testing and Evaluation