Sample records for ill lac key

  1. The Coronae of AR Lac

    E-Print Network [OSTI]

    Huenemoerder, David P.

    We observed the coronally active eclipsing binary AR Lac with the High Energy Transmission Grating on Chandra for a total of 97 ks, spaced over five orbits, at quadratures and conjunctions. Contemporaneous and simultaneous ...

  2. Modeling the Lac repressor-operator assembly: The influence of DNA looping on Lac

    E-Print Network [OSTI]

    number, and the end conditions imposed by the LacR tetramer. The tetramer can assume two types of confor

  3. Host galaxies and environment of BL Lac objects

    E-Print Network [OSTI]

    J. Heidt

    1998-12-14T23:59:59.000Z

    Since the last meeting on BL Lac objects 10 years ago, BL Lac host galaxies and their cluster environment have gained much attention. Hence, our current knowledge of the properties of BL Lac host galaxies and their cluster environment has improved considerably, which will be reviewed. The importance of future observing programs using (very) large telescopes is briefly outlined.

  4. Four New BL Lac Surveys: Sampling New Populations

    E-Print Network [OSTI]

    S. A. Laurent-Muehleisen; R. H. Becker; W. Brinkmann; J. Siebert; E. D. Feigelson; R. I. Kollgaard; G. D. Schmidt; P. S. Smith

    1998-10-15T23:59:59.000Z

    The advent of large area deep radio and X-ray surveys is leading to the creation of many new BL Lac samples. In particular, the ROSAT All-Sky, Green Bank and FIRST surveys are proving to be rich sources of new BL Lacs. We will discuss the methods used in four independent BL Lac searches based on these surveys. Comparison of the broadband spectral energy distributions of these BL Lacs with those of previously known objects clearly points to the existence of a large previously unrecognized population of objects with characteristics intermediate between those exhibited by Low and High energy peaked BL Lacs.

  5. C Ill

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling Corp -KWatertown Arsenal'.I Y.itBurrisIll

  6. BATSE observations of BL Lac Objects

    E-Print Network [OSTI]

    V. Connaughton; C. R. Robinson; M. L. McCollough; S. A. Laurent-Muehleisen

    1998-11-07T23:59:59.000Z

    The Burst and Transient Source Experiment (BATSE) on the Compton Gamma-Ray Observatory has been shown to be sensitive to non-transient hard X-ray sources in our galaxy, down to flux levels of 100 mCrab for daily measurements, 3 mCrab for integrations over several years. We use the continuous BATSE database and the Earth Occultation technique to extract average flux values between 20 and 200 keV from complete radio- and X-ray- selected BL Lac samples over a 2 year period.

  7. Mille Lacs Energy Cooperative | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant JumpMarysville, Ohio:Menomonee|Mililani Town, Hawaii:Mille Lacs County,

  8. Lac Courte Oreilles Energy Analysis Project

    SciTech Connect (OSTI)

    Leslie Isham; Denise Johnson

    2009-04-01T23:59:59.000Z

    The Lac Courte Oreilles Tribe applied for first step funding in 2007 and was awarded in October of that year. We wanted to perform an audit to begin fulfilling two commitments we made to our membership and resolutions that we adopted. One was the Kyoto Protocol and reduce our carbon emissions by 25% and to produce 25% of our energy by sustainable means. To complete these goals we needed to begin with first assessing what our carbon emissions are and begin taking the steps to conserve on the energy we currently use. The First Step Grant gave us the opportunity to do this. Upon funding the Energy Project was formed under the umbrella of the LCO Public Works Department and Denise Johnson was hired as the coordinator. She quickly began fulfilling the objectives of the project. Denise began by contact the LCO College and hiring interns who were able to go to each Tribal entity and perform line logging to read and document the energy used for each electrical appliance. Data was also gathered for one full year from each entity for all their utility bills (gasoline, electric, natural gas, fuel oil, etc.). Relationships were formed with the Green Team and other Green Committees in the area that could assist us in this undertaking. The Energy Task Force was of great assistance as well recommending other committees and guidance to completing our project. The data was gathered, compiled and placed into spreadsheets that would be understandable for anyone who didn't have a background in Renewable Resources. While gathering the data Denise was also looking for ways to conserve energy usage, policies changes to implement and any possible viable renewable energy resources. Changes in the social behaviors of our members and employees will require further education by workshops, energy fairs, etc.. This will be looked into and done in coordination with our schools. The renewable resources seem most feasible are wind resources as well as Bio Mass both of which need further assessment and funding to do so will be sought. While we already are in ownership of a Hydro Dam it is currently not functioning to its full capacity we are seeking operation and maintenance firm proposals and funding sources. One of our biggest accomplishment this project gave us was our total Carbon Emissions 9989.45 tons, this will be the number that we will use to base our reductions from. It will help us achieve our goals we have set for ourselves in achieving the Kyoto Protocol and saving our Earth for our future generations. Another major accomplishment and lesson learned is we need to educate ourselves and our people on how to conserve energy to both impact the environment and our own budgets. The Lac Courte Oreilles (LCO) Energy Analysis Project will perform an energy audit to gather information on the Tribe's energy usage and determine the carbon emissions. By performing the audit we will be able to identify areas where conservation efforts are most viable and recommend policies that can be implemented. These steps will enable LCO to begin achieving the goals that have been set by the Tribal Governing Board and adopted through resolutions. The goals are to reduce emissions by 25% and to produce 25% of its energy using sustainable sources. The project objectives were very definitive to assist the Tribe in achieving its goals; reducing carbon emissions and obtaining a sustainable source of energy. The following were the outlined objectives: (1) Coordinate LCO's current and future conservation and renewable energy projects; (2) Establish working relationships with outside entities to share information and collaborate on future projects; (3) Complete energy audit and analyze LCO's energy load and carbon emissions; (4) Identify policy changes, education programs and conservation efforts which are appropriate for the LCO Reservation; and (5) Create a plan to identify the most cost effective renewable energy options for LCO.

  9. Magnetic Field Geometry in "Red" and "Blue" BL Lacs

    E-Print Network [OSTI]

    P. Kharb; D. C. Gabuzda; P. Shastri

    2003-01-06T23:59:59.000Z

    We compare the systematics of the magnetic field geometry in the "red" low-energy peaked BL Lacs (LBLs) and "blue" high-energy peaked BL Lacs (HBLs) using VLBI polarimetric images. The LBLs are primarily "radio--selected" BL Lacs and the HBLs are primarily "X-ray selected". In contrast to the LBLs, which show predominantly transverse jet magnetic fields, the HBLs show predominantly longitudinal fields. Thus, while the SED peaks of core-dominated quasars, LBLs and HBLs form a sequence of increasing frequency, the magnetic field geometry does not follow an analogous sequence. We briefly investigate possible connections between the observed parsec-scale magnetic field structures and circular polarization measurements in the literature on various spatial scales.

  10. Wind Resource Assessment Report: Mille Lacs Indian Reservation, Minnesota

    SciTech Connect (OSTI)

    Jimenez, A. C.

    2013-12-01T23:59:59.000Z

    The U.S. Environmental Protection Agency (EPA) launched the RE-Powering America's Land initiative to encourage development of renewable energy on potentially contaminated land and mine sites. EPA collaborated with the U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) and the Mille Lacs Band of Chippewa Indians to evaluate the wind resource and examine the feasibility of a wind project at a contaminated site located on the Mille Lacs Indian Reservation in Minnesota. The wind monitoring effort involved the installation of a 60-m met tower and the collection of 18 months of wind data at multiple heights above the ground. This report focuses on the wind resource assessment, the estimated energy production of wind turbines, and an assessment of the economic feasibility of a potential wind project sited this site.

  11. Measurement of the Integrated Faraday Rotations of BL Lac Objects

    E-Print Network [OSTI]

    A. B. Pushkarev

    2003-07-09T23:59:59.000Z

    We present the results of multi-frequency polarization VLA observations of radio sources from the complete sample of northern, radio-bright BL Lac objects compiled by H. Kuhr and G. Schmidt. These were used to determine the integrated rotation measures of 18 objects, 15 of which had never been measured previously, which hindered analysis of the intrinsic polarization properties of objects in the complete sample. These measurements make it possible to correct the observed orientations of the linear polarizations of these sources for the effect of Faraday rotation. The most probable origin for Faraday rotation in these objects is the Galactic interstellar medium. The results presented complete measurements of the integrated rotation measures for all 34 sources in the complete sample of BL Lac objects.

  12. LAC Regional Platform Workshop Report | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, search GEOTHERMALTexas:Kuju KankoAnnouncement AgendaLAC LEDS

  13. Lac La Belle, Wisconsin: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation,working-groups < LEDSGP‎LEEPuente,Salle,LaMoureEnergyLac La

  14. Lac qui Parle County, Minnesota: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation,working-groups < LEDSGP‎LEEPuente,Salle,LaMoureEnergyLac

  15. Lac qui Parle Valley School Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOf Kilauea Volcano, Hawaii9969995°,ILEDSGP/join <Lac qui Parle Valley

  16. Mille Lacs County, Minnesota: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant JumpMarysville, Ohio:Menomonee|Mililani Town, Hawaii:Mille Lacs County, Minnesota:

  17. Energy Employees' Occupational Illness Compensation Program Act...

    Energy Savers [EERE]

    Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database, INL Energy Employees' Occupational Illness Compensation Program Energy Employees' Occupational...

  18. High-energy cosmic neutrinos from spine-sheath BL Lac jets

    E-Print Network [OSTI]

    Tavecchio, F

    2014-01-01T23:59:59.000Z

    We recently proposed that structured (spine-sheath) jets associated to BL Lac objects offer a suitable environment for the production of the extragalactic high-energy ($E>100$ TeV) neutrino recently revealed by IceCube. Our previous analysis was limited to low-power BL Lac objects. We extend our preliminary study to the entire BL Lac population. We assume that the power of cosmic rays as well as the radiative luminosity of the sheath depend linearly on the the jet power. In turn, we assume that the latter is well traced by the $\\gamma$-ray luminosity. We exploit the BL Lac $\\gamma$-ray luminosity function and its cosmic evolution as recently inferred from Fermi-LAT data to derive the expected neutrino cumulative intensity from the entire BL Lac population. When considering only the low-power BL Lacs, a large cosmic ray power for each source is required to account for the neutrino flux. Instead, if BL Lacs of all powers produce neutrinos, the power demand decreases, and the required cosmic ray power becomes of...

  19. Single-molecule FRET reveals sugar-induced conformational dynamics in LacY

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Energy Transfer (sm-FRET) is used to test this model with wild-wild-type or mutant LacY for ligand and the change in free energy (

  20. Sustaining the natural and economical resources of the Lac Courte Oreilles, Leslie Isham; Jason Weaver

    SciTech Connect (OSTI)

    Isham, Leslie; Weaver, Jason

    2013-09-30T23:59:59.000Z

    The Lac Courte Oreilles Band of Lake Superior Chippewa Indians, located in northwest Wisconsin has developed a project, entitled Sustaining the Natural and Economic Resources of the LCO Ojibwe. This technical report is a summary of the project.

  1. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: A key could be created by A and delivered physically

  2. High-Resolution Radio Imaging of Gravitational Lensing Candidates in the 1 Jansky BL Lac Sample

    E-Print Network [OSTI]

    T. A. Rector; J. T. Stocke

    2003-02-19T23:59:59.000Z

    While BL Lacertae objects are widely believed to be highly beamed, low-luminosity radio galaxies, many radio-selected BL Lacs have extended radio power levels and optical emission lines that are too luminous to be low-luminosity radio galaxies. Also, Stocke & Rector discovered an excess of MgII absorption systems along BL Lac sightlines compared to quasars, suggesting that gravitational lensing may be another means of creating the BL Lac phenomenon in some cases. We present a search for gravitationally-lensed BL Lacs with deep, high-resolution, two-frequency VLA radio maps of seven lensing candidates from the 1 Jansky BL Lac sample. We find that none of these objects are resolved into an Einstein ring like B 0218+357, nor do any show multiple images of the core. All of the lensing candidates that were resolved show a flat-spectrum core and very unusual, steep-spectrum extended morphology that is incompatible with a multiply lensed system. Thus, while these observations do not rule out microlensing, no macrolensing is observed.

  3. INFRARED SPECTRAL OBSERVATION OF EIGHT BL LAC OBJECTS FROM THE SPITZER INFRARED SPECTROGRAPH

    SciTech Connect (OSTI)

    Chen, P. S.; Shan, H. G., E-mail: iraspsc@yahoo.com.cn [National Astronomical Observatories/Yunnan Observatory and Key Laboratory for the Structure and Evolution of Celestial Objects, Chinese Academy of Sciences, Kunming 650011 (China)

    2011-05-01T23:59:59.000Z

    The Spitzer Infrared Spectrograph (IRS) low-resolution spectra for eight BL Lac objects are presented in this paper. It can be seen that the infrared spectrum of S5 0716+714 shows in the IRS region many emission features that would be from a nearby galaxy. It is also shown that, except for the silicate absorptions around 10 {mu}m for some sources, emission lines in the infrared spectra for the other seven BL Lac objects are indeed very weak or absent. In addition, ignoring the silicate feature, all spectra can be well fitted by a power-law distribution indicative of the emission mechanism of the synchrotron radiation for these BL Lac objects in the IRS region.

  4. MENTAL ILLNESS in the CLASSROOM

    E-Print Network [OSTI]

    MENTAL ILLNESS in the CLASSROOM: How Educators Can Help Students Succeed Ingle International cares with parents or health care practitioners about a student's mental health issue. Make your first step informing to start: · Canadian Mental Health Association: http://bit.ly/bmDylH · Centre for Addiction and Mental

  5. Lead isotope study of the late Archean Lac des Iles palladium deposit, Canada: enrichment of platinum

    E-Print Network [OSTI]

    ARTICLE Lead isotope study of the late Archean Lac des Iles palladium deposit, Canada: enrichment Lead isotopic compositions of mineral separates are presented from the mineralized zones (Roby Province of Canada. Plagioclase separates show Pb isotope ratios similar to those of the late Archean

  6. The cultural eutrophication of Lac la Biche, Alberta, Canada: a paleoecological study

    E-Print Network [OSTI]

    Wolfe, Alexander P.

    The cultural eutrophication of Lac la Biche, Alberta, Canada: a paleoecological study D in northeastern Alberta, Canada, revealed that the lake was eutrophic before European settlement but has undergone additional cultural eutrophication in the past 30 to 50 years. Annual fluxes to sediments of phosphorus

  7. An X-ray jet in the BL Lac S5 2007+777

    E-Print Network [OSTI]

    R. M. Sambruna; D. Donato; C. C. Cheung; F. Tavecchio; L. Maraschi

    2007-07-10T23:59:59.000Z

    The BL Lac S5 2007+777 was observed by us with Chandra, to find the X-ray counterpart to its 18" radio jet, and study its structure. Indeed, a bright X-ray jet was discovered in the 33 ks ACIS-S image of the source. We present its properties and briefly discuss the implications.

  8. Intensive monitoring of the strongly variable BL Lac S5 0716+714

    E-Print Network [OSTI]

    K. Otterbein; M. J. Hardcastle; S. J. Wagner; D. M. Worrall

    1998-01-24T23:59:59.000Z

    The BL Lac object S5 0716+714 was monitored during a multifrequency campaign in 1996. Preliminary analysis of the optical, ROSAT and RXTE data are presented. Strong variability on short time scales was observed. The data suggest an interpretation within a multi-component model.

  9. A 33 yr CONSTANCY OF THE X-RAY CORONAE OF AR Lac AND ECLIPSE DIAGNOSIS OF SCALE HEIGHT

    E-Print Network [OSTI]

    Drake, Jeremy J.

    Extensive X-ray and EUV photometric observations of the eclipsing RS CVn system AR Lac were obtained over the years 1997-2013 with the Chandra X-Ray Observatory Extreme-Ultraviolet Explorer (EUVE). During primary eclipse, ...

  10. Consumer's Guide: Preventing Food-borne Illness

    E-Print Network [OSTI]

    Extension Food and Nutrition Specialists

    2008-12-22T23:59:59.000Z

    By following a few simple measures, you can help protect yourself and your family from food-borne illness caused by harmful bacteria....

  11. ORO Energy Employees Occupational Illness Compensation Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Energy Employees Occupational Illness Compensation Program Act, Office of Legacy Management LM Records Handling System-Fernald Historical Records System, Office of Legacy...

  12. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  13. Molecular genetics in affective illness

    SciTech Connect (OSTI)

    Mendlewicz, J.; Sevy, S.; Mendelbaum, K. (Erasme Univ. Hospital, Brussels (Belgium))

    1993-01-01T23:59:59.000Z

    Genetic transmission in manic depressive illness (MDI) has been explored in twins, adoption, association, and linkage studies. The X-linked transmission hypothesis has been tested by using several markers on chromosome X: Xg blood group, color blindness, glucose-6-phosphate dehydrogenase (G6PD), factor IX (hemophilia B), and DNA probes such as DXS15, DXS52, F8C, ST14. The hypothesis of autosomal transmission has been tested by association studies with the O blood group located on chromosome 9, as well as linkage studies on chromosome 6 with the Human Leucocyte Antigens (HLA) haplotypes and on Chromosome 11 with DNA markers for the following genes: D2 dopamine receptor, tyrosinase, C-Harvey-Ras-A (HRAS) oncogene, insuline (ins), and tyrosine hydroxylase (TH). Although linkage studies support the hypothesis of a major locus for the transmission of MDI in the Xq27-28 region, several factors are limiting the results, and are discussed in the present review. 105 refs., 1 fig., 2 tabs.

  14. New statistical results on the optical IDV data of BL Lac S5 0716+714

    E-Print Network [OSTI]

    Danila, B; Mocanu, G

    2014-01-01T23:59:59.000Z

    This paper reports on the statistical behaviour of the optical IntraDay Variability of BL Lac S5 0716+714. Available IntraDay Variability data in the optical is tested to see whether or not the magnitude is log-normally distributed. It was consistently found that this is not the case. This is in agreement with a previous discussion for data for the same object but in a different observational period. Simultaneously, the spectral slope of the light curves is calculated. The implications of these findings for models which discuss both the location and the source of IntraDay Variability are presented.

  15. Lac du Flambeau Band of Lake Superior Chippewa Indians Strategic Energy Plan

    SciTech Connect (OSTI)

    Bryan Hoover

    2009-11-16T23:59:59.000Z

    This plan discusses the current energy use on the Lac du Flambeau Reservation, the current status of the Tribe's energy program, as well as the issues and concerns with energy on the reservation. This plan also identifies and outlines energy opportunities, goals, and objectives for the Tribe to accomplish. The overall goal of this plan is to address the energy situation of the reservation in a holistic manner for the maximum benefit to the Tribe. This plan is an evolving document that will be re-evaluated as the Tribe's energy situation changes.

  16. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  17. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  18. POWERFUL HIGH-ENERGY EMISSION OF THE REMARKABLE BL Lac OBJECT S5 0716+714

    SciTech Connect (OSTI)

    Vittorini, V.; Chen, A. W.; Ferrari, A. [CIFS-Torino, Viale Settimio Severo 3, I-10133, Torino (Italy); Tavani, M.; D'Ammando, F.; Donnarumma, I.; Pacciani, L.; Pucella, G. [INAF/IASF-Roma, Via del Fosso del Cavaliere 100, I-00133 Roma (Italy); Paggi, A.; Cavaliere, A. [University of Rome, 'Tor Vergata', Via della Ricerca Scientifica 1, I-00133 Roma (Italy); Bulgarelli, A. [INAF/IASF-Bologna, Via Gobetti 101, I-40129 Bologna (Italy); Giuliani, A.; Vercellone, S. [INAF/IASF-Milano, Via E. Bassini 15, I-20133 Milano (Italy); Longo, F. [INFN-Trieste, Via Valerio 2, I-34127 Trieste (Italy); Colafrancesco, S.; Giommi, P., E-mail: vittorini@roma2.infn.i [ASDC c/o ESRIN, Via G. Galilei snc, I-00044 Frascati, Roma (Italy)

    2009-12-01T23:59:59.000Z

    BL Lac objects of the intermediate subclass (IBLs) are known to emit a substantial fraction of their power in the energy range 0.1-10 GeV. Detecting gamma-ray emission from such sources provides therefore a direct probe of the emission mechanisms and of the underlying powerhouse. The gamma-ray satellite, AGILE, detected the remarkable IBL S5 0716+714 (z approx = 0.3) during a high state in the period from 2007 September-October, marked by two very intense flares reaching peak fluxes of 200 x 10{sup -8} photons cm{sup -2} s{sup -1} above 100 MeV, with simultaneous optical and X-ray observations. We present here a theoretical model for the two major flares and discuss the overall energetics of the source. We conclude that 0716+714 is among the brightest BL Lac's ever detected at gamma-ray energies. Because of its high power and lack of signs for ongoing accretion or surrounding gas, the source is an ideal candidate to test the maximal power extractable from a rotating supermassive black hole via the pure Blandford-Znajek (BZ) mechanism. We find that during the 2007 gamma-ray flares 0716+714 approached or just exceeded the upper limit set by BZ for a black hole of mass 10{sup 9} M{sub sun}.

  19. Parsec-scale Magnetic-Field Structures in HEAO-1 BL Lacs

    E-Print Network [OSTI]

    P. Kharb; D. Gabuzda; P. Shastri

    2007-11-07T23:59:59.000Z

    We present very long baseline interferometry polarization images of an X-ray selected sample of BL Lacertae objects belonging to the first High Energy Astronomy Observatory (HEAO-1) and the ROSAT-Green Bank (RGB) surveys. These are primarily high-energy-peaked BL Lacs (HBLs) and exhibit core-jet radio morphologies on pc-scales. They show moderately polarized jet components, similar to those of low-energy-peaked BL Lacs (LBLs). The fractional polarization in the unresolved cores of the HBLs is, on average, lower than in the LBLs, while the fractional polarizations in the pc-scale jets of HBLs and LBLs are comparable. However a difference is observed in the orientation of the inferred jet magnetic fields -- while LBL jets are well-known to preferentially exhibit transverse magnetic fields, the HBL jets tend to display longitudinal magnetic fields. Although a `spine-sheath' jet velocity structure, along with larger viewing angles for HBLs could produce the observed magnetic field configuration, differences in other properties of LBLs and HBLs, such as their total radio power, cannot be fully reconciled with the different-angle scenario alone. Instead it appears that LBLs and HBLs differ intrinsically, perhaps in the spin rates of their central black holes.

  20. Nitrogen dioxide and respiratory illnesses in infants

    SciTech Connect (OSTI)

    Samet, J.M.; Lambert, W.E.; Skipper, B.J.; Cushing, A.H.; Hunt, W.C.; Young, S.A.; McLaren, L.C.; Schwab, M.; Spengler, J.D. (Univ. of New Mexico Medical Center, Albuquerque (United States))

    1993-11-01T23:59:59.000Z

    Nitrogen dioxide is an oxidant gas that contaminates outdoor air and indoor air in homes with unvented gas appliances. A prospective cohort study was carried out to test the hypothesis that residential exposure to NO2 increases incidence and severity of respiratory illnesses during the first 18 months of life. A cohort of 1,205 healthy infants from homes without smokers was enrolled. The daily occurrence of respiratory symptoms and illnesses was reported by the mothers every 2 wk. Illnesses with wheezing or wet cough were classified as lower respiratory tract. Indoor NO2 concentrations were serially measured with passive samplers place in the subjects' bedrooms. In stratified analyses, illness incidence rates did not consistently increase with exposure to NO2 or stove type. In multivariate analyses that adjusted for potential confounding factors, odds ratios were not significantly elevated for current or lagged NO2 exposures, or stove type. Illness duration, a measure of illness severity, was not associated with NO2 exposure. The findings can be extended to homes with gas stoves in regions of the United States where the outdoor air is not heavily polluted by NO2.

  1. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  2. Institutions and Incentives for R&D: Implications for L.A.C. Economies Walter G. Park,

    E-Print Network [OSTI]

    Lansky, Joshua

    Survey) 3.2 Fiscal Incentives A. Conceptual Issues B. Index of Fiscal Incentives C. Economic EffectsInstitutions and Incentives for R&D: Implications for L.A.C. Economies Walter G. Park, Associate Professor, Department of Economics, American University, Washington, D.C. 20016 August 2002 Abstract

  3. Sequence-Enabled Reassembly of -Lactamase (SEER-LAC): A Sensitive Method for the Detection of Double-Stranded DNA

    E-Print Network [OSTI]

    Ghosh, Indraneel

    Sequence-Enabled Reassembly of -Lactamase (SEER-LAC): A Sensitive Method for the Detection the development of a new methodology for the detection of specific double- stranded DNA sequences. We previously of a predefined DNA sequence. This system, designated sequence-enabled reassembly (SEER), was demonstrated

  4. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  5. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  6. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  7. acutely ill patients: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    syndrome. METHODS As shown in Figure 1 related to lower respiratory illness (e.g., cough, shortness of breath, pneumonia on x-ray, oxygen Boyer, Edmond 13 Duration of Illness...

  8. advanced illness focus: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    injuries or illnesses to Risk Management within one working day of your notice or knowledge. If the work-related injury or illness occurs on a furlough day, please contact...

  9. 2003 Nevada Test Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the Nevada Test Site. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  10. 2007 Idaho National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-05-04T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  11. 2006 Pantex Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-05-19T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  12. 2007 Hanford Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-07-16T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  13. 2007 Pantex Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-07-31T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  14. 2010 Pantex Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-06-29T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  15. 2010 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-16T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  16. 2010 Savannah River Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-09-12T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  17. 2010 Argonne National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-06-20T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  18. 2006 Savannah River Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-08-20T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  19. 2010 Sandia National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-10-26T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  20. 2006 Kansas City Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-06-13T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  1. 2006 Hanford Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-05-14T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  2. 2006 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-03-06T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  3. 2007 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-07-31T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  4. 2010 Idaho National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-09-26T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  5. 2006 Nevada Test Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-04-24T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  6. 2010 Hanford Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-10-05T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  7. 2010 Kansas City Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-06-20T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  8. RELATIONSHIP BETWEEN ILLNESS AND ADIPOSITY IN CHILDHOOD

    E-Print Network [OSTI]

    Pappas, Lucy Belle

    2014-05-31T23:59:59.000Z

    to keep the immune system strong has not lessened. However, now the question pertains to the association between overnutrition and childhood illness. Although many doctors agree that coughs, colds and related symptoms are usually of no serious concern.... The most likely symptom is nasal congestion or obstruction followed by sneezing, sore or scratchy throat, cough, hoarseness, headache, fatigue/malaise and fever (28). Grief cites Turners 2011 (31) findings of the following common cold incidence rates...

  9. Multiwavelength Intraday Variability of the BL Lac S5 0716+714

    E-Print Network [OSTI]

    Gupta, Alok C; Wiita, P J; Rani, B; Sokolovsky, K V; Mohan, P; Mangalam, A; Marchili, N; Fuhrmann, L; Agudo, I; Bach, U; Bachev, R; Bttcher, M; Gabanyi, K E; Gaur, H; Hawkins, K; Kimeridze, G N; Kurtanidze, O M; Kurtanidze, S O; Lee, C -U; Liu, X; McBreen, B; Nesci, R; Nestoras, G; Nikolashvili, M G; Ohlert, J M; Palma, N; Peneva, S; Pursimo, T; Semkov, E; Strigachev, A; Webb, J R; Wiesemeyer, H; Zensus, J A

    2012-01-01T23:59:59.000Z

    We report results from a 1 week multi-wavelength campaign to monitor the BL Lac object S5 0716+714 (on December 9-16, 2009). In the radio bands the source shows rapid (~ (0.5-1.5) day) intra-day variability with peak amplitudes of up to ~ 10 %. The variability at 2.8 cm leads by about 1 day the variability at 6 cm and 11 cm. This time lag and more rapid variations suggests an intrinsic contribution to the source's intraday variability at 2.8 cm, while at 6 cm and 11 cm interstellar scintillation (ISS) seems to predominate. Large and quasi-sinusoidal variations of ~ 0.8 mag were detected in the V, R and I-bands. The X-ray data (0.2-10 keV) do not reveal significant variability on a 4 day time scale, favoring reprocessed inverse-Compton over synchrotron radiation in this band. The characteristic variability time scales in radio and optical bands are similar. A quasi-periodic variation (QPO) of 0.9 - 1.1 days in the optical data may be present, but if so it is marginal and limited to 2.2 cycles. Cross-correlatio...

  10. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  11. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  12. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  13. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  14. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  15. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  16. 2007 Kansas City Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-07-13T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  17. 2008 Sandia National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-09-17T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  18. 2008 Nevada Test Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-10-05T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  19. 2009 Argonne National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-08-19T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  20. 2008 Kansas City Plant Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-09-22T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  1. 2009 Hanford Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-12-01T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  2. 2008 Idaho National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-11-23T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  3. 2009 Pantex Plant Annual Illness and Injury Surveillance

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-12-15T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  4. 2007 Sandia National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-02-04T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  5. 2008 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-12-10T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  6. 2009 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-11-24T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  7. 2008 Savannah River Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-09-29T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  8. 2007 Savannah River Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-05-05T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  9. 2007 Nevada Test Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-06-30T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  10. Optimization Online - Solving ill-posed bilevel programs

    E-Print Network [OSTI]

    Alain B. Zemkoho

    2014-12-31T23:59:59.000Z

    Dec 31, 2014 ... Abstract: This paper deals with ill-posed bilevel programs, i.e., problems admitting multiple lower-level solutions for some upper-level...

  11. Type B Accident Investigation Report on the Exertional Heat Illnesses...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat Illnesses during SPOTC 2006 at the National Training Center in Albuquerque, New Mexico, July 13, 2006 Type B Accident Investigation Report on the Exertional Heat...

  12. Optimization Online - Termination and Verification for Ill-Posed ...

    E-Print Network [OSTI]

    Christian Jansson

    2005-06-17T23:59:59.000Z

    Jun 17, 2005 ... Termination and Verification for Ill-Posed Semidefinite Programming Problems. Christian Jansson (jansson ***at*** tu-harburg.de). Abstract:...

  13. acute gastrointestinal illness: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (more) Visser, Janicke 2008-01-01 165 HOW EMPLOYABLE ARE PEOPLE WITH SERIOUS MENTAL ILLNESS? CASE MANAGERS AND UNDERGRADUATES EXPECTATIONS. Open Access Theses and...

  14. adult critically ill: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Joiner, T.; Preacher, K. J. 2006-01-01 42 HOW EMPLOYABLE ARE PEOPLE WITH SERIOUS MENTAL ILLNESS? CASE MANAGERS AND UNDERGRADUATES EXPECTATIONS. Open Access Theses and...

  15. Occupational Injury & Illness System (01&15) PIA, Idaho National...

    Office of Environmental Management (EM)

    Tracking Database, INL Energy Employees' Occupational Illness Compensation Program Occupational Medicine - Assistant PIA, Idaho National Laboratory VisitDosimBadgeTrckg-PIA.pdf...

  16. A Basic Overview of the Energy Employees Occupational Illness...

    Energy Savers [EERE]

    Policy, Guidance & Reports Worker Health & Safety A Basic Overview of the Energy Employees Occupational Illness Compensation Program A Basic Overview of the Energy Employees...

  17. adolescent illness chronic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    patients with a chronic illness, they eventually undergo the transition from paediatric health care to adult health care. This transition typically occurs simultaneously with...

  18. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  19. Novel insights from hybrid LacI/GalR proteins: family-wide functional attributes and biologically significant variation in transcription repression

    E-Print Network [OSTI]

    Meinhardt, Sarah; Manley Jr., Michael W.; Becker, Nicole A.; Hessman, Jacob A.; Maher III, L. James; Swint-Kruse, Liskin

    2012-09-08T23:59:59.000Z

    The coding regions for full-length LacI and the LacI-11 variant were subcloned from the genome of DH5a E. coli to the plasmid pHG165c. LacI-11 has a stop codon that is inserted 11 amino acids from the 30-end of the gene, which disrupts the tetramerization.... The duration of the growth assays ranged from #2;500 to 1500min. At the end of the assay for one slow-growing lactose culture, pH of the media was tested and found to be close to the starting pH. Time to OD600=1 was determined by linear regression of the data...

  20. Connection between inner jet kinematics and broadband flux variability in the BL Lac object S5 0716+714

    E-Print Network [OSTI]

    Rani, B; Marscher, A P; Hodgson, J A; Fuhrmann, L; Angelakis, E; Britzen, S; Zensus, J A

    2015-01-01T23:59:59.000Z

    We present a high-frequency very long baseline interferometry (VLBI) kinematical study of the BL Lac object S5 0716+714 over the time period of September 2008 to October 2010. The aim of the study is to investigate the relation of the jet kinematics to the observed broadband flux variability. We find significant non-radial motions in the jet outflow of the source. In the radial direction, the highest measured apparent speed is \\sim37 c, which is exceptionally high, especially for a BL Lac object. Patterns in the jet flow reveal a roughly stationary feature \\sim0.15 mas downstream of the core. The long-term fits to the component trajectories reveal acceleration in the sub-mas region of the jet. The measured brightness temperature, T_{B}, follows a continuous trend of decline with distance, T_B \\propto r_{jet}^{-(2.36\\pm0.41)}, which suggests a gradient in Doppler factor along the jet axis. Our analysis suggest that a moving disturbance (or a shock wave) from the base of the jet produces the high-energy (optica...

  1. e-Learning on Environmental Assessment of Foodborne Illness Outbreaks

    E-Print Network [OSTI]

    CS246346-A e-Learning on Environmental Assessment of Foodborne Illness Outbreaks Register Today outbreak environmental assessments. Participants acquire in-depth skills and knowledge to Investigate the pretest, you can start the course on foodborne illness outbreak environmental assessment, which includes

  2. Version0109 THIS INJURY AND ILLNESS INCIDENT REPORT IS ONE

    E-Print Network [OSTI]

    Karsai, Istvan

    Version0109 THIS INJURY AND ILLNESS INCIDENT REPORT IS ONE OF THE FIRST FORMS THAT MUST BE FILLED's Form 301 Injury and Illness Incident Report, should be completed as soon as possible after? ______________________ 10. Date of Accident __________________________ DESCRIPTIONOFTHEINJURY: 1. State name of machine

  3. ROSAT/ASCA Observations of a Serendipitous BL Lac Object PKS 2316-423: The Variable High-Energy Tail of Synchrotron Radiation

    E-Print Network [OSTI]

    Sui-Jian Xue; You-Hong Zhang; Jian-Sheng Chen

    2000-05-22T23:59:59.000Z

    We present the analysis of archival data from ROSAT and ASCA of a serendipitous BL Lac object PKS 2316-423. Because of its featureless non-thermal radio/optical continuum, PKS 2316-423 has been called as a BL Lac candidate in the literature. PKS 2316-423 was evidently variable over the multiple X-ray observations, in particular, a variable high-energy tail of the synchrotron radiation is revealed. The X-ray spectral analysis provides further evidence of the synchrotron nature of its broad-band spectrum: a steep and downward curving spectrum between 0.1--10 keV, typical of high-energy peaked BL Lacs (HBL). The spectral energy distribution (SED) through radio-to-X-ray yields the synchrotron radiation peak at frequency Vp=7.3 10^{15} Hz, with integrated luminosity of Lsyn=2.1 10^{44} ergs s^{-1}. The averaged SED properties of PKS 2316-423 are very similar to those ``intermediate'' BL Lac objects (IBL) found recently in several deep surveys, such as Deep X-ray Radio Blazar, Radio-Emitting X-ray, and ROSAT-Green Bank surveys. We suggest that PKS 2316-423 is an IBL though it also shows some general features of a HBL. Actually, this double attribute of PKS 2316-423 provides a good test of the prediction that an IBL object can show either synchrotron or inverse-Compton characteristics in different variability states.

  4. X-Ray Luminosity and Spectral Variability in the TEV BL Lac 1ES2344+514

    E-Print Network [OSTI]

    P. Giommi; P. Padovani; E. Perlman

    1998-02-02T23:59:59.000Z

    The results of a series of five \\sax observations of the TeV BL Lac object 1ES2344+514 are briefly presented. Large amplitude luminosity variability, associated to impressive spectral changes in the hard X-rays, have been found. The shape of the lightcurve depends on energy, with the flare starting and ending in the hard band, but with maximum intensity possibly reached earlier in the soft X-rays. The luminosity and spectral changes may be due to a shift of the peak of the synchrotron emission from the soft X-rays to the hard X-ray band similar to that detected during \\sax observations of MKN 501.

  5. A kpc-scale X-ray jet in the BL Lac source S5 2007+777

    E-Print Network [OSTI]

    Rita M. Sambruna; Davide Donato; C. C. Cheung; F. Tavecchio; L. Maraschi

    2008-05-07T23:59:59.000Z

    X-ray jets in AGN are commonly observed in FRII and FRI radio-galaxies, but rarely in BL Lacs, most probably due to their orientation close to the line of sight and the ensuing foreshortening effects. Only three BL Lacs are known so far to contain a kpc-scale X-ray jet. In this paper, we present the evidence for the existence of a fourth extended X-ray jet in the classical radio-selected source S5 2007+777, which for its hybrid FRI/II radio morphology has been classified as a HYMOR (HYbrid MOrphology Radio source). Our Chandra ACIS-S observations of this source revealed an X-ray counterpart to the 19"-long radio jet. Interestingly, the X-ray properties of the kpc-scale jet in S5 2007+777 are very similar to those observed in FRII jets. First, the X-ray morphology closely mirrors the radio one, with the X-rays being concentrated in the discrete radio knots. Second, the X-ray continuum of the jet/brightest knot is described by a very hard power law, with photon index Gamma_x~1, although the uncertainties are large. Third, the optical upper limit from archival HST data implies a concave radio-to-X-ray SED. If the X-ray emission is attributed to IC/CMB with equipartition, strong beaming (delta=13) is required, implying a very large scale (Mpc) jet. The beaming requirement can be somewhat relaxed assuming a magnetic field lower than equipartition. Alternatively, synchrotron emission from a second population of very high-energy electrons is viable. Comparison to other HYMOR jets detected with Chandra is discussed, as well as general implications for the origin of the FRI/II division.

  6. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  7. acute respiratory illness: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    syndrome. METHODS As shown in Figure 1 related to lower respiratory illness (e.g., cough, shortness of breath, pneumonia on x-ray, oxygen Boyer, Edmond 4 Edinburgh Research...

  8. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  9. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  10. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  11. Multilevel learning-based segmentation of ill-defined and spiculated masses in mammograms

    SciTech Connect (OSTI)

    Tao, Yimo; Lo, Shih-Chung B.; Freedman, Matthew T.; Makariou, Erini; Xuan, Jianhua [Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Arlington, Virginia 22203 (United States) and Department of Radiology, ISIS Center, Georgetown University Medical Center, Washington, DC 20007 (United States); Department of Radiology, ISIS Center, Georgetown University Medical Center, Washington, DC 20007 (United States); Department of Oncology, Georgetown University Medical Center, Washington, DC 20007 (United States); Department of Radiology, Georgetown University Medical Center, Washington, DC 20007 (United States); Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Arlington, Virginia 22203 (United States)

    2010-11-15T23:59:59.000Z

    Purpose: A learning-based approach integrating the use of pixel-level statistical modeling and spiculation detection is presented for the segmentation of mammographic masses with ill-defined margins and spiculations. Methods: The algorithm involves a multiphase pixel-level classification, using a comprehensive group of features computed from regional intensity, shape, and textures, to generate a mass-conditional probability map (PM). Then, the mass candidate, along with the background clutters consisting of breast fibroglandular and other nonmass tissues, is extracted from the PM by integrating the prior knowledge of shape and location of masses. A multiscale steerable ridge detection algorithm is employed to detect spiculations. Finally, all the object-level findings, including mass candidate, detected spiculations, and clutters, along with the PM, are integrated by graph cuts to generate the final segmentation mask. Results: The method was tested on 54 masses (51 malignant and 3 benign), all with ill-defined margins and irregular shape or spiculations. The ground truth delineations were provided by five experienced radiologists. Area overlapping ratio of 0.689 ({+-}0.160) and 0.540 ({+-}0.164) were obtained for segmenting entire mass and margin portion only, respectively. Williams index of area and contour based measurements indicated that the segmentation results of the algorithm agreed well with the radiologists' delineation. Conclusions: The proposed approach could closely delineate the mass body. Most importantly, it is capable of including mass margin and its spicule extensions which are considered as key features for breast lesion analyses.

  12. Are both BL Lacs and pulsar wind nebulae the astrophysical counterparts of IceCube neutrino events?

    E-Print Network [OSTI]

    P. Padovani; E. Resconi

    2014-06-10T23:59:59.000Z

    IceCube has recently reported the discovery of high-energy neutrinos of astrophysical origin, opening up the PeV (10^15 eV) sky. Because of their large positional uncertainties, these events have not yet been associated to any astrophysical source. We have found plausible astronomical counterparts in the GeV -- TeV bands by looking for sources in the available large area high-energy gamma-ray catalogues within the error circles of the IceCube events. We then built the spectral energy distribution of these sources and compared it with the energy and flux of the corresponding neutrino. Likely counterparts include mostly BL Lacs and two Galactic pulsar wind nebulae. On the one hand many objects, including the starburst galaxy NGC 253 and Centaurus A, despite being spatially coincident with neutrino events, are too weak to be reconciled with the neutrino flux. On the other hand, various GeV powerful objects cannot be assessed as possible counterparts due to their lack of TeV data. The definitive association between high-energy astrophysical neutrinos and our candidates will be significantly helped by new TeV observations but will be confirmed or disproved only by further IceCube data. Either way, this will have momentous implications for blazar jets, high-energy astrophysics, and cosmic-ray and neutrino astronomy.

  13. Detection of Exceptional X-Ray Spectral Variability in the TeV BL Lac 1ES 2344+514

    E-Print Network [OSTI]

    P. Giommi; P. Padovani; E. Perlman

    1999-07-27T23:59:59.000Z

    We present the results of six BeppoSAX observations of 1ES 2344+514, five of which were taken within a week. 1ES 2344+514, one of the few known TeV BL Lac objects, was detected by the BeppoSAX Narrow Field Instruments between 0.1 to \\~50 keV. During the first five closely spaced observations 1ES 2344+514 showed large amplitude luminosity variability, associated with spectacular spectral changes, particularly when compared to the last observation when the source was found to be several times fainter, with a much steeper X-ray spectrum. The energy dependent shape of the lightcurve and the spectral changes imply a large shift (factor of 30 or more in frequency) of the peak of the synchrotron emission. At maximum flux the peak was located at or above 10 keV, making 1ES 2344+514 the second blazar (after MKN501) with the synchrotron peak in the hard X-ray band. The shift, and the corresponding increase in luminosity, might be due to the onset of a second synchrotron component extending from the soft to the hard X-ray band where most of the power is emitted. Rapid variability on a timescale of approximately 5000 seconds has also been detected when the source was brightest.

  14. The Long Term Optical Variability of the BL Lac object S5 0716+714: Evidence for a Precessing Jet

    E-Print Network [OSTI]

    R. Nesci; E. Massaro; C. Rossi; S. Sclavi; M. Maesano; F. Montagni

    2005-06-08T23:59:59.000Z

    We present the historic light curve of the BL Lac object S5 0716+714, spanning the time interval from 1953 to 2003, built using Asiago archive plates and our recent CCD observations, together with literature data. The source shows an evident long term variability, over which well known short term variations are superposed. In particular, in the period from 1961 to 1983 the mean brightness of S5 0716+714 remained significantly fainter than that observed after 1994. Assuming a constant variation rate of the mean magnitude we can estimate a value of about 0.11 magnitude/year. The simultaneous occurrence of decreasing ejection velocities of superluminal moving components in the jet reported by Bach et al. (2005) suggests that both phenomena are related to the change of the direction of the jet to the line of sight from about 5 to 0.7 degrees for an approximately constant bulk Lorentz factor of about 12. A simple explanation is that of a precessing relativistic jet, which should presently be close to the smallest orientation angle. One can therefore expect in the next ten years a decrease of the mean brightness of about 1 magnitude.

  15. MENINGOCOCCAL DISEASE INFORMATION OVERVIEW/KEY POINTS

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and in the community? You can help prevent the spread of illnesses by: Covering your mouth and nose when coughing or sneezing. Cover your mouth and nose with a tissue when coughing or sneezing. It may prevent those around

  16. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  17. Reducing Your Risk of Foodborne Illness at Home

    E-Print Network [OSTI]

    Nutrition, Food and

    2008-12-17T23:59:59.000Z

    as one-half of all foodborne illnesses could be prevented if people washed their hands. Wash your hands before and while preparing food, especially if you touch raw meat, poultry, eggs, or seafood. Also wash your hands after sneezing, coughing...

  18. Ill-posed problems in thermomechanics Michael Dreher

    E-Print Network [OSTI]

    Racke, Reinhard

    or the delay time plays an important role. Single- and dual-phase- lag heat conduction models can" (RA 504/3-3). 1 #12;Heat conduction is usually described by means of the energy equation t + div q: hyperbolic models in heat conduction, stability, ill-posed 1 Supported by the project "Estudio Cualitativo de

  19. IlIill Ills i.iiiii lilt

    E-Print Network [OSTI]

    Handy, Todd C.

    . .:.. F I, IlIill Ills i.iiiii lilt ``a ``I [. TOWN .,. .., . THE JOURNAL I 0 F TH E j " ; PLANNJNG INS3DFDUTE : 4, cE - . : .,., ? DECEMBER 1926 / VOLV ?40 "/1 I'. CONTENT I TOWN PLANNING THE BRITISH COLUMBIA UNIVERSITY LANDS A GREAT TOWN PLANNING SCHEME FOR WESTERN CANADA; BRITIH HOUSIN

  20. A dilution refrigerator insert for standard ILL cryostats K. Neumaier

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    773 A dilution refrigerator insert for standard ILL cryostats K. Neumaier WMI Garching, F.R.G. A-1.2 K) the sample stick was replaced by a dilution refrigerator insert with a minimum no temperatures, we replaced the sample stick by a dilution refrigerator insert (Fig. 1). The large cooling power

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. The Intra-Night Optical Variability of the bright BL Lac object S5 0716+714

    E-Print Network [OSTI]

    F. Montagni; A. Maselli; E. Massaro; R. Nesci; S. Sclavi; M. Maesano

    2005-12-19T23:59:59.000Z

    We address the topic of the Intra-Night Optical Variability of the BL Lac object S5 0716+714. To this purpose a long term observational campaign was performed, from 1996 to 2003, which allowed the collection of a very large data set, containing 10,675 photometric measurements obtained in 102 nights. The source brightness varied in a range of about 2 mag, although the majority of observations were performed when it was in the range 13.0 < R < 13.75. Variability time scales were estimated from the rates of magnitude variation, which were found to have a distribution function well fitted by an exponential law with a mean value of 0.027 mag/h, corresponding to an e-folding time scale of the flux tau_F = 37.6 h. The highest rates of magnitude variation were around 0.10--0.12 mag/h and lasted less than 2 h. These rates were observed only when the source had an R magnitude < 13.4, but this finding cannot be considered significant because of the low statistical occurrence. The distribution of tau_F has a well defined modal value at 19 h. Assuming the recent estimate of the beaming factor delta about 20, we derived a typical size of the emitting region of about 5 times 10^{16}/(1 + z) cm. The possibility to search for a possible correlation between the mean magnitude variation rate and the long term changes of the velocity of superluminal components in the jet is discussed.

  3. INJURY AND ILLNESS PREVENTION PROGRAM This Injury and Illness Prevention Program has been prepared by the University of California,

    E-Print Network [OSTI]

    Guo, Ting

    methods: Standard Operating Procedures Manual (laboratory specific and available on SmartSite) Safety Data with University Policy (UCD Policy & Procedure Manual Section 290-15: Safety Management Program) and California for the implementation and maintenance of the Injury and Illness Prevention Program (IIPP) is in accordance

  4. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  5. 2003 Oak Ridge National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for ORNL. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  6. 2003 Idaho National Engineering and Environmental Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Idaho National Lab. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  7. 2006 Los Alamos National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-06-13T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  8. 2006 Oak Ridge National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-05-16T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  9. 2007 East Tennessee Technology Park Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-07-13T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  10. 2010 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-31T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  11. 2006 Lawrence Livermore National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-03-27T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  12. 2004 Hanford Site Annual Illness and Injury Surveillance Report, Revised October 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-24T23:59:59.000Z

    Annual Illness and Injury Surveillance Program for 2004 for the Hanford site. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  13. 2007 Lawrence Livermore National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-05-20T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  14. 2010 East Tennessee Technology Park Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-16T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  15. 2010 Oak Ridge National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-07-28T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  16. 2006 Sandia National Laboratories--Albuquerque Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-05-13T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  17. 2006 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-04-17T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  18. 2010 Nevada National Security Site Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-07-28T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  19. 2010 Lawrence Livermore National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-16T23:59:59.000Z

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  20. Evolution of an Early Illness Warning System to Monitor Frail Elders in Independent Living

    E-Print Network [OSTI]

    He, Zhihai "Henry"

    Evolution of an Early Illness Warning System to Monitor Frail Elders in Independent Living Gregory the evolution of an early illness warning system used by an interdisciplinary team composed of clinicians and engineers in an independent living facility. The early illness warning system consists of algorithms which

  1. w: www.sheffield.ac.uk/uspsreview e: uspsreview@sheffield.ac.uk t: 0114 22 24493 Key features at a glance

    E-Print Network [OSTI]

    Dixon, Peter

    retirement, early retirement and late retirement. Ill-health retirement available on the basis of either Retirement Plan. Key features at a glance What are the member contribution levels? Eligibility All members to the benefits built up each year? Each year the benefits already built up in the member's Flexible Retirement

  2. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  3. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  4. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  5. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  6. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  7. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  8. Disentangling the synchrotron and Inverse Compton variability in the X-ray emission of the intermediate BL Lac object S5 0716+71

    E-Print Network [OSTI]

    E. Ferrero; S. J. Wagner; D. Emmanoulopoulos; L. Ostorero

    2006-07-24T23:59:59.000Z

    The possibility to detect simultaneously in the X-ray band the synchrotron and Inverse Compton (IC)emission of intermediate BL Lac objects offers the unique opportunity to study contemporaneously the low- and high-energy tails of the electron distribution in the jets of these sources. We attempted to disentangle the X-ray spectral variability properties of both the low- and high-energy ends of the synchrotron and Inverse Compton emission of the intermediate BL Lac object S5 0716+71. We carried out spectral, temporal and cross-correlation analyses of the data from a long XMM-Newton pointing of S5 0716+71 and we compared our findings with previous results from past X-ray observations. Strong variability was detected during the XMM exposure.Both the synchrotron and Inverse Compton components were found to vary on time scales of hours, implying a size of the emitting region of $R\\la 0.7\\delta /(1+z)$ light-hours. The synchrotron emission was discovered to become dominant during episodes of flaring activity, following a harder-when-brighter trend. Tight correlations were observed between variations in different energy bands. Upper limits on time lags between the soft and hard X-ray light curves are of the order of a few hundred seconds.

  9. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

  10. Injury and Illness Reporting Guide | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking of BlytheDepartment ofEnergy Information forInjury and Illness Reporting

  11. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  12. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  13. 2003 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Y-12. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  14. 2003 Pantex Plant Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-05T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the Pantex Plant. DOE is commited to assuring the health and safety of its workers. This includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  15. 2003 Kansas City Plant Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-04T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the Kansas City Plant. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  16. 2003 Fernald Environmental Management Project Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-04T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the Fernald Environmental Management Project. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  17. 2003 Los Alamos National Laboratory Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-04T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Los Alamos National Lab. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  18. 2003 Sandia National Laboratories--Albuquerque Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Sandia National Laboratories-Albuquerque. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  19. 2003 Lawrence Livermore National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Lawrence Livermore National Lab. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  20. 2003 Savannah River Site Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-05T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the Savannah River Site. DOE is commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The report monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  1. 2003 Brookhaven National Laboratory Annual Illness and Injury Surveillance Report, Revised September 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-02T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for Brookhaven National Lab. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  2. 2008 Lawrence Livermore National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-09-21T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  3. 2007 Los Alamos National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-06-30T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  4. 2007 Oak Ridge National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-03-04T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  5. 2004 Hanford Site Annual Illness and Injury Surveillance Report, Revised October 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-24T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2004 for the Hanford site. The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  6. 2003 Hanford Site Annual Illness and Injury Surveillance Report, Revised October 2007

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-10-24T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for the Hanford site. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers. The prpogram is part of DOE's commitment to assuring the health and safety of its workers and includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers.

  7. 2007 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-07-01T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  8. 2009 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-07-09T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  9. 2008 East Tennessee Technology Park Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-10-26T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  10. 2008 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-12-11T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  11. 2008 Oak Ridge National Laboratory Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-12-14T23:59:59.000Z

    The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  12. 2003 East Tennessee Technology Park Annual Illness and Injury Surveillance Report

    SciTech Connect (OSTI)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23T23:59:59.000Z

    Annual Illness and Injury Surveillance Program report for 2003 for the East Tennessee Technology Park (K-25).The U.S. Department of Energys (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  13. australian chronically-ill adults: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with a chronic illness, they eventually undergo the transition from paediatric health care to adult health care. This transition typically occurs simultaneously with other...

  14. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  15. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  16. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  17. Taking a Second Look at Heat Illness in MICASA, Follow Up 2

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    Taking a Second Look at Heat Illness in MICASA, Follow Up 2 Alondra Vega Western Center farm worker households from the city of Mendota It began in 2006-2007 and the study had two follow up interviews since then. Questions regarding heat illness were implemented in the first follow-up

  18. ON THE BEHAVIOR OF THE CONJUGATE-GRADIENT METHOD ON ILL-CONDITIONED PROBLEMS

    E-Print Network [OSTI]

    Forsgren, Anders

    ON THE BEHAVIOR OF THE CONJUGATE-GRADIENT METHOD ON ILL-CONDITIONED PROBLEMS Anders FORSGREN Abstract We study the behavior of the conjugate-gradient method for solving a set of linear equations. conjugate-gradient method, symmetric positive-definite ma- trix, ill-conditioning AMS subject

  19. From the Editor Knife Features of Key Gamma

    E-Print Network [OSTI]

    West, Stuart

    and the Anxiety State Anxiety Neurosis Interview Drug Addiction and Its Remedies A Wonder Brain Disease Treatment. The Stethoscope has chosen this week's Cover Story on Psychiatric illness to focus on the causes, treatment, care? The Treatment of Psychiatric Illness Psychological Treatment General Measures or Simple Psychotherapy Simple

  20. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  1. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  2. Poisson Regression Analysis of Illness and Injury Surveillance Data

    SciTech Connect (OSTI)

    Frome E.L., Watkins J.P., Ellis E.D.

    2012-12-12T23:59:59.000Z

    The Department of Energy (DOE) uses illness and injury surveillance to monitor morbidity and assess the overall health of the work force. Data collected from each participating site include health events and a roster file with demographic information. The source data files are maintained in a relational data base, and are used to obtain stratified tables of health event counts and person time at risk that serve as the starting point for Poisson regression analysis. The explanatory variables that define these tables are age, gender, occupational group, and time. Typical response variables of interest are the number of absences due to illness or injury, i.e., the response variable is a count. Poisson regression methods are used to describe the effect of the explanatory variables on the health event rates using a log-linear main effects model. Results of fitting the main effects model are summarized in a tabular and graphical form and interpretation of model parameters is provided. An analysis of deviance table is used to evaluate the importance of each of the explanatory variables on the event rate of interest and to determine if interaction terms should be considered in the analysis. Although Poisson regression methods are widely used in the analysis of count data, there are situations in which over-dispersion occurs. This could be due to lack-of-fit of the regression model, extra-Poisson variation, or both. A score test statistic and regression diagnostics are used to identify over-dispersion. A quasi-likelihood method of moments procedure is used to evaluate and adjust for extra-Poisson variation when necessary. Two examples are presented using respiratory disease absence rates at two DOE sites to illustrate the methods and interpretation of the results. In the first example the Poisson main effects model is adequate. In the second example the score test indicates considerable over-dispersion and a more detailed analysis attributes the over-dispersion to extra-Poisson variation. The R open source software environment for statistical computing and graphics is used for analysis. Additional details about R and the data that were used in this report are provided in an Appendix. Information on how to obtain R and utility functions that can be used to duplicate results in this report are provided.

  3. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  4. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  5. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  6. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  7. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance Trusted security policy routines Secure and authentic key storage

  8. Nitrogen dioxide and respiratory illness in children. Part I: Health outcomes

    SciTech Connect (OSTI)

    Samet, J.M.; Lambert, W.E.; Skipper, B.J.; Cushing, A.H.; Hunt, W.C.; Young, S.A.; McLaren, L.C.; Schwab, M.; Spengler, J.D. (Univ. of New Mexico Medical Center, Albuquerque (United States))

    1993-06-01T23:59:59.000Z

    We have carried out a prospective cohort study to test the hypothesis that exposure to nitrogen dioxide increases the incidence and severity of respiratory infections during the first 18 months of life. Between January 1988 and June 1990, 1,315 infants were enrolled into the study at birth and followed with prospective surveillance for the occurrence of respiratory infections and monitoring of nitrogen dioxide concentrations in their homes. The subjects were healthy infants from homes without smokers; they were selected with stratification by type of cooking stove at a ratio of four to one for gas and electric stoves. Illness experience was monitored by a daily diary of symptoms completed by the mother and a telephone interview conducted every two weeks. Illnesses with wheezing or wet cough were classified as involving the lower respiratory tract; all other respiratory illnesses were designated as involving the upper respiratory tract. Exposure to nitrogen dioxide was estimated by two-week average concentrations measured in the subjects' bedrooms with passive samplers. This analysis is limited to the 1,205 subjects completing at least one month of observation; of these, 823 completed the full protocol, contributing 82.8% of the total number of days during which the subjects were under observation. Incidence rates for all respiratory illnesses, all upper respiratory illness, all lower respiratory illnesses, and lower respiratory illness further divided into those with any wheezing, or wet cough without wheezing, were examined within strata of nitrogen dioxide exposure at the time of the illness, nitrogen dioxide exposure during the prior month, and type of cooking stove. Consistent trends of increasing illness incidence rates with increasing exposure to nitrogen dioxide were not evident for either the lagged or unlagged exposure variables.

  9. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  10. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  11. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  12. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  13. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  14. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  15. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  16. The relationship of multiple aspects of stigma and personal contact with someone hospitalized for mental illness, in a nationally representative sample

    E-Print Network [OSTI]

    Boyd formerly Ritsher, Jennifer E; Katz, Emerald P; Link, Bruce G; Phelan, Jo C

    2009-01-01T23:59:59.000Z

    ill: results of representative surveys in the Federala model using data from a representative population survey.illness, in a nationally representative sample Jennifer E.

  17. The relationship of multiple aspects of stigma and personal contact with someone hospitalized for mental illness, in a nationally representative sample

    E-Print Network [OSTI]

    Boyd, Jennifer E.; Katz, Emerald P.; Link, Bruce G.; Phelan, Jo C.

    2010-01-01T23:59:59.000Z

    ill: results of representative surveys in the Federala model using data from a representative population survey.illness, in a nationally representative sample Jennifer E.

  18. Detection of TeV Gamma-Rays from the BL Lac 1ES1959+650 in its low states and during a major outburst in 2002

    E-Print Network [OSTI]

    Aharonian, F A; Borst, H G; Bojahr, H; Bolz, O; Coarasa, T; Contreras, J L; Cortina, J; Denninghoff, S; Fonseca, M V; Girma, M; Gtting, N; Heinzelmann, G; Hermann, G; Heusler, A; Hofmann, W; Horns, D; Jung, I; Kankanyan, R; Kestel, M; Kohnle, A; Konopelko, A; Kornmeyer, H; Kranich, D; Lampeitl, H; Lpez, M; Lorenz, E; Lucarelli, F; Mang, O; Meyer, H; Mirzoyan, R; Moralejo, A; Oa-Wilhelmi, E; Panter, M; Plyasheshnikov, A V; Phlhofer, G; De los Reyes, R; Rhode, W; Ripken, G; Robrade, J; Rowell, G; Sahakian, V V; Samorski, M; Schilling, M; Siems, M; Sobzynska, D; Stamm, W; Tluczykont, M; Vitale, V; Vlk, H J; Wiedner, C A; Wittek, W

    2003-01-01T23:59:59.000Z

    TeV gamma-rays from the BL Lac object 1ES1959+650 have been measured during the years 2000 and 2001 with a significance of 5.2 sigma at a value of 5.3% of the Crab flux and in May 2002 during strong outbursts with > 23 sigma at a flux level of up to 2.2 Crab, making 1ES1959+650 the TeV Blazar with the third best event statistics. The deep observation of 197.4 h has been performed with the HEGRA stereoscopic system of 5 imaging atmospheric Cherenkov telescopes (IACT system). 1ES1959+650 is located at a redshift of z = 0.047, providing an intermediate distance between the nearby Blazars Mkn 421 and Mkn 501, and the much more distant object H1426+428. This makes 1ES1959+650 an important candidate of the class of TeV Blazars in view of the absorption of TeV photons by the diffuse extragalactic background radiation (DEBRA). The differential energy spectrum of 1ES1959+650 during the flares can be well described by a power law with an exponential cut-off at (4.2 (+0.8 -0.6)_stat +- 0.9_sys) TeV and a spectral index ...

  19. Perplexing correlations between Gamma-ray emission and parsec-scale jet orientation variations in the BL Lac object S5 0716+714

    E-Print Network [OSTI]

    Rani, B; Marscher, A P; Jorstad, S G; Hodgson, J A; Fuhrmann, L; Zensus, J A

    2015-01-01T23:59:59.000Z

    The analysis of $\\gamma$-ray flux variability along with the parsec-scale jet kinematics suggests that the high-energy radiation in the BL Lac object S5 0716+714 has a significant correlation with the mm-VLBI core flux density and with the local orientation of the inner jet flow. For the first time in any blazar, we report a significant correlation between the $\\gamma$-ray flux variations and the variations in the local orientation of the jet outflow (position angle). We find that the $\\gamma$-ray flux variations lead the 7~mm VLBI core flux variations by 82$\\pm$32~days, which suggests that the high-energy emission in S5 0716+714 is coming from a region located 3.8$\\pm$1.9~parsecs closer to the central black hole than the "core" seen on the mm-VLBI images. The results imply a strong physical and casual connection between $\\gamma$-ray emission and the inner jet morphology in the source.

  20. Tactics of diabetes control: Turkish immigrant experiences with chronic illness in Berlin, Germany.

    E-Print Network [OSTI]

    Guell, Cornelia

    2009-01-01T23:59:59.000Z

    This thesis explores Turkish migrants practices of diabetes care in Germany. Health statistics frequently identify minority groups as vulnerable to chronic illness and Turkish-origin Germans are said to be more likely ...

  1. The influence of contagion information and behavior on older adolescents' perceptions of peers with chronic illness

    E-Print Network [OSTI]

    Grizzle, Jonhenry Cordell

    2005-11-01T23:59:59.000Z

    To explore attributions about chronically ill peers, 545 older adolescents ages 17-26 read a short vignette describing a brief social encounter with a hypothetical peer suffering from a medical condition, and then responded ...

  2. ILLiad and the new brand of ILL service in the University of Edinburgh

    E-Print Network [OSTI]

    Lobban, Marjory

    2011-01-01T23:59:59.000Z

    Purpose To describe the introduction of ILLiad at the University of Edinburgh and its wider impact Design/Methodology/approach a hands on description by a practitioner of an ILL system new to the UK Findings That ...

  3. ILL, a dying breed or a new brand? The experience of Edinburgh University

    E-Print Network [OSTI]

    Lobban, Marjory

    2006-01-01T23:59:59.000Z

    Purpose The purpose of this article is to examine the trend of interlibrary loans (ILLs) through the experiences of Edinburgh University Library (EUL). A preliminary study aims to consider how the purchase of one e-journal package impacted...

  4. The influence of contagion information and behavior on older adolescents' perceptions of peers with chronic illness

    E-Print Network [OSTI]

    Grizzle, Jonhenry Cordell

    2005-11-01T23:59:59.000Z

    To explore attributions about chronically ill peers, 545 older adolescents ages 17-26 read a short vignette describing a brief social encounter with a hypothetical peer suffering from a medical condition, and then responded to a series...

  5. On rate optimality for ill-posed inverse problems in econometrics

    E-Print Network [OSTI]

    Chen, Xiaohong

    2007-01-01T23:59:59.000Z

    In this paper, we clarify the relations between the existing sets of regularity conditions for convergence rates of nonparametric indirect regression (NPIR) and nonparametric instrumental variables (NPIV) regression models. We establish minimax risk lower bounds in mean integrated squared error loss for the NPIR and the NPIV models under two basic regularity conditions that allow for both mildly ill-posed and severely ill-posed cases. We show that both a simple projection estimator for the NPIR model, and a sieve minimum distance estimator for the NPIV model, can achieve the minimax risk lower bounds, and are rate-optimal uniformly over a large class of structure functions, allowing for mildly ill-posed and severely ill-posed cases.

  6. Getting over an illness can take days. Getting a shot to help prevent it

    E-Print Network [OSTI]

    Getting over an illness can take days. Getting a shot to help prevent it takes just minutes. Save's Supermarkets Safeway Save Mart Supermarkets Schnucks Markets Shopko Stores Strategic Health Alliance/ Mc

  7. Grandparenting in the 21st Problems such as substance abuse, catastrophic illness, teen pregnancy, incarceration, unemployment,

    E-Print Network [OSTI]

    Grandparenting in the 21st Century Problems such as substance abuse, catastrophic illness, teen. The following information from the Texas A&M AgriLife Extension Service may be helpful Take Care of Yourself

  8. AMSC 600/CMSC 760 Numerical Solution of Ill-Posed Problems

    E-Print Network [OSTI]

    O'Leary, Dianne P.

    AMSC 600/CMSC 760 Fall 2007 Numerical Solution of Ill-Posed Problems Part 1 Dianne P. O'Leary c: Kronecker Product Structure Reference: James G. Nagy and Dianne P. O'Leary, "Image Deblurring: I Can See

  9. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  10. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  11. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  12. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  13. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  14. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  15. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  16. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  17. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Bchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estve; S. Eydelman; E. Fanchini; C. Frber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Gbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gndara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugs; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefranois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Prez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  18. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  19. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  20. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! Drivers should sit with at least

  1. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  2. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology Despite the focus here on global issues, we need to recognize that Mongolia

  3. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  4. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  5. The BL Lac objects OQ 530 and S5 0716+714. Simultaneous observations in the X-rays, radio, optical and TeV bands

    E-Print Network [OSTI]

    G. Tagliaferri; M. Ravasio; G. Ghisellini; P. Giommi; E. Massaro; R. Nesci; G. Tosti; M. F. Aller; H. D. Aller; A. Celotti; L. Maraschi; F. Tavecchio; A. Wolter

    2003-01-07T23:59:59.000Z

    We present the results of the BeppoSAX observations of two BL Lacs, OQ 530 and S5 0716+714, as part of a ToO program for the simultaneous observation at radio, optical, X-ray and TeV energies. Both sources are detected in the LECS and MECS, with S5 0716+714 visible also in the PDS band, up to about 60 keV. The X-ray spectra of both sources are better fitted by a double power-law model, with a steep soft X-ray component flattening at harder energies, with breaks at 0.3 and 1.5 keV, respectively. The concave shape of the spectra in both objects is consistent with soft X-rays being produced by the synchrotron and harder X-rays by the inverse Compton processes. Also the X-ray variability properties confirm this scenario, in particular for S5 0716+714 our observation shows variations by about a factor 3 over one hour below 3 keV and no variability above. Their simultaneous broad band energy spectral distributions can be successfully interpreted within the frame of a homogeneous synchrotron and inverse Compton model, including a possible contribution from an external source of seed photons with the different spectral states of S5 0716+714 being reproduced by changing the injected power. The resulting parameters are fully consistent with the two sources being intermediate objects within the "sequence" scenario proposed for blazars.

  6. Space-VLBI Polarimetry of the BL Lac Object S5 0716+714: Rapid Polarization Variability in the VLBI core

    E-Print Network [OSTI]

    U. Bach; T. P. Krichbaum; A. Kraus; A. Witzel; J. A. Zensus

    2006-03-31T23:59:59.000Z

    To determine the location of the intra-day variable (IDV) emission region within the jet of the BL Lac object S5 0716+714, a multi-epoch VSOP polarization experiment was performed in Autumn 2000. To detect, image, and monitor the short term variability of the source, three space-VLBI experiments were performed with VSOP at 5 GHz, separated in time by six days and by one day. Quasi-contemporaneous flux density measurements with the Effelsberg 100 m radio telescope during the VSOP observations revealed variability of about 5% in total intensity and up to 40% in linear polarization in less than one day. Analysis of the VLBI data shows that the variations are located inside the VLBI core component of 0716+714. In good agreement with the single-dish measurements, the VLBI ground array images and the VSOP images, both show a decrease in the total flux density of ~20 mJy and a drop of ~5 mJy in the linear polarization of the VLBI core. During the observing interval, the polarization angle rotated by about 15 degrees. No variability was found in the jet. The high angular-resolution VSOP images are not able to resolve the variable component and set an upper limit of <0.1 mas to the size of the core component. From the variability timescales we estimate a source size of a few micro-arcseconds and brightness temperatures exceeding 10^15 K. We discuss the results in the framework of source-extrinsic (interstellar scintillation induced) and source-intrinsic IDV models.

  7. Hubble Space Telescope imaging and ground-based spectroscopy of old nova shells - I. FH Ser, V533 Her, BT Mon, DK Lac, V476 Cyg

    E-Print Network [OSTI]

    C. D. Gill; T. J. O'Brien

    2000-01-06T23:59:59.000Z

    In this paper we report on the first five out of eleven observations in our programme of Hubble Space Telescope (HST) imaging of old nova shells. We present new WFPC2 images of the shells around FH Ser and V533 Her taken in the F656N (Halpha+[NII]) filter. We also show long-slit spectra taken using the William Herschel Telescope (WHT) in La Palma for these objects in the same spectral range. The shell around FH Ser is found to be a prolate ellipsoid of ellipticity 1.3 +/- 0.1 inclined at 62 +/- 4 deg to the line of sight. The shell has an equatorial ring which is found to be due to increased emission in the two [NII] lines rather than Halpha. The expansion velocity, systemic velocity and distance are found to be 490 +/- 20 km/s, -45 km/s and 950 +/- 50 pc. The origin of the [NII] equatorial ring is discussed in the context of a photoionization feature resulting from aspherical illumination by the central source rather than a simple density enhancement. It is possible however that the ring is also in part due to an extremely localised increase in the nitrogen abundance. Similar imaging and spectroscopy of the nova V533 Her reveal a shell of radius 5 +/- 0.7 arcsec with an axial ratio of 1.2 +/- 0.2, expansion velocity of 850 +/- 150 km/s and distance 1250 +/- 300 pc. The shells around BT Mon, DK Lac and V476 Cyg were not detected with HST.

  8. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  9. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  10. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  11. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  12. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  13. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  14. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  15. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  16. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  17. Carleman estimates for the regularization of ill-posed Cauchy problems

    E-Print Network [OSTI]

    Michael V. Klibanov

    2014-10-28T23:59:59.000Z

    This is a survey, which is a continuation of the previous survey of the author about applications of Carleman estimates to Inverse Problems, J. Inverse and Ill-Posed Problems, 21, 477-560, 2013. It is shown here that Tikhonov functionals for some ill-posed Cauchy problems for linear PDEs can be generated by unbounded linear operators of those PDEs. These are those operators for which Carleman estimates are valid, e.g. elliptic, parabolic and hyperbolic operators of the second order. Convergence rates of minimizers are established using Carleman estimates. Generalizations to nonlinear inverse problems, such as problems of reconstructions of obstacles and coefficient inverse problems are discussed as well.

  18. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  19. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  20. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  1. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  2. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  3. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  4. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  5. Program Elements 2012 2013 3.3.3.1.1 Injury and Illness Prevention

    E-Print Network [OSTI]

    New Hampshire, University of

    Program Elements 2012 2013 3.3.3.1.1 Injury and Illness Prevention 3.3.3.1.2.1 Industrial Hygiene * Asbestos Abatement ! ! * Lead Abatement ! ! * Hearing Conservation ! ! * Indoor Air Quality ! ! * Personnel Program ! ! * Bloodborne Pathogens ! ! * Workplace Safety Inspections ! ! 3.3.3.1.2.3 Radiation Safety

  6. GENERAL CO-CHAIRS: F. J. Perales (Univ. Illes Balears, Spain)

    E-Print Network [OSTI]

    Illes Balears, Universitat de les

    GENERAL CO-CHAIRS: F. J. Perales (Univ. Illes Balears, Spain) B. Fisher (University of Edinburgh, UK) PROGRAM COMMITTEE: Abásolo, M. (DMI-UIB, Spain) Aloimonos, Y. (Univ. of Maryland, USA) Bagdanov, A. D. (UAB-CVC, Spain) Baldasarri, S. (Univ. Zaragoza, Spain) Bartoli A. (CNRS_LASMEA, France

  7. Slag-Metal Reactions during Welding: Part Ill. Verification of the Theory

    E-Print Network [OSTI]

    Eagar, Thomas W.

    , Slag-Metal Reactions during Welding: Part Ill. Verification of the Theory U. MITRA and T.W. EAGAR. The transfer of carbon and oxygen is also discussed. It is shown that the transfer of oxygen into the weld of inclusions in the solidifying weld pool. Methods of applying this analysis to multipass welds and active

  8. VOLUME 7: NO. 1 JANUARY 2010 Evolving Definitions of Mental Illness

    E-Print Network [OSTI]

    Mladenoff, David

    over time, and discuss their importance in the context of health reform and health care reform. Health-being. Health care reform refers to efforts focused on illness, such as treatment of disease and related and public health. These concepts can be integrated into the national health reform and health care reform

  9. Reprinted from March 1989, Vol. Ill, Jouma! of Applied Mechanics J. M. Powers

    E-Print Network [OSTI]

    Reprinted from March 1989, Vol. Ill, Jouma! of Applied Mechanics J. M. Powers Visiting Assistant. Herman Krier Professor, Department of Mechanical and Industrial Engineering, Mem.ASME University be addressed to the Editorial Department, ASME, United Engineering Center, 345 East 47th Street, New York, N

  10. CEm FORI~ill~~IIUllwcHUBMRY THE TECHNICAL, ENGINEERING, AND ECONOMIC

    E-Print Network [OSTI]

    CEm FORI~ill~~IIUllwcHUBMRY L000282 THE TECHNICAL, ENGINEERING, AND ECONOMIC FEASIBILITY OF A HIGH engineering (each team supervised by one of the principal investigators) addressed the main issues of vehicle characteristics and driver issues. The three basic components of a transportation system - fixed facilities, flow

  11. Accident, Illness and Liability Coverage Risk Management in the 4-H Youth Development Program

    E-Print Network [OSTI]

    Tullos, Desiree

    1 Accident, Illness and Liability Coverage Risk Management in the 4-H Youth Development Program for injuries or damages to person or property of others (tort liability), when the volunteer is: · Working volunteer, and enrolled or listed with the Oregon State University Extension 4-H Youth Development Program

  12. ASU SUPERVISOR'S ACCIDENT/ILLNESS INVESTIGATION FORM Return to: ASU Office of Human Resources, Workers' Comp Office,

    E-Print Network [OSTI]

    Thaxton, Christopher S.

    ASU SUPERVISOR'S ACCIDENT/ILLNESS INVESTIGATION FORM Return to: ASU Office of Human Resources or as soon as possible after the accident/illness. IMMEDIATELY report all accidents involving serious bodily injury or death to the HR Workers' Comp Office (X 6488) ACCIDENT DATA 1. Name of Employee: SS#: SEX: Male

  13. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  14. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  15. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  16. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  17. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  18. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  19. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  20. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  1. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  2. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  3. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  4. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  5. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  6. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  7. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  8. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  9. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  10. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  11. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  12. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  13. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  14. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  15. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  16. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  17. Hybrid preconditioning for iterative diagonalization of ill-conditioned generalized eigenvalue problems in electronic structure calculations

    SciTech Connect (OSTI)

    Cai, Yunfeng, E-mail: yfcai@math.pku.edu.cn [LMAM and School of Mathematical Sciences, Peking University, Beijing 100871 (China) [LMAM and School of Mathematical Sciences, Peking University, Beijing 100871 (China); Department of Computer Science, University of California, Davis 95616 (United States); Bai, Zhaojun, E-mail: bai@cs.ucdavis.edu [Department of Computer Science and Department of Mathematics, University of California, Davis 95616 (United States)] [Department of Computer Science and Department of Mathematics, University of California, Davis 95616 (United States); Pask, John E., E-mail: pask1@llnl.gov [Condensed Matter and Materials Division, Lawrence Livermore National Laboratory, Livermore, CA 94550 (United States); Sukumar, N., E-mail: nsukumar@ucdavis.edu [Department of Civil and Environmental Engineering, University of California, Davis 95616 (United States)

    2013-12-15T23:59:59.000Z

    The iterative diagonalization of a sequence of large ill-conditioned generalized eigenvalue problems is a computational bottleneck in quantum mechanical methods employing a nonorthogonal basis for ab initio electronic structure calculations. We propose a hybrid preconditioning scheme to effectively combine global and locally accelerated preconditioners for rapid iterative diagonalization of such eigenvalue problems. In partition-of-unity finite-element (PUFE) pseudopotential density-functional calculations, employing a nonorthogonal basis, we show that the hybrid preconditioned block steepest descent method is a cost-effective eigensolver, outperforming current state-of-the-art global preconditioning schemes, and comparably efficient for the ill-conditioned generalized eigenvalue problems produced by PUFE as the locally optimal block preconditioned conjugate-gradient method for the well-conditioned standard eigenvalue problems produced by planewave methods.

  18. Creative coping: a description of experiences of families coping with chronic illness in a child

    E-Print Network [OSTI]

    McGough, Marnique

    2006-08-16T23:59:59.000Z

    CREATIVE COPING: A DESCRIPTION OF EXPERIENCES OF FAMILIES COPING WITH CHRONIC ILLNESS IN A CHILD A Dissertation by MARNIQUE MCGOUGH Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... by MARNIQUE MCGOUGH Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved as to style and content by: ______________________________ ______________________ William R. Nash...

  19. Exploring Food Insecurity among Individuals with Serious Mental Illness: A Qualitative Study

    E-Print Network [OSTI]

    Goetz, Jeannine Renee

    2008-05-05T23:59:59.000Z

    of international development work (Cook, 2002). Although several nutrition-assistance programs were established to assist vulnerable or underserved populations during prior years, it was not until 1984 that the President?s Task Force on Food Assistance demanded... EXPLORING FOOD INSECURITY AMONG INDIVIDUALS WITH SERIOUS MENTAL ILLNESS: A QUALITATIVE STUDY BY Jeannine Renee Goetz Submitted to the graduate degree program in Occupational Therapy and the Graduate Faculty of the University of Kansas...

  20. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  1. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  2. QKD with finite resources: secret key rates via Rnyi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bru

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  3. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  4. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  5. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  6. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  7. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream cipher via one of the usual blockchaining methods). We use the publickey encryption

  8. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  10. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  11. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  12. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  13. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  14. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  15. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  16. Moab Project Logs 2 Million Work Hours Without Lost-Time Injury or Illness

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National 93-4EnergyMissionIllness | Department of|

  17. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  18. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  19. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  20. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  1. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  2. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  3. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  4. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  5. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyyti, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  6. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  7. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  8. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  9. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  10. Probiotics' effects on the incidence of nosocomial pneumonia in critically ill patients: a systematic review and meta-analysis

    E-Print Network [OSTI]

    2012-01-01T23:59:59.000Z

    effects of selective decontamination on resistant Gram-versus antibiotic decontamination of the digestive tract:diges- tive tract decontamination in critically ill patients

  11. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  12. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  13. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  14. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  15. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music by C.and model for the poetry of Edgar Bowers. From his earliest

  16. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Frhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  17. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rod

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  18. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  19. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  20. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Ltkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  1. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  2. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12; Introduction Platforms carrying acoustics Methods Applications What we have done Applications What we would like to do #12; Introduction Platforms carrying acoustics

  3. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  4. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    ystein Mary; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  5. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  6. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  7. Get better without using antibiotics This leaflet explains the need to get the right treatment for common illnesses

    E-Print Network [OSTI]

    Royal Holloway, University of London

    for common illnesses such as colds and coughs without encouraging antibiotic resistance. How should I treat my cold? The best way to treat most colds, coughs or sore throats is to drink plenty of fluids and to rest. Colds can last about two weeks and may end with a cough and bringing up phlegm. There are many

  8. Uniqueness for an ill-posed reaction-dispersion model. Application to organic pollution in stream-waters

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Uniqueness for an ill-posed reaction-dispersion model. Application to organic pollution in stream-waters waters. The sources we consider are point-wise and simulate stationary or moving pollution sources to measure the pollution extent due to organic agents and then to evaluate the water characteristics. Another

  9. U.S. Recordable Injury and Illness Rates and Lost Workday Rates Lowest Since BLS Began Reporting

    Broader source: Energy.gov [DOE]

    Acting Assistant Secretary for the Occupational Safety and Health Administration (OSHA), Jonathan L. Snare, told a gathering of safety and health professionals at the American Society of Safety Engineers Annual National Conference in New Orleans, LA, that the nations recordable injury and illness rates have declined 7.1 percent from 2002 to 2003.

  10. THIS FORM MUST BE COMPLETED FOR ANY INJURY,WORK RELATED ILL HEALTH, DANGEROUS OCCURRENCE AND NEAR MISS IN RESPECT OF STAFF, STUDENTS, CONTRACTORS AND VISITORS

    E-Print Network [OSTI]

    THIS FORM MUST BE COMPLETED FOR ANY INJURY,WORK RELATED ILL HEALTH, DANGEROUS OCCURRENCE AND NEAR or manager may do so on their behalf. Dangerous Work related Accident Occurrence ill health Near Miss Full, dangerous occurrence or near miss. Please be as specific as possible with regard to location (address

  11. ASU SUPERVISOR'S ACCIDENT/ILLNESS INVESTIGATION FORM Return to: ASU HRS Workers' Comp Office, PO Box 32010, Founders Hall, Boone, NC 28608

    E-Print Network [OSTI]

    Thaxton, Christopher S.

    ASU SUPERVISOR'S ACCIDENT/ILLNESS INVESTIGATION FORM Return to: ASU HRS Workers' Comp Office, PO Services Workers' Comp Office within 24 hours or as soon as possible after the accident/illness. IMMEDIATELY report all accidents involving serious bodily injury or death to the Workers' Comp Office (X 6488

  12. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rod; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  13. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  14. A Key to Common Caterpillar Pests of Vegetables

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  15. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. 2:00 p

  16. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  17. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  18. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  19. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  20. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  1. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  2. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  3. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  4. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  5. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  6. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  7. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  8. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  9. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jrgen Lemming, Poul Erik

  10. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  11. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C? amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  12. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  13. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  14. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  15. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  16. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  17. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  18. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  19. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  20. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  1. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  2. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  3. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  4. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  5. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  6. Personal exposure to nitrogen dioxide and its association with respiratory illness in Hong Kong

    SciTech Connect (OSTI)

    Koo, L.C.; Ho, J.H.; Ho, C.Y.; Matsuki, H.; Shimizu, H.; Mori, T.; Tominaga, S. (Nam Long Hospital (Hong Kong))

    1990-05-01T23:59:59.000Z

    In 1985, 362 primary schoolchildren and their 319 mothers were surveyed in Hong Kong to study the possible relationship of air pollution to respiratory illnesses. Using nitrogen dioxide (NO{sub 2}) measured by personal samplers as a measure of air pollution, the study aimed to identify the major sources of NO{sub 2} in the indoor environment and see whether its increased presence was associated with respiratory symptoms. The levels of NO{sub 2} among the mothers was found to increase by 21% if dust exposure was reported from the workplace, 18% if they used such cooking fuels as liquid petroleum gas or kerosene, 11% when kitchens did not have ventilating fans, and 10% when incense was burned at home. In terms of respiratory symptoms, an increase in NO{sub 2} levels of 19% was reported among those with allergic rhinitis and 18% among those with chronic cough. The levels of NO2 among children were correlated with levels measured in classrooms, all of which had opened windows so that the NO{sub 2} came from outdoors. No association was found between children's NO{sub 2} levels and respiratory symptoms. With the exception of smoking by the father and the children's NO{sub 2} levels, no association was found between smoking at home and NO{sub 2} levels.

  7. Kalman Duality Principle for a Class of Ill-Posed Minimax Control Problems with Linear Differential-Algebraic Constraints

    SciTech Connect (OSTI)

    Zhuk, Sergiy, E-mail: sergiy.zhuk@ie.ibm.com [IBM Research-Ireland (Ireland)] [IBM Research-Ireland (Ireland)

    2013-10-15T23:59:59.000Z

    In this paper we present Kalman duality principle for a class of linear Differential-Algebraic Equations (DAE) with arbitrary index and time-varying coefficients. We apply it to an ill-posed minimax control problem with DAE constraint and derive a corresponding dual control problem. It turns out that the dual problem is ill-posed as well and so classical optimality conditions are not applicable in the general case. We construct a minimizing sequence u-circumflex{sub {epsilon}} for the dual problem applying Tikhonov method. Finally we represent u-circumflex{sub {epsilon}} in the feedback form using Riccati equation on a subspace which corresponds to the differential part of the DAE.

  8. Bleecker: WC Reporting Check List Risk Management 6/28/2012 Initial Injury/Illness Reporting Check List

    E-Print Network [OSTI]

    Prinz, Friedrich B.

    Bleecker: WC Reporting Check List Risk Management 6/28/2012 Initial Injury/Illness Reporting Check://www.stanford.edu/dept/EHS/prod/general/su17.pdf Within 24 HRS Worker & Supervisor Fax to 650-723-9456 Original to Mail Code 6207 DWC 1 http://www.stanford.edu/dept/Risk-Management-723-9456 Original to Mail Code 6207 5020 (must be typed "PCWord version" available in link below) http://www.stanford.edu/dept/Risk-Management

  9. Bleecker: WC Reporting Check List Risk Management 12/10/2012 Initial Injury/Illness Reporting Check List

    E-Print Network [OSTI]

    Prinz, Friedrich B.

    Bleecker: WC Reporting Check List Risk Management 12/10/2012 Initial Injury/Illness Reporting Check List Questions contact Department's HR or Risk Management 650-723-7400 Any Death or Serious Injury://www.stanford.edu/dept/EHS/prod/general/su17.pdf Within 24 HRS Worker & Supervisor Fax to 650-723-9456 Original to Mail Code 6207 DWC 1 http://www.stanford.edu/dept/Risk-Management

  10. The Relationship Between the Prevalence of Respiratory Illness and Dermatitis and Infant Diet in the First Year of Life

    E-Print Network [OSTI]

    Kunz, Lara

    2009-04-09T23:59:59.000Z

    for asthma and allergic disease since the 12th century when a Jewish physician and philosopher, Maimonides, produced a remedy of Rhazes to ?clear the lungs of moisture, ease respiration and eliminate the cough? (32). The relationship of the environment...-wheezing lower respiratory infections included chest infection, pneumonia, whooping cough, chronic cough, or croup. As a check for reliability and validity of parental reporting of illnesses, the investigators compared 100 hospital medical records against...

  11. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  12. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  13. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  14. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  15. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  16. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  17. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  18. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  19. Lac Courte Oreilles Hydro Dam Assessment

    SciTech Connect (OSTI)

    Weaver, Jason [Lac Courte Oreilles; Meyers, Amy [Kiser Hydro

    2014-12-31T23:59:59.000Z

    The main objective of this project was to investigate upgrading the existing hydro power generating system at the Winter Dam. The tribe would like to produce more energy and receive a fair market power purchase agreement so the dam is no longer a drain on our budget but a contributor to our economy. We contracted Kiser Hydro, LLC Engineering for this project and received an engineering report that includes options for producing more energy with cost effective upgrades to the existing turbines. Included in this project was a negotiation of energy price sales negotiations.

  20. E CO LAC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOE FacilityDimondale,South, NewDyer County, Tennessee: EnergySolar EnergyCOE CO

  1. Mille Lacs Energy Cooperative | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLu anMicrogreen Polymers Inc Jump to:JumpMidwest

  2. The effect of omega-3 and omega-6 polyunsaturated fatty acids on illness in children up to 4 years of age

    E-Print Network [OSTI]

    Foiles, Amanda

    2011-05-01T23:59:59.000Z

    OBJECTIVES: Supplementation of omega-3 (n-3) and omega-6 (n-6) long-chain polyunsaturated fatty acids (LCPUFA) during the first year of life has been associated with a decreased incidence of illness in children. The need ...

  3. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  4. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  5. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  6. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  7. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  8. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  9. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  10. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  11. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  12. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  13. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  14. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  15. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  16. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  17. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  1. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  2. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  3. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  4. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  5. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  6. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  7. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  8. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  9. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  10. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  11. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  12. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  13. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  14. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  15. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. American Society of Addiction Medicine Public Policy Statement on Healthcare and Other Licensed Professionals with Addictive Illness

    E-Print Network [OSTI]

    An Overview

    Healthcare professionals, like all individuals, are human, fallible and subject to medical illnesses, including addiction. The publicand too often the healthcare community itselfviews addiction and its prognosis for remission in a negative light. This view represents an antiquated but long standing stigma about addiction, a lack of sufficient longitudinal addiction care, sparse treatment outcome data, and inadequate dissemination of evidence-based treatment into the healthcare community and the public at large. Healthcare professionals are a unique cohort, with distinctive characteristics that come into play in the development of the illness, the course of treatment, legal and ethical ramifications and eventual outcomes. Our best data regarding licensed professionals comes from research on over three decades of physician-specific addiction treatment and monitoring. These programs were initially recommended by the American Medical Association and the Federation of State Medical Boards. Nationally, the membership organization for the majority of Physicians Health Programs (PHPs) is the Federation of State Physician Health Programs (FSPHP). These programs have continued to evolve and mature; the majority of such programs now provide assistance for other licensed

  18. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  19. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  20. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  1. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  2. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  3. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  4. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  5. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  6. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  7. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  8. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  9. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  10. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 117702 are described and two standardised as key establishment mechanism 12 in ISO/IEC 117702 [7] is vulnerable to a replay attack and also

  11. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  12. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  13. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  14. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  15. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  16. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  17. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  18. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  19. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  20. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  1. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  2. 13.13. Ctedra Sampol de Domtica i Eficincia Energtica La Ctedra Sampol de Domtica i Eficincia Energtica de la Universitat de les Illes

    E-Print Network [OSTI]

    Oro, Daniel

    'activitats docents, de recerca i difusi de l'eficincia energtica, les energies renovables, la implantaci de'Enginyers Industrials Superiors de les Illes Balears, la Conselleria de Comer, Indstria i Energia i la Conselleria de divisi d'energia de Sampol Ingeniera y Obras, SA, en la realitzaci d'estudis tcnics en el marc de la

  3. Hearing Conservation Noise-induced hearing loss is the most common job-related illness in the workplace, and it is

    E-Print Network [OSTI]

    and one variety of hearing muffs. All employees running the risk of hearing loss, must be fittedHearing Conservation Noise-induced hearing loss is the most common job-related illness in the workplace, and it is among the most avoidable. Hearing loss develops over a long period of time, and except

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  6. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  7. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  8. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  9. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  10. Age and Comorbid Illness Are Associated With Late Rectal Toxicity Following Dose-Escalated Radiation Therapy for Prostate Cancer

    SciTech Connect (OSTI)

    Hamstra, Daniel A. [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States)] [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Stenmark, Matt H.; Ritter, Tim [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States) [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Department of Radiation Oncology, Veterans Affairs Medical Center, Ann Arbor, Michigan (United States); Litzenberg, Dale; Jackson, William; Johnson, Skyler; Albrecht-Unger, Liesel; Donaghy, Alex; Phelps, Laura; Blas, Kevin; Halverson, Schuyler; Marsh, Robin; Olson, Karin [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States)] [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Feng, Felix Y., E-mail: ffeng@med.umich.edu [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States)

    2013-04-01T23:59:59.000Z

    Purpose: To assess the impacts of patient age and comorbid illness on rectal toxicity following external beam radiation therapy (EBRT) for prostate cancer and to assess the Qualitative Analysis of Normal Tissue Effects in the Clinic (QUANTEC) normal tissue complication probability (NTCP) model in this context. Methods and Materials: Rectal toxicity was analyzed in 718 men previously treated for prostate cancer with EBRT (?75 Gy). Comorbid illness was scored using the Charlson Comorbidity Index (CCMI), and the NTCP was evaluated with the QUANTEC model. The influence of clinical and treatment-related parameters on rectal toxicity was assessed by Kaplan-Meier and Cox proportional hazards models. Results: The cumulative incidence of rectal toxicity grade ?2 was 9.5% and 11.6% at 3 and 5 years and 3.3% and 3.9% at 3 and 5 years for grade ?3 toxicity, respectively. Each year of age predicted an increasing relative risk of grade ?2 (P<.03; hazard ratio [HR], 1.04 [95% confidence interval (CI), 1.01-1.06]) and ?3 rectal toxicity (P<.0001; HR, 1.14 [95% CI,1.07-1.22]). Increasing CCMI predicted rectal toxicity where a history of either myocardial infarction (MI) (P<.0001; HR, 5.1 [95% CI, 1.9-13.7]) or congestive heart failure (CHF) (P<.0006; HR, 5.4 [95% CI, 0.6-47.5]) predicted grade ?3 rectal toxicity, with lesser correlation with grade ?2 toxicity (P<.02 for MI, and P<.09 for CHF). An age comorbidity model to predict rectal toxicity was developed and confirmed in a validation cohort. The use of anticoagulants increased toxicity independent of age and comorbidity. NTCP was prognostic for grade ?3 (P=.015) but not grade ?2 (P=.49) toxicity. On multivariate analysis, age, MI, CHF, and an NTCP >20% all correlated with late rectal toxicity. Conclusions: Patient age and a history of MI or CHF significantly impact rectal toxicity following EBRT for the treatment of prostate cancer, even after controlling for NTCP.

  11. HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules

    E-Print Network [OSTI]

    Jeanjean, Louis

    HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules Document written by the Housing Working Group of the association EURAXESS FRANCE #12;Housing guide Euraxess France................................................................................................................P.3 o Key Principles of House Renting in France...........................................P.4 o

  12. Using Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci

    E-Print Network [OSTI]

    Massacci, Fabio

    search [...]. Second, improvements in machine speed, memory size and implementations extended the rangeUsing Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci Dip. di Informatica e of cryptographic algorithms. Thus, cryptographic key search is often THE search problem for many governments

  13. Fast DES Implementations for FPGAs and its Application to a Universal KeySearch Machine ?

    E-Print Network [OSTI]

    of DES with strong emphasis on high­speed performance. Techniques like pipelining and loop unrolling were, We designed a universal key­search machine and used a high speed DES implementation for FPGAsFast DES Implementations for FPGAs and its Application to a Universal Key­Search Machine ? Jens

  14. Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ?

    E-Print Network [OSTI]

    with strong emphasis on high-speed performance. Techniques like pipelining and loop unrolling were used designed a universal key-search machine and used a high speed DES implementation for FPGAs as an algorithmFast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ? Jens

  15. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  16. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  17. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  18. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas portfolio of technology options that can provide abundant energy to power economic development and still

  19. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  20. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  1. Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb

    E-Print Network [OSTI]

    Sheffield, University of

    Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

  2. Key Benefits for the M.Sc. Students A monthly stipend of 10,000/-

    E-Print Network [OSTI]

    Rahman, A.K.M. Ashikur

    for app development 24-hours graduate lab facilities with air condition Key Benefits for the M with air condition Key Benefits for the Ph.D. Students (Full Time) A monthly stipend of 30,000/- Tuition for app development 24-hours graduate lab facilities with air condition Provision for research visit

  3. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  4. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  5. US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns

    E-Print Network [OSTI]

    Watson, Craig A.

    US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns For Contractors their return to popularity. Overview of the City of Key Wests' BPAS Ordinance and Green Building. By Allison Design, Inc., ARCSA AP The role of Green Sustainability Organizations and the potential "Tipping Point

  6. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  7. Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE

    E-Print Network [OSTI]

    Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

  8. Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    E-Print Network [OSTI]

    Kai Wen; Gui Lu Long

    2005-08-27T23:59:59.000Z

    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

  9. Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

    E-Print Network [OSTI]

    of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

  10. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  11. Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal

    E-Print Network [OSTI]

    Koksal, Can Emre

    Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal Department of Electrical and Computer Engineering The Ohio State University, Columbus, 43210 Abstract--We consider secret of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can

  12. Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel Mattias Andersson. Dept., Univ. of Toronto, Toronto, ON, Canada email: akhisti@comm.utoronto.ca Abstract--We study secret. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion

  13. Information-Theoretic Key Agreement of Multiple Terminals -Part I: Source Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model Amin Aminzadeh the widely studied source model. In the source model the terminals wishing to generate a secret key, as well of jointly distributed random variables, after which the terminals are allowed interactive authenticated

  14. Information-Theoretic Key Agreement of Multiple Terminals -Part II: Channel Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model Amin Aminzadeh the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs

  15. 100 km secure differential phase shift quantum key distribution with low jitter up-conversion detectors

    E-Print Network [OSTI]

    Eleni Diamanti; Hiroki Takesue; Carsten Langrock; M. M. Fejer; Yoshihisa Yamamoto

    2006-08-13T23:59:59.000Z

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 um single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  16. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  17. Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel

    E-Print Network [OSTI]

    Salimi, Somayeh

    2012-01-01T23:59:59.000Z

    A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.

  18. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Ryota Nakayama

    2013-11-19T23:59:59.000Z

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

  19. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  20. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  1. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  2. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  3. Quantum key distribution using entangled-photon trains with no basis selection

    SciTech Connect (OSTI)

    Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan); NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan); Takesue, Hiroki [NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan)

    2006-03-15T23:59:59.000Z

    Conventional quantum key distribution (QKD) protocols include a basis selection process for providing a secure secret key. In contrast, this paper proposes an entanglement-based QKD with no basis selection procedure. Entangled-photon pulse trains with an average photon number less than one per pulse are sent to two legitimate parties, from which a secret key is created utilizing the entanglement nature. Eavesdropping on a transmission line is prevented by a condition of less than one photon per pulse, and sending classically correlated coherent pulses instead of quantum correlated ones is revealed by monitoring coincident count rate000.

  4. Late-life depression : a systematic review of meta-analyses and a meta-analysis of the effect of cognitive behavioural therapy in older adults with co-morbid physical illness

    E-Print Network [OSTI]

    Huxtable, David

    2013-07-02T23:59:59.000Z

    Aims: To examine the efficacy of CBT for late-life depression in older adults with co-morbid physical illness and to review what has been revealed by meta-analytic studies with regards moderators of treatment in psychological ...

  5. -Metabolism Part Ill: Lipids

    E-Print Network [OSTI]

    Bodner, George M.

    in a cell is negligible, almost all of the fatty acids are bound to glycerol by ester linkages. The most reactions oftriacylglycerols is the alkaline hydrolysis of the ester linkage to give glycerol and sodium and Transporl Fats and oilsare broken down to fattyacids and glycerol in the soluble portion of the cytoplasm

  6. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  7. A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey

    E-Print Network [OSTI]

    Utrecht, Universiteit

    A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

  8. Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility

    Broader source: Energy.gov [DOE]

    WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

  9. Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement

    E-Print Network [OSTI]

    Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

  10. Tritium inventory control in ITER Charles Skinner with key contributions from

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

  11. Reliable and efficient PUF-based key generation using pattern matching

    E-Print Network [OSTI]

    Paral, Zdenek (Sid)

    We describe a novel and efficient method to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical ...

  12. Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,

    E-Print Network [OSTI]

    Lubell, Mark

    Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

  13. PPPL to launch major upgrade of key fusion energy test facility...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to launch major upgrade of key fusion energy test facility NSTX project will produce most powerful spherical torus in the world By John Greenwald January 9, 2012 Tweet Widget...

  14. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  15. Test Scanning Request Form Please complete one form for each test and key.

    E-Print Network [OSTI]

    Pantaleone, Jim

    Test Scanning Request Form Please complete one form for each test and key. This Section to be completed by the Scanning Requestor Date Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

  16. Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures

    E-Print Network [OSTI]

    Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

  17. HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped

    E-Print Network [OSTI]

    MacAdam, Keith

    HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

  18. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  19. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  20. QUADRATURE CHAOS SHIFT KEYING Zbigniew Galias and Gian Mario Maggio y

    E-Print Network [OSTI]

    Galias, Zbigniew

    shift keying communication system. The block diagram of the QCSK modulation scheme is shown in Fig. 1. 3: Dept. of Electrical Engi­ neering, University of Mining and Metallurgy, al. Mickiewicza 30, 30