Powered by Deep Web Technologies
Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

The Kyoto Protocol and developing countries  

E-Print Network [OSTI]

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

2

Russia's role in the Kyoto Protocol  

E-Print Network [OSTI]

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

3

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect (OSTI)

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

4

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

renewable energy. Instead, the Kyoto Protocol CDM process encourages carbon reduction in developing countries,

Ferrey, Steven

2010-01-01T23:59:59.000Z

5

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network [OSTI]

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

6

Multi-Gas Assessment of the Kyoto Protocol John Reilly,*  

E-Print Network [OSTI]

Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

7

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network [OSTI]

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

8

Impacts of the Kyoto Protocol on Energy Markets and Economic Activity  

Reports and Publications (EIA)

Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

1998-01-01T23:59:59.000Z

9

The effects on developing countries of the Kyoto Protocol and CO? emissions trading  

E-Print Network [OSTI]

This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelčne.

10

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect (OSTI)

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

11

The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny Ellerman, Henry D. Jacoby and Annelne Decaux*  

E-Print Network [OSTI]

The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny by the scope of CO2 emissions trading, by various limitations that Annex I countries might place on emissions.1 Trade in Goods with No Emissions Trading

12

Environmental Science & Policy 5 (2002) 195206 The evolution of a climate regime: Kyoto to  

E-Print Network [OSTI]

emissions trading. We analyze the costs of implementation and the environmental effectiveness of the Bonn; Kyoto Protocol; Marrakech accords; Emissions trading; Non-CO2 gases 1. Introduction In November 2000

13

Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union  

E-Print Network [OSTI]

``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

14

Hybrid protocol of remote implementations of quantum operations  

E-Print Network [OSTI]

We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum state teleportation's (BQST) and Wang's one. The protocol is available for remote implemetations of quantum operations in the restricted sets specified in Sec. III. We also give the proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to BQST and Wang protocols.

Ning Bo Zhao; An Min Wang

2007-08-04T23:59:59.000Z

15

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

16

Japanese nuclear power and the Kyoto agreement  

E-Print Network [OSTI]

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

17

Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements  

E-Print Network [OSTI]

in existing plants (co-firing) is already competitive with other fuels at a CO2 price of about 20 Euros Union implemented the European Emission Trading Scheme (EU-ETS) Some 12,000 large industrial plants, such as switching to a low emission fuel mix and investments in new climate friendly technologies are encouraged

18

An object-oriented implementation of a Low Level Reader Protocol (LLRP) library  

E-Print Network [OSTI]

This Master of Engineering Thesis describes the design and implementation of an object-oriented Low Level Reader Protocol (LLRP) library. LLRP is a recently released protocol which standardizes the formats and methods of ...

Constantinou, Fivos

2007-01-01T23:59:59.000Z

19

International Workshops to Foster Implementation of the IAEA Additional Protocol  

SciTech Connect (OSTI)

A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

2003-07-14T23:59:59.000Z

20

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation Kumasi Institute of Technology andKurtKyosemi

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

IMPLEMENTING GREENHOUSE GAS TRADING IN EUROPE: LESSONS FROM ECONOMIC LI-  

E-Print Network [OSTI]

trading, climate change policy, policy-making and implementation 4 #12;Introduction Following the Bonn to the European Climate Change Programme (European Commission, 2001b), there is a gap in the range of 6.6% and 8 the Kyoto Protocol. The Protocol will now enter into force if they are joined by Russia. Compliance

Boyer, Edmond

22

The evolution of a climate regime: Kyoto to Marrakech  

E-Print Network [OSTI]

At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

23

A Strategic Assessment of the Kyoto-Marrakech System  

E-Print Network [OSTI]

. Source: 2000 emission data: US Energy Information Administration (EIA). Climate change emerged during of the Kyoto Protocol by the new US administration in 2001, certainly the most controversial. To the surprise

24

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi- ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

25

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols  

E-Print Network [OSTI]

RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols Nuno Neves W. Kent that allows the rapid testing of checkpoint protocols with standard benchmarks. To achieve this goal, RENEW evaluated using the RENEW envi­ ronment with SPEC and NAS benchmarks on a network of workstations connected

Neves, Nuno

26

A Self-Healing Load Balancing Protocol and Implementation  

E-Print Network [OSTI]

in the opposite direction exhibits a rate of r2 = c2x2. It can be shown that the overall reaction system spanned Comparison In order to illustrate the principle of the two protocols, we carried out OMNeT++ [2] simulations this unbounded growth, we apply a "non-selective dilution flow" to the reactor which randomly destroys a molecule

Vetter, Thomas

27

Southeast Asia and Kyoto University  

E-Print Network [OSTI]

, Kyoto University opened its ASEAN Center in Bangkok, Thailand (p.11), the latest development in over

Takada, Shoji

28

REMARKS BY PRESIDENTIAL ECONOMIC ADVISER ANDREI ILLARIONOV AT A PRESS CONFERENCE ON RESULTS OF THE CLIMATE CHANGE AND KYOTO  

E-Print Network [OSTI]

OF THE CLIMATE CHANGE AND KYOTO PROTOCOL SEMINAR IN MOSCOW The Federal News Service - Official Kremlin Int'l News, and if there is a rise, it has nothing to do with climate change. If there is an insignificant increase have repeatedly asked our foreign partners who advocate the Kyoto Protocol and who insist that Russia

Fischlin, Andreas

29

LinShim6 -Implementation of the Shim6 protocol http://inl.info.ucl.ac.be/LinShim6  

E-Print Network [OSTI]

LinShim6 - Implementation of the Shim6 protocol http://inl.info.ucl.ac.be/LinShim6 Documentation at http://inl.info.ucl. ac.be/publications/shim6-masterthesis. Like the whole project, this documentation

Bonaventure, Olivier

30

Kyoto Protocol Act of 1998 (Illinois)  

Broader source: Energy.gov [DOE]

Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse...

31

Kyoto Protocol: Enforcement Prohibitions (West Virginia)  

Broader source: Energy.gov [DOE]

The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the...

32

Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman and Annelne Decaux  

E-Print Network [OSTI]

Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman the advantages of emissions trading. In this paper, the authors derive MACs from EPPA, the MIT Joint Program the benefits of emissions trading in achieving the emission reduction targets implied by the Kyoto Protocol

33

Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, dated 6-27-13, cancels DOE M 142.2-1. Certified 12-3-14.

1998-06-12T23:59:59.000Z

34

Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, 6-27-13

1998-06-12T23:59:59.000Z

35

GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols  

E-Print Network [OSTI]

resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE...

Pu, Shi

2013-11-25T23:59:59.000Z

36

Implementing XNS Protocols for 4.2bsd James O'Toole  

E-Print Network [OSTI]

interface code, which were eliminated by * *replacing inline code with protocol specific subroutine stream, and the XNS stream le* *vel is neither. We generalized the socket code to satisfy, and are the primary means of intermachine communication in use in the department today. The* * Xerox PARC Universal

Gifford, David K.

37

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science Asian and African Area Studies Informatics Biostudies Global Environmental Studies. The main campus is located in the historic city of Kyoto, a center of traditional Japanese culture. Since

Takada, Shoji

38

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science - - 137 103 - - 19 27 Asian and African Area Studies - - - 55 - - 29 20 Informatics a long history and enduring traditions. The main campus is located in the historic city of Kyoto

Takada, Shoji

39

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 city of Kyoto, a center of traditional Japanese culture. Since its founding, the University has been

Takada, Shoji

40

Copyright 2009 IEICE EMC'09/Kyoto  

E-Print Network [OSTI]

809 Copyright © 2009 IEICE EMC'09/Kyoto Modelling of Absorbing Material Containing Magnetic Platelets Marina Y. Koledintseva#1 , James L. Drewniak#2 , Yongxue He*3 , and Bill Matlin*4 # EMC Laboratory

Koledintseva, Marina Y.

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

he Kyoto Protocol is a symbolically important expression of governments'  

E-Print Network [OSTI]

with stratospheric ozone depletion, acid rain from sulphur emissions and nuclear weapons. Drawing on these plausible but mis- guided. Ozone depletion, acid rain and nuclear arms control are difficult problems, but compared suite of artificial gases, for which technical substitutes could be found. Acid rain was mainly caused

Colorado at Boulder, University of

42

Who benefits from the US withdrawal of the Kyoto protocol?  

E-Print Network [OSTI]

gases. This convention, called the United Nations Framework Convention on Climate Change (UNFCCC and that Japan and Russia benefited from the United States withdrawal (in term of a priori decisional power). Key-made) interference with the climate system". The UNFCCC is the governing body for international negotiations

Paris-Sud XI, Université de

43

Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography  

E-Print Network [OSTI]

In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.

Armand Niederberger; Valerio Scarani; Nicolas Gisin

2005-04-15T23:59:59.000Z

44

Special Features: Kyoto University with ASEAN and Beyond  

E-Print Network [OSTI]

Special Features: Kyoto University with ASEAN and Beyond Kyoto University Vol.4 No.2 September 2014 #12;Contents 1 Message from the President Kyoto University with ASEAN and Beyond 2 History Southeast in ASEAN Region 22 Fostering the Next Generation -- The Hakubi Project A Unique Opportunity

Takada, Shoji

45

Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico  

E-Print Network [OSTI]

This project-thesis examines the technical requirements of a Voice over Internet Protocol (VoIP) solution and is it advantageous for a Multinational Corporation (MNC) to utilize the Project Management Office (PMO) processes as defined by the Project...

Perez, Mary Louise

2012-08-31T23:59:59.000Z

46

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

47

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University "kokoka" Kyoto International

Takada, Shoji

48

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

. Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http -- 2,709 2013 2013 Institute of Advanced Energy, Kyoto University #12; 25 25 11 20

Takada, Shoji

49

Greetings from Kyoto-U SPRING 2010 C O N T E N T S  

E-Print Network [OSTI]

signed with the ASEAN University Network (AUN) Foreign language Publication of "MANGA Kyoto University" 8

Takada, Shoji

50

Carbon emissions and the Kyoto commitment in the European Union  

E-Print Network [OSTI]

We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

51

Implementation Implementation  

E-Print Network [OSTI]

The SLP System: An Implementation of Super Logic Programs 1 The SLP System: An Implementation.09.2002 The SLP System: An Implementation of Super Logic Programs 4 SLP Interpreter (1) Negation Semantics Brass Dagstuhl, 16.09.2002 #12; The SLP System: An Implementation of Super Logic Programs 5 SLP

Brass, Stefan

52

Implementation Implementation  

E-Print Network [OSTI]

The SLP System: An Implementation of Super Logic Programs 1 The SLP System: An Implementation: An Implementation of Super Logic Programs 2 Super Logic Programs (1) #15; Arbitrarily nested propositional: An Implementation of Super Logic Programs 3 Super Logic Programs (2) #15; Default negation can be used only

Brass, Stefan

53

KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers  

E-Print Network [OSTI]

............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

Takada, Shoji

54

(mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey).  

E-Print Network [OSTI]

SSH Q&A (mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey). (1) ID ID ID (2) ssh -i () ssh -i $HOME/.ssh/id_yitp_rsa (UID)@mercury.yukawa.kyoto-u.ac.jp (3) (1)(2) Permission denied support@yukawa.kyoto-u.ac.jp (mercury

Shimizu, Akira

55

News Letter Institute of Advanced Energy, Kyoto University  

E-Print Network [OSTI]

Materials Science Workshop" Institute of Advanced Energy, Kyoto University #12; 25 1 22 ASEAN 5 ASEANNational University of SingaporeChulalongkorn UniversityASEAN University Network AUN Nantana Gajaseni Institut Teknologi Bandung Akhmaloka Gajaseni "Student Mobility and ASEAN Credit Transfer System" Agreement

Takada, Shoji

56

Kyoto University has launched a Japan-Thailand collaborative research  

E-Print Network [OSTI]

Kyoto University has launched a Japan-Thailand collaborative research project titled "Development of clean and efficient utilization of low rank coals and biomass by solvent treatment," supported biomass waste as well as low-rank coals into valuable products such as carbon fiber, biofuel, and high

Takada, Shoji

57

Implementation of optimum solar electricity generating system  

SciTech Connect (OSTI)

Under the 10{sup th} Malaysian Plan, the government is expecting the renewable energy to contribute approximately 5.5% to the total electricity generation by the year 2015, which amounts to 98MW. One of the initiatives to ensure that the target is achievable was to establish the Sustainable Energy Development Authority of Malaysia. SEDA is given the authority to administer and manage the implementation of the feed-in tariff (FiT) mechanism which is mandated under the Renewable Energy Act 2011. The move to establish SEDA is commendable and the FiT seems to be attractive but there is a need to create awareness on the implementation of the solar electricity generating system (SEGS). In Malaysia, harnessing technologies related to solar energy resources have great potential for implementation. However, the main issue that plagues the implementation of SEGS is the intermittent nature of this source of energy. The availability of sunlight is during the day time, and there is a need for electrical energy storage system, so that there is electricity available during the night time as well. The meteorological condition such as clouds, haze and pollution affects the SEGS as well. The PV based SEGS is seems to be promising electricity generating system that can contribute towards achieving the 5.5% target and will be able to minimize the negative effects of utilizing fossil fuels for electricity generation on the environment. Malaysia is committed to Kyoto Protocol, which emphasizes on fighting global warming by achieving stabilization of greenhouse gas concentrations in the atmosphere at a level that would prevent dangerous anthropogenic interference with the climate system. In this paper, the technical aspects of the implementation of optimum SEGS is discussed, especially pertaining to the positioning of the PV panels.

Singh, Balbir Singh Mahinder, E-mail: balbir@petronas.com.my; Karim, Samsul Ariffin A., E-mail: samsul-ariffin@petronas.com.my [Department of Fundamental and Applied Sciences, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia); Sivapalan, Subarna, E-mail: subarna-sivapalan@petronas.com.my [Department of Management and Humanities, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia); Najib, Nurul Syafiqah Mohd; Menon, Pradeep [Department of Electrical and Electronics Engineering, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia)

2014-10-24T23:59:59.000Z

58

Non-Kyoto Radiative Forcing in Long-Run Greenhouse Gas Emissions and Climate Change Scenarios  

SciTech Connect (OSTI)

Climate policies designed to achieve climate change objectives must consider radiative forcing from the Kyoto greenhouse gas, as well as other forcing constituents, such as aerosols and tropospheric ozone. Net positive forcing leads to global average temperature increases. Modeling of non-Kyoto forcing is a relatively new component of climate management scenarios. Five of the nineteen models in the EMF-27 Study model both Kyoto and non-Kyoto forcing. This paper describes and assesses current non-Kyoto radiative forcing modeling within these integrated assessment models. The study finds negative forcing from aerosols masking significant positive forcing in reference non-climate policy projections. There are however large differences across models in projected non-Kyoto emissions and forcing, with differences stemming from differences in relationships between Kyoto and non-Kyoto emissions and fundamental differences in modeling structure and assumptions. Air pollution and non-Kyoto forcing decline in the climate policy scenarios. However, non-Kyoto forcing appears to be influencing mitigation results, including allowable carbon dioxide emissions, and further evaluation is merited. Overall, there is substantial uncertainty related to non-Kyoto forcing that must be considered.

Rose, Steven K.; Richels, Richard G.; Smith, Steven J.; Riahi, Keywan; Stefler, Jessica; Van Vuuren, Detlef

2014-04-27T23:59:59.000Z

59

aureus decolonisation protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

60

addfam study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

antineoplastic combined chemotherapy protocols: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

62

afinos study protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

63

agrobacterium-mediated transformation protocol: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

64

Toward a Post-Kyoto Climate Change Architecture: A Political Analysis  

E-Print Network [OSTI]

FOR INTERNATIONAL GHG EMISSIONS TRADING (2000), http://al. , International Emissions Trading Rules as a Compliancethe Economic Benefits of Emissions Trading Under the Kyoto

Raustiala, Kal; Keohane, Robert O.

2009-01-01T23:59:59.000Z

65

Protocols and quantum circuits for implementing entanglement concentration in cat state, GHZ-like state and 9 families of 4-qubit entangled states  

E-Print Network [OSTI]

Three entanglement concentration protocols (ECPs) are proposed. The first ECP and a modified version of that are shown to be useful for the creation of maximally entangled cat and GHZ-like states from their non-maximally entangled counterparts. The last two ECPs are designed for the creation of maximally entangled $(n+1)$-qubit state $\\frac{1}{\\sqrt{2}}\\left(|\\Psi_{0}\\rangle|0\\rangle+|\\Psi_{1}\\rangle|1\\rangle\\right)$ from the partially entangled $(n+1)$-qubit normalized state $\\alpha|\\Psi_{0}\\rangle|0\\rangle+\\beta|\\Psi_{1}\\rangle|1\\rangle$, where $\\langle\\Psi_{1}|\\Psi_{0}\\rangle=0$ and $|\\alpha|\

Chitra Shukla; Anindita Banerjee; Anirban Pathak

2014-03-27T23:59:59.000Z

66

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

Progress on Post-2012 Emissions Trading Scheme, 39 ENV'T R!European Union's emissions trading scheme, which providesTHE EUROPEAN UNION'S EMISSIONS TRADING SCHEME AND TilE KYoT-

Ferrey, Steven

2010-01-01T23:59:59.000Z

67

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

installing 1,000 MW of coal power generation each week andof electricity generation is fueled by coal. Id. 121. Id.with coal-fired electric power generation 8 accounting for

Ferrey, Steven

2010-01-01T23:59:59.000Z

68

A Proposal for the Design of the Successor to the Kyoto Protocol  

E-Print Network [OSTI]

in managing climate change does require developing countryclimate change agreement, and that developing countries willby developing countries (through CDM). Third, climate change

Karp, Larry; Zhao, Jinhua

2008-01-01T23:59:59.000Z

69

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

1, 34. 214. Three of the 10 RGGI states, regulating carbonof dollars each from the RGGI revenue raised from auc-allowances. See States Raid RGGI Funds to Fill Budget Gap,

Ferrey, Steven

2010-01-01T23:59:59.000Z

70

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network [OSTI]

Global Boom in Coal Power-and Emissions, CHISm- "IAN ScI.those emissions-particularly with coal-fired electric power

Ferrey, Steven

2010-01-01T23:59:59.000Z

71

Defeating Kyoto: the conservative movement’s impact on U.S. climate change policy  

E-Print Network [OSTI]

In this article, we argue that a major reason the United States failed to ratify the Kyoto Protocol to ameliorate global warming is the opposition of the American conservative movement, a key segment of the antienvironmental countermovement. We examine how the conservative movement mobilized between 1990 and 1997 to construct the “non-problematicity ” of global warming. After we describe how conservative think tanks mobilized to challenge the global warming claims of mainstream climate science, we examine how these countermovement organizations aligned themselves with prominent American climate change skeptics known for their staunch criticism of mainstream climate research and their af?liations with the fossil fuels industry. We then examine how the efforts of these conservative think tanks were enhanced by the shift in the political opportunity structure created by the 1994 Republican takeover of Congress. This study demonstrates how a powerful countermovement effectively challenged the environmental community’s de?nition of global warming as a social problem and blocked the passage of any signi?cant climate change policy. Since the early 1980s a robust international consensus about the reality and seriousness of climate change has emerged, as evidenced by several comprehensive reports from the

Aaron M. Mccright

2003-01-01T23:59:59.000Z

72

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

73

Greetings from Kyoto-U SPRING 2009 C O N T E N T S  

E-Print Network [OSTI]

high energy physics paper of all time as of 2006. The university's GCOE program (see Special Feature of administration: while it belongs to Kyoto University, its administration policies are decided by a steering

Takada, Shoji

74

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

75

Adaptive best effort protocols for video delivery  

E-Print Network [OSTI]

This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

Madhwaraj, Ashwin Raj

1998-01-01T23:59:59.000Z

76

NEMVP: North American energy measurement and verification protocol  

SciTech Connect (OSTI)

This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

NONE

1996-03-01T23:59:59.000Z

77

addition-cambridge trial protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

78

anesthesia gas-guided protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

79

adult wistar kyoto: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

80

association isaga kyoto: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

applications kyoto japan: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

82

Adaptive RTT-driven Transport-layer Flow and Error Control Protocol for QoS Guaranteed Image Transmission over Multi-hop Underwater Wireless Networks: Design, Implementation, and Analysis  

E-Print Network [OSTI]

With the rapid advances in data transmission over various advanced underwater acoustic networks, it is important to develop the efficient protocol to obtain a high data-rate with Quality of Service (QoS) guarantee requirements for acoustic wireless...

Li, Jiahao

2013-12-09T23:59:59.000Z

83

It's too late to seal a global climate deal. But we need action, not Kyoto II  

E-Print Network [OSTI]

to economic development, with development based on cleaner, sustainable technologies for power, transport, buildings and industry. The rich world will benefit as the poor world goes green, and will have to pay much wait It's too late to seal a global climate deal. But we need action, not Kyoto II |... http://www.guardian.co.uk/commentisfree/cif-green

84

On June 21, 2013, Kyoto University and Daikin Industries, Ltd. concluded a collaboration agreement  

E-Print Network [OSTI]

, and the pursuit of innovation. Under the agreement, the Daikin-Kyoto University Innovation Program (DK Program the following goals in three years. 1. Create new themes focusing on social values (drawing on the knowledge's partner universities) 3. Develop technology management methods (to continuously foster innovation

Takada, Shoji

85

Global Network Kyoto University has opened a new center in Bangkok, Thailand, dedicated to supporting research,  

E-Print Network [OSTI]

to supporting research, education, and international collaborations across the ASEAN region. To mark the launch of these activities, an official opening ceremony and a symposium titled "Kyoto University in ASEAN -- Past, Present, government, and industry from ASEAN member states and Japan convened at the opening ceremony

Takada, Shoji

86

China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT  

E-Print Network [OSTI]

China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700

Columbia University

87

University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University  

E-Print Network [OSTI]

1 / 3 University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University 24 10 1 1 October 2012 Job title University Research Administrator (URA) Number 1 One network. Please note that the candidate is expected to mainly use English in the workplace, carrying out

Takada, Shoji

88

Kyoto University Library Reference Guide What is an E-Journal?  

E-Print Network [OSTI]

read the newest article as soon as it is made available. You can read them at a laboratory or a Media Center PC even without going to the library. There are many links to related articles, cited articles, especially international academic journals held at Kyoto University. We hold with a lot of e-journals about

Takada, Shoji

89

Protocol for House Parties  

Broader source: Energy.gov [DOE]

Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

90

L'INITIATIVE EUROPEENNE "SUIVI GLOBAL POUR L'ENVIRONNEMENT ET LA SECURITE" (GMES) ET LE PROTOCOLE DE KYOTO1  

E-Print Network [OSTI]

, Belgique H. LE TREUT, UPMC, France A. MOREL, LPCM, France E. RASCHKE, GKSS Forschungszentrum Geesthacht

91

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network [OSTI]

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

Keeling, Stephen L.

92

A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features  

E-Print Network [OSTI]

Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

2014-09-06T23:59:59.000Z

93

Webinar: Hydrogen Refueling Protocols  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

94

Application Protocol Reference Architecture Application Protocol Reference Architecture  

E-Print Network [OSTI]

Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

van Sinderen, Marten

95

Kyoto & Kyoto University Kyoto: A Heartland  

E-Print Network [OSTI]

. It was also where the first hydroelectric power plant and tram system were developed, and the location

Takada, Shoji

96

Device-independent entanglement-based Bennett 1992 protocol  

E-Print Network [OSTI]

In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

2012-10-05T23:59:59.000Z

97

APS Protocol for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

98

THE PERFORMANCE AND SCALABILITY OF DISTRIBUTED SHARED MEMORY CACHE COHERENCE PROTOCOLS  

E-Print Network [OSTI]

coherence protocol is often made based on implementation ease rather than performance. Most DSM machines run a fixed protocol, encoded in hardware finite state machines, so trying to compare the performance of differ- ent protocols involves comparing performance across different machines. Unfortunately

Heinrich, Mark

99

Kyoto Workshop  

Broader source: Energy.gov (indexed) [DOE]

of Arkansas 15 15 UA Proposed Solution Multiport converter topology uses common transformer, reducing part count for total system. High frequency transformer link results...

100

Protocol design contests  

E-Print Network [OSTI]

In fields like data mining and natural language processing, design contests have been successfully used to advance the state of the art. Such contests offer an opportunity to bring the excitement and challenges of protocol ...

Winstein, Keith

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly and Henry D. Jacoby Report No-profit organizations. To inform processes of policy development and implementation, climate change research needs://web.mit.edu/globalchange/www/ Printed on recycled paper #12;The Kyoto Protocol and Developing Countries Mustafa Babiker, John M. Reilly

102

The Kyoto University Research Administration office (KURA) was established to perform a function that is still not widely known  

E-Print Network [OSTI]

-Program for World-Leading Innovative R&D on Science and Technology" called "FIRST Program" is one of them. The total that is still not widely known in Japan. After the establishment of KURA, Kyoto University has been engaged and Technology (MEXT) to further reinforce such initiatives. To achieve top-level research activities and high

Takada, Shoji

103

Proceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto, Japan  

E-Print Network [OSTI]

pressure drop and reduced heat transfer to the reaction zone. KEY WORDS: Solar energy, Carbon emission combustion as the process heat for calcination. Shimizu et al. performed a thermodynamic analysis on a pairProceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto

104

POST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE  

E-Print Network [OSTI]

marginal costs, the primary energy consumption and the energy mix. This paper compares global efforts of CO. Keywords CO2 mitigation targets, global energy system, long-term modelling Acknowledgement This researchPOST-KYOTO POLICY IMPLICATIONS ON THE ENERGY SYSTEM: A TIAM-FR LONG-TERM PLANNING EXERCISE Sandrine

Paris-Sud XI, Université de

105

International Energy Conference, 19 -21 May 2003 Energy Technologies for post-Kyoto targets in the medium term  

E-Print Network [OSTI]

Aquifers and Hydrocarbon Structures Power & Heat Air Air O2 N2 & O2 CO2 CO2 CO2 Compression & DehydrationInternational Energy Conference, 19 - 21 May 2003 Energy Technologies for post-Kyoto targets in the medium term CO2 Capture & Geological Storage Niels Peter Christensen International Ventures Director

106

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

107

White Paper: A Survey of 3D Sync IR Protocols  

E-Print Network [OSTI]

)..............................................................................................12 Sony Protocol (Standalone emitter

108

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim  

E-Print Network [OSTI]

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

Lee, Ben

109

MAPS MANUAL 2010 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2010 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

110

MAPS MANUAL 2014 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2014 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

111

MAPS MANUAL 2008 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2008 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Jim Saracco

DeSante, David F.

112

MAPS MANUAL 2013 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2013 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

113

MAPS MANUAL 2011 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2011 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

114

MAPS MANUAL 2012 PROTOCOL  

E-Print Network [OSTI]

MAPS MANUAL 2012 PROTOCOL INSTRUCTIONS FOR THE ESTABLISHMENT AND OPERATION OF CONSTANT-EFFORT BIRD-BANDING STATIONS AS PART OF THE MONITORING AVIAN PRODUCTIVITY AND SURVIVORSHIP (MAPS) PROGRAM David F. De;ACKNOWLEDGEMENTS We thank MAPS biologists Eric Feuss, Denise Jones, Sara Martin, Eric (Zed) Ruhlen, Hillary Smith

DeSante, David F.

115

Extremal quantum protocols  

E-Print Network [OSTI]

Generalized quantum instruments correspond to measurements where the input and output are either states or more generally quantum circuits. These measurements describe any quantum protocol including games, communications, and algorithms. The set of generalized quantum instruments with a given input and output structure is a convex set. Here we investigate the extremal points of this set for the case of finite dimensional quantum systems and generalized instruments with finitely many outcomes. We derive algebraic necessary and sufficient conditions for extremality.

Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

2011-01-25T23:59:59.000Z

116

PROTOCOL SELECTION, IMPLEMENTATION, AND ANALYSIS FOR ASYNCHRONOUS CIRCUITS  

E-Print Network [OSTI]

the search space by several orders of magnitude compared to the theoretical upper bound ­ and by one order including figures, tables, and charts are in place; and (3) the final manuscript is satisfactory of magnitude beyond existing techniques ­ without significantly impacting the quality of the solutions. #12;To

Myers, Chris J.

117

Chapter 12, Survey Design and Implementation Cross-Cutting Protocols...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

(Schwartz 1999). For example, although respondents are likely to understand the literal meaning of a question, they must still determine the types of actions or activities of...

118

Communication complexity protocols for qutrits  

SciTech Connect (OSTI)

Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

Tamir, Boaz [Department of History and Philosophy of Science, Bar-Ilan University, Ramat-Gan (Israel)

2007-03-15T23:59:59.000Z

119

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

120

On Runtime Adaptation of Application-Layer Multicast Protocol  

E-Print Network [OSTI]

¨ubsch, Christoph P. Mayer, and Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology (KIT), Germany {huebsch,mayer,waldhorst}@kit.edu Reasonable choice of protocol parameters is crucial., a clean implementation of multicast communication within the Internet architecture has been proposed

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

A syndication-based messaging protocol for the global RFID network  

E-Print Network [OSTI]

This Master of Engineering thesis describes the design and implementation of a syndication based messaging protocol for the global RFID network. The motivation behind the design is to develop a scalable model that can be ...

Sun, Miao, M. Eng. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

122

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2007-02-16T23:59:59.000Z

123

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol  

E-Print Network [OSTI]

The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

Canetti, Ran

2006-06-20T23:59:59.000Z

124

Climate Change Taxes and Energy Efficiency in Japan  

E-Print Network [OSTI]

In 2003 Japan proposed a Climate Change Tax to reduce its CO2 emissions to the level required by the Kyoto Protocol. If implemented, the tax would be levied on fossil fuel use and the revenue distributed to several sectors ...

Kasahara, Satoru.

125

The safety valve and climate policy  

E-Print Network [OSTI]

In discussions of a cap-and-trade system for implementation of Kyoto Protocol-type quantity targets, a "safety valve" was proposed where, by government sales of emissions permits at a fixed price, the marginal cost of the ...

Jacoby, Henry D.; Ellerman, A. Denny.

126

Is international emissions trading always beneficial?  

E-Print Network [OSTI]

Economic efficiency is a major argument for the inclusion of an international emission permit trading system under the Kyoto Protocol. Using a partial equilibrium framework, energy system models have shown that implementing ...

Babiker, Mustafa H.M.

127

CREATION OF THE MODEL ADDITIONAL PROTOCOL  

SciTech Connect (OSTI)

In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

Houck, F.; Rosenthal, M.; Wulf, N.

2010-05-25T23:59:59.000Z

128

Mensuration protocol National Forest Inventory  

E-Print Network [OSTI]

NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

129

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses  

E-Print Network [OSTI]

Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

Marcos Curty; Norbert Lütkenhaus

2005-02-20T23:59:59.000Z

130

Modular approaches to statistical optimization: software development and implementation  

E-Print Network [OSTI]

LIBRARY FOR DEVELOPING IPC APPLICATIONS 44 A B r, D E F Introduction Design Goals IPC Library Implementation . . Client Authorization Approach to Protocol Implementation . Conclusion 44 44 45 48 49 50 VII APPLICATIONS L SING THE IPC I... covers systems developed to da, te. B. Overview of Circuit Optimization Systems Several approaches to integrated circuit design and optimiza. tion using an interactive environment have been developed iil]. The ICD i2j system implemented an interactive...

Meyer, Barry Dean

1990-01-01T23:59:59.000Z

131

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc- demand minimum energy routing protocol and suggests mechanisms for their implementation. We highlight of an 'energy aware' link cache for storing this information. We also compare the performance of an on-demand

Brown, Timothy X.

132

An Autonomous Evolvable Architecture in a Reconfigurable Protocol Chip for Satellite Networks C. Okino, C. Lee, A. Gray, P. Arabshahi  

E-Print Network [OSTI]

://www.earth.nasa.gov/visions/researchstrat/Research_Strategy.htm [3] The Reliability of Data Program, http://www.xilinx.com/products/qa_data/relreprt.pdf [4] W. Huang as depicted in Figure 2. Reconfigurable Protocol Chip Input from Physical Layer Protocol Implementation: COTS

Arabshahi, Payman

133

Single-Step Implementation of Universal Quantum Gates  

SciTech Connect (OSTI)

We construct optimized implementations of the controlled-NOT and other universal two-qubit gates that, unlike many of the previously proposed protocols, are carried out in a single step. The new protocols require tunable interqubit couplings but, in return, show a significant improvement in the quality of gate operations. We make specific predictions for coupled Josephson junction qubits and compare them with the results of recent experiments.

Grigorenko, I.A.; Khveshchenko, D.V. [Department of Physics and Astronomy, University of North Carolina, Chapel Hill, North Carolina 27599 (United States)

2005-09-09T23:59:59.000Z

134

Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments  

SciTech Connect (OSTI)

The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

2012-06-18T23:59:59.000Z

135

Office Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment of Energy(National1 -OSSGasofOffice Protocols Office Protocols

136

Solar Schools Assessment and Implementation Project: Financing...  

Broader source: Energy.gov (indexed) [DOE]

Cole Boulevard Golden, CO 80401 (303) 384-7518 alicen.kandt@nrel.gov www.nrel.gov Tom Kelly KyotoUSA HELiOS Project 800 Hearst Avenue Berkeley, CA 94710 (510) 704-8628...

137

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

138

Beyond the Goldenberg-Vaidman protocol: Secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states  

E-Print Network [OSTI]

It is shown that maximally efficient protocols for secure direct quantum communications can be constructed using any arbitrary orthogonal basis. This establishes that no set of quantum states (e.g. GHZ states, W states, Brown states or Cluster states) has an advantage over the others, barring the relative difficulty in physical implementation. The work provides a wide choice of states for experimental realization of direct secure quantum communication protocols. We have also shown that this protocol can be generalized to a completely orthogonal state based protocol of Goldenberg-Vaidman (GV) type. The security of these protocols essentially arises from duality and monogamy of entanglement. This stands in contrast to protocols that employ non-orthogonal states, like Bennett-Brassard 1984 (BB84), where the security essentially comes from non-commutativity in the observable algebra.

Chitra Shukla; Anirban Pathak; R. Srikanth

2012-10-09T23:59:59.000Z

139

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

140

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure December 24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3.8 The Transmission Control Protocol

Bonaventure, Olivier

142

Computer Networking : Principles, Protocols and Practice  

E-Print Network [OSTI]

Computer Networking : Principles, Protocols and Practice Release Olivier Bonaventure September 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Part 1: Principles 5 2.1 Connecting two hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3.8 The Transmission Control Protocol

Bonaventure, Olivier

143

Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly  

SciTech Connect (OSTI)

The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

2012-07-01T23:59:59.000Z

144

Automated Eye-Movement Protocol Analysis  

E-Print Network [OSTI]

Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

Salvucci, Dario D.

145

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network [OSTI]

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

146

Chapter 14: Chiller Evaluation Protocol  

SciTech Connect (OSTI)

This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

Tiessen, A.

2014-09-01T23:59:59.000Z

147

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

148

Effective Protocols for Mobile Communications and Networking  

SciTech Connect (OSTI)

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

149

Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management Director Page 1 of 6  

E-Print Network [OSTI]

Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Management will log in #12;Hot Works Procedures and Protocols Last Updated: 2/14/2014 Owner: Safety and Risk Director Page 1 of 6 INTRODUCTION The Office of Safety and Risk Management (SRM) has developed, implemented

Dyer, Bill

150

Validating an `ns' Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall  

E-Print Network [OSTI]

Validating an `ns' Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall Department on the DOCSIS MAC layer. We have implemented a simulation model of the DOCSIS MAC using the `ns' simulation package. In this paper we offer analytic and live network evidence that the simulation model accurately

Martin, Jim

151

Validating an `ns' Simulation Model of the DOCSIS Protocol Department of Computer Science  

E-Print Network [OSTI]

Validating an `ns' Simulation Model of the DOCSIS Protocol Jim Martin Department of Computer Over Cable System Interface Specification (DOCSIS). We have implemented a simulation model analytic and live network evidence that the simulation model is correct. To demonstrate the model, we

Westall, James M.

152

INEEL AIR MODELING PROTOCOL ext  

SciTech Connect (OSTI)

Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

C. S. Staley; M. L. Abbott; P. D. Ritter

2004-12-01T23:59:59.000Z

153

Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)  

E-Print Network [OSTI]

Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

Kamboj, Pariza

2010-01-01T23:59:59.000Z

154

ORISE: Policy Implementation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Implementation The Oak Ridge Institute for Science and Education (ORISE) assists the U.S. Department of Energy (DOE) Office of Science in the implementation of its program...

155

Transportation Protocols Working Group First Conference Call...  

Broader source: Energy.gov (indexed) [DOE]

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

156

SSF Experimental Protocols -- Lignocellulosic Biomass Hydrolysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SSF Experimental Protocols - Lignocellulosic Biomass Hydrolysis and Fermentation Laboratory Analytical Procedure (LAP) Issue Date: 10302001 N. Dowe and J. McMillan Technical...

157

Superior Energy Performance Measurement and Verification Protocol...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Verification Protocol for Industry (November 2012) More Documents & Publications Energy Intensity Baselining and Tracking Guidance EnPI V4.0 Tool Algorithm Superior Energy...

158

Estimating Pedestrian Accident Exposure: Protocol Report  

E-Print Network [OSTI]

A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

2007-01-01T23:59:59.000Z

159

Implementing AccountableCare  

E-Print Network [OSTI]

Implementing AccountableCare Organizations POLICYBRIEF MAY2010 ADVANCING NATIONAL HEALTH REFORMPolicyandClinicalPractice #12;i Berkeley Center on Health, Economic & Family Security|Implementing Accountable Care to implement the newly-minted comprehensive healthcare reform law, the Patient Protection and Affordable Care

Kammen, Daniel M.

160

Environmental Protection Implementation Plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. The Environmental Protection Implementation Plan serves as an aid to management and staff to implement new environmental programs in a timely manner.

Brekke, D.D.

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.  

SciTech Connect (OSTI)

The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

Tolendino, Lawrence F.; Hu, Tan Chang

2005-06-01T23:59:59.000Z

162

Kyoto University International Center  

E-Print Network [OSTI]

and Astronautics, Nuclear Engineering, (6-year program) Faculty of Engineering Bachelor of Engineering Global Engineering, Architecture, Engineering Science, Electrical and Electronic Engineering, Informatics and Mathematical Science, Industrial

Takada, Shoji

163

Protocol Number: (IBC office use only)  

E-Print Network [OSTI]

Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

Asaithambi, Asai

164

Safe Operating Procedure SAFETY PROTOCOL: Rb-86  

E-Print Network [OSTI]

of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

Farritor, Shane

165

Advantages of a Leveled Commitment Contracting Protocol  

E-Print Network [OSTI]

Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R. Lesser 7, 1995 #12; Advantages of a Leveled Commitment Contracting Protocol Tuomas W. Sandholm and Victor R, contracts have traditionally been binding. Such contracts do not al­ low agents to efficiently accommodate

Massachusetts at Amherst, University of

166

The Bitcoin Backbone Protocol: Analysis and Applications  

E-Print Network [OSTI]

The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

167

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

168

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect (OSTI)

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15T23:59:59.000Z

169

Will Monetized Carbon Emission Reductions Buy Enhanced Building Operations?  

E-Print Network [OSTI]

- Policies and Measures International and United State Programs - Kyoto Protocol - European Union Emission Trading Scheme - California Global Warming Solutions Act - Regional Greenhouse Gas Initiative #0;z Strategies for Expanding Buildings Role Buildings... Emission Targets in 2008-2012 for 37 Annex I Countries Which Have Ratified It ? Relies Primarily on Policies and Measures ? Flexibility Measures Include CDMs and JIs #0;z European Climate Change Program ? Reflects EU’s Leadership in Implementing Kyoto...

Millhone, J.

2007-01-01T23:59:59.000Z

170

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...  

Broader source: Energy.gov (indexed) [DOE]

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

171

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol...

172

Protective Force Protocols for ESS Supported Performance Tests...  

Broader source: Energy.gov (indexed) [DOE]

Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12,...

173

access control protocols: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

174

access control protocol: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

175

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster...

176

Protocol for Addressing Induced Seismicity Associated with Enhanced...  

Office of Environmental Management (EM)

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

177

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys  

E-Print Network [OSTI]

NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols

178

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

179

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

180

Environmental protection Implementation Plan  

SciTech Connect (OSTI)

This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

R. C. Holland

1999-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report  

SciTech Connect (OSTI)

Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

Not Available

1993-09-01T23:59:59.000Z

182

A Metaobject Protocol for C++ Shigeru Chiba  

E-Print Network [OSTI]

A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

Chiba, Shigeru

183

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

184

NREL Test-to-Failure Protocol (Presentation)  

SciTech Connect (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

185

PEP Classroom Observation Protocol Project # _______ District __________________________ School ________________________________________  

E-Print Network [OSTI]

PEP Classroom Observation Protocol Project # _______ District __________________________ School (mark all that apply) Demonstrate or confirm known concepts/procedures Demonstrate or confirm known concepts/procedures Explore ideas, test conjectures, look for patterns Explore ideas, test conjectures

Lee, Carl

186

IT Licentiate theses Ad Hoc Routing Protocol  

E-Print Network [OSTI]

IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

Flener, Pierre

187

Measurement and Verification, Best Practices in Design and Implementation  

E-Print Network [OSTI]

. Measurement?and? Verification,?Best?Practices? in?Design?and? Implementation Tom?Martin? CMVP,?LEED?AP Homay?Khatami? CEM,?LEED?AP PMP,?CMC? 1. Definition?of?Measurement?and?Verification?(M&V) 2. Applications?of?M&V 3. Specific.... Analyze?? Reporting M&V,?Best?Practices?in?Design?and?Implementation ?Measurement?and?Verification?is?the?process? of?using?measurements?to?reliably?determine? actual?savings? International?Performance?Measurement?and? Verification?Protocol?? Vol I...

Martin, T.; Khatami, H.

2013-01-01T23:59:59.000Z

188

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

189

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

Sandhu, Ravi

190

Internet Security Protocols Prof. Ravi Sandhu  

E-Print Network [OSTI]

INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

Sandhu, Ravi

191

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect (OSTI)

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

192

Circuit QED: Implementation of the three-qubit refined Deutsch-Jozsa quantum algorithm  

E-Print Network [OSTI]

We propose a protocol to construct the 35 $f$-controlled phase gates of a three-qubit refined Deutsch-Jozsa (DJ) algorithm, by using single-qubit $\\sigma_z$ gates, two-qubit controlled phase gates, and two-target-qubit controlled phase gates. Using this protocol, we discuss how to implement the three-qubit refined DJ algorithm with superconducting transmon qutrits resonantly coupled to a single cavity. Our numerical calculation shows that implementation of this quantum algorithm is feasible within the present circuit QED technique. The experimental realization of this algorithm would be an important step toward more complex quantum computation in circuit QED.

Qi-Ping Su; Chui-Ping Yang

2014-10-12T23:59:59.000Z

193

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras  

E-Print Network [OSTI]

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras we describe our experience of implementing a gateway between ad hoc and terrestrial routing protocols terrestrial network interface and MAODV on a wireless ad hoc network interface.Although we focus primarily

Baras, John S.

194

EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?  

E-Print Network [OSTI]

Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

Nakano, Koji

195

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

196

EPICS Version 4 - Implementing Complex Data Types  

SciTech Connect (OSTI)

Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

Marty Kraimer,; John dalesio

2012-11-27T23:59:59.000Z

197

A calculus for cryptographic protocols: The spi calculus  

E-Print Network [OSTI]

We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.

Martin Abadi; Andrew D. Gordon

1999-01-01T23:59:59.000Z

198

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS  

E-Print Network [OSTI]

STANDARD EVALUATION PROTOCOL 2009-2015 PROTOCOL FOR RESEARCH ASSESSMENT IN THE NETHERLANDS #12 ASSESSMENT IN THE NETHERLANDS Published VSNU, KNAW and NWO 2009 This document is available through internet: Royal Netherlands Academy of Arts and Sciences (KNAW) The Academy's mission: As the forum, conscience

Franssen, Michael

199

Quality Assurance Protocol for AFCI Advanced Structural Materials Testing  

SciTech Connect (OSTI)

The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded application of NQA-1 requirements at the site. The current program is being revised to incorporate changes imposed through the recently revised AFCI Technical Integration Office QA requirements. Testing conducted under the AFCI QA program for the advanced structural materials effort shall incorporate the following quality assurance expectations: (1) personnel are adequately trained to perform assigned work; (2) activities are controlled to ensure consistency of results; (3) records necessary to substantiate how the work was performed are maintained (dedicated laboratory notebooks will be used); (4) the pedigree and traceability of the various tested materials are maintained throughout the described processes using consistent sample numbering and adequate record keeping; (5) equipment with the potential to affect the quality of the planned work is calibrated and maintained in accordance with applicable operating requirements. In addition, all reporting or related dissemination by ORNL personnel of the results of the work described in this subcontract shall be conducted in accordance with the requirements described or referenced in the ORNL Standards Based Management System subject area entitled Scientific and Technical Information. Reporting or publications at other institutions will be conducted in accordance with the requirements of that institution. Successful implementation of these protocols will provide a sound basis for future decisions and research. In addition, these steps will also help ensure that results can also be applied to licensing discussions at a future date.

Busby, Jeremy T [ORNL

2009-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Chapter 22: Compressed Air Evaluation Protocol  

SciTech Connect (OSTI)

Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

Benton, N.

2014-11-01T23:59:59.000Z

202

Chapter 15: Commercial New Construction Protocol  

SciTech Connect (OSTI)

This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

Keates, S.

2014-09-01T23:59:59.000Z

203

Environmental protection implementation plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

Holland, R.C.

1998-03-01T23:59:59.000Z

204

Environmental Protection Implementation Plan  

SciTech Connect (OSTI)

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. This report focuses on the following: notification of environmental occurrences; general planning and reporting; special programs and plans; environmental monitoring program; and quality assurance and data verification.

Brekke, D.D.

1995-11-01T23:59:59.000Z

205

Continued on page 2 IMPLEMENTING THE HEALTH  

E-Print Network [OSTI]

The System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

206

UNSATURATED SOIL MECHANICS IMPLEMENTATION  

E-Print Network [OSTI]

UNSATURATED SOIL MECHANICS IMPLEMENTATION DURING PAVEMENT CONSTRUCTION QUALITY ASSURANCE Mn !! Performance Based Construction QA !! Unsaturated Soil Mechanics !! What We've Learned !! Next Steps #12.6-6.0 5 - 7 19 0.8 5 7 - 9 24 1.1 4 9 - 11 28 1.2 4 #12;Unsaturated Soil Mechanics #12;Fundamentals

Minnesota, University of

207

Plans, Implementation, and Results  

Broader source: Energy.gov [DOE]

The Bioenergy Technologies Office carries out technology research, development, and deployment through an ongoing process of planning and analysis, implementation, and review. This Web page includes links to documents that support and document the program management process, and the results and public benefits that derive from it.

208

Transition Implementation Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide was prepared to aid in the development, planning, and implementation of requirements and activities during the transition phase at Department of Energy (DOE) facilities that have been declared or are forecast to become excess to any future mission requirements.

2001-04-24T23:59:59.000Z

209

Supplementary Protocol Here we provide details on the implementation of five analyses in Thunder, explaining  

E-Print Network [OSTI]

, explaining for each the goal of the analysis, how it can be run from the Python shell (e.g. in iPython

Cai, Long

210

An ObjectOriented Implementation of the Xpress Transfer Protocol 1  

E-Print Network [OSTI]

, and CRADA No. 1136 between Sandia National Laboratories and AT&T Bell Labs. #12; This paper discusses

Strayer, William Timothy

211

An Object-Oriented Implementation of the Xpress Transfer Protocol1  

E-Print Network [OSTI]

, and CRADA No. 1 136 between Sandia National Laboratories and AT&T Bell Labs. #12;This paper discusses

Strayer, William Timothy

212

IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov  

E-Print Network [OSTI]

IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov:{yongs,vleung,beznosov}@ece.ubc.ca Keywords: Communication security, Mobile security, Multiple channels, SSL Abstract: Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. In contrast to SSL

213

Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work-in-Progress/Application Paper track.  

E-Print Network [OSTI]

Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work an adaptation controller for SSL (Secure Socket Layer), called Adaptive SSL. 1 Introduction Applications adaptation of the Secure Socket Layer (SSL) protocol [3]. Adaptive SSL (ASSL) aims to provide appropriate se

Newcastle upon Tyne, University of

214

Optical implementation of Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms in eight dimensions  

E-Print Network [OSTI]

We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein-Vazirani quantum algorithms for 8-point functions. The measured visibility of the 8-path interferometer is about 97.5%. Potential applications of our setup to quantum communication or cryptographic protocols using several qubits are discussed.

E. Brainis; L. -P. Lamoureux; N. J. Cerf; Ph. Emplit; M. Haelterman; S. Massar

2002-12-24T23:59:59.000Z

215

Measuring Transport Protocol Potential for Energy Efficiency  

E-Print Network [OSTI]

Measuring Transport Protocol Potential for Energy Efficiency S. Kontogiannis, L. Mamatas, I. Psaras, Greece {skontog, emamatas, ipsaras, vtsaousi}@ee.duth.gr Abstract. We investigate the energy-saving potential of transport pro- tocols. We focus on the system-related aspect of energy. Do we have to damage

Tsaoussidis, Vassilis

216

Optimal Decentralized Protocols for Electric Vehicle Charging  

E-Print Network [OSTI]

1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging. The algorithms exploit the elasticity and controllability of electric vehicle loads in order to fill the valleys

Low, Steven H.

217

Utility, informativity and protocols Robert van Rooy  

E-Print Network [OSTI]

Utility, informativity and protocols Robert van Rooy ILLC/University of Amsterdam R particular natural assumptions the utility of questions and answers reduces to their informativity, and that the ordering relation induced by utility sometimes even reduces to the logical relation of entailment

van Rooij, Robert

218

Transport Control Protocol (TCP) In Heterogeneous Networks  

E-Print Network [OSTI]

Sprint Transport Control Protocol (TCP) In Heterogeneous Networks Objectives · Principles of TCP functional modules: slow start, congestion avoidance, fast transmission and fast recovery. ­ Maintain · Packet dropping is the only indication signal for network congestion (Maybe?) · Different transmission

Shihada, Basem

219

Web Applications and Security Web protocol overview  

E-Print Network [OSTI]

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

220

Northern Kentucky University Communicable Disease Protocol  

E-Print Network [OSTI]

Northern Kentucky University Communicable Disease Protocol Approved 12/6/2011 1.0 Scope To develop procedures and policies for Northern Kentucky University students who reside on or off- campus who have been those required as outlined in 902 KAR 2:020 to be reported to the Northern Kentucky Health Department

Boyce, Richard L.

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Security proofs of cryptographic protocols Eva Jencusova  

E-Print Network [OSTI]

with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

222

Small Business Administration Recovery Act Implementation | Department...  

Broader source: Energy.gov (indexed) [DOE]

Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small...

223

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

Chekanov, S V

2013-01-01T23:59:59.000Z

224

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

S. V. Chekanov

2013-06-27T23:59:59.000Z

225

ANJE5.40. VAX VMS IBM NJE Protocol Emulator  

SciTech Connect (OSTI)

The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

1990-06-01T23:59:59.000Z

226

Experimental Implementation of a Quantum Optical State Comparison Amplifier  

E-Print Network [OSTI]

Quantum optical amplification that beats the noise addition limit for deterministic amplifiers has been realized experimentally using several different nondeterministic protocols. These schemes either require single-photon sources, or operate by noise addition and photon subtraction. Here we present an experimental demonstration of a protocol that allows nondeterministic amplification of known sets of coherent states with high gain and high fidelity. The experimental system employs the two mature quantum optical technologies of state comparison and photon subtraction and does not rely on elaborate quantum resources such as single-photon sources. The use of coherent states rather than single photons allows for an increased rate of amplification and a less complex photon source. Furthermore it means that the amplification is not restricted to low amplitude states. With respect to the two key parameters, fidelity and amplified state production rate, we demonstrate, without the use of quantum resources, significant improvements over previous experimental implementations.

Ross J. Donaldson; Robert J. Collins; Electra Eleftheriadou; Stephen M. Barnett; John Jeffers; Gerald S. Buller

2014-04-16T23:59:59.000Z

227

Implementing Motor Decision Plans  

E-Print Network [OSTI]

Implementing Motor Decision Plans R. Neal Elliott, Ph.D., P.E., Senior Associate American Council for an Energy-Efficient Economy (ACEEE), Washington, DC Abstract The first step to reducing energy costs and increasing reliability in motors... when a motor fails and must either be replaced or repaired. This is represented visually in Figure 1. When purchasing a motor for a new application, time is usually available to consider various options. However, once a motor has failed...

Elliott, R. N.

228

Implementation of Sustainability at  

E-Print Network [OSTI]

0 Assessing Implementation of Sustainability at UiO Grønt UiO S u s t a i n a b i l i t y i n R e sustainability commitment among universities and proposed Best Green University Practices in 2010. It presents the current status of UiO Environmental Sustainability. #12;1 If you cannot measure it, you cannot manage it

Johansen, Tom Henning

229

A New Protocol for Evaluating Concrete Curing Effectiveness  

E-Print Network [OSTI]

and qualify the curing compound, a new evaluation protocol is introduced in this study. The new protocol consists of using measured relative humidity and temperature to calculate an effectiveness index (EI) which serves as an indicator of the effectiveness...

Sun, Peizhi

2013-07-22T23:59:59.000Z

230

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

Jacobs, Kurt

231

Protocols for the Equitable Assessment of Marine Energy Converters   

E-Print Network [OSTI]

This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

232

Coherent feedback that beats all measurement-based feedback protocols  

E-Print Network [OSTI]

We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

2014-07-21T23:59:59.000Z

233

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

234

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

235

Utilisation des Protocoles HARQ pour la Radio Cognitive  

E-Print Network [OSTI]

Utilisation des Protocoles HARQ pour la Radio Cognitive Romain Tajan encadré/01/2012 #12;Plan 1 Introduction 2 La Radio Cognitive Techniques de la Radio Cognitive Méthodes d'accès 3 performances du protocole IR-HARQ 4 Utilisation des protocoles HARQ pour la Radio Cognitive Utilisation de l

Dobigeon, Nicolas

236

Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,  

E-Print Network [OSTI]

to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

237

A Multi-Sender Asynchronous Extension to the AER Protocol  

E-Print Network [OSTI]

A Multi-Sender Asynchronous Extension to the AER Protocol John Lazzaro and John Wawrzynek Computer-event representation (AER) is an asynchronous point-to-point communi- cations protocol for silicon neural systems. This paper describes an extension of the AER protocol that allows multiple AER senders to share a common bus

Lazzaro, John

238

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

239

ORISE: Policy Implementation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory |CHEMPACK MappingHistory TheManagement ManPolicy Implementation

240

Building America House Simulation Protocols (Revised)  

SciTech Connect (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Lab protocols A. Preparation of competent Cells  

E-Print Network [OSTI]

for 30- 60 min. #12;Lab protocols C. Solutions RF1 Compound RbCl MnCl2 4H2O Potassium acetate CaCl2.2H2O-rinsed 0.22 u membrane. RF2 Compound MOPS RbCl CaCl2.2H2O Glycerol Amount/liter 20 ml of 0.5 M (pH6.8) 1

Oliver, Douglas L.

242

CERTIFICATION OF C-OFFSETT FORESTRY  

E-Print Network [OSTI]

substitution (Bioenergy / biofuels) Mitigation options in the forest sector "Regulated" market The "regulated · The two markets: · "regulated" · voluntary · Implementation problems: connected with · the forest projects Outline Repetita iuvant The two markets · "Regulated" (institutional) Kyoto Protocol · voluntary C

Pettenella, Davide

243

Information for the Commercialisation of Renewables in ASEAN (ICRA)  

E-Print Network [OSTI]

.2 CDM Policy 14 5. EU Emissions Trading Scheme 17 6. European Carbon Credits Demand 19 7. Policy) Emissions Trading (ET), ii) Joint Implementation (JI), and iii) Clean Development Mechanism (CDM). The Clean the launching of the EU Emissions Trading Scheme (EU ETS). The EU ETS is independent from the Kyoto Protocol

244

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol-profit organizations. To inform processes of policy development and implementation, climate change research needs #12;The MIT Joint Program on the Science and Policy of Global Change is an organization for research

245

08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols  

E-Print Network [OSTI]

Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

Udgaonkar, Jayant B.

246

Guidebook for Six Sigma Implementation  

E-Print Network [OSTI]

Guidebook for Six Sigma Implementation with Real Time Applications Editorial Committee Chairman: Dr & QUALITY COUNCIL OF INDIA A unique book on Six sigma implementation strategy with Real time case studies Now available !!! Now available !!! #12;Guidebook for Six Sigma Implementation with Real Time

Bandyopadhyay, Antar

247

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect (OSTI)

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

248

Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols  

E-Print Network [OSTI]

................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

Duan, Pu

2012-07-16T23:59:59.000Z

249

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code  

E-Print Network [OSTI]

protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

No, Jong-Seon

250

Privacy of encrypted Voice Over Internet Protocol  

E-Print Network [OSTI]

of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

Lella, Tuneesh Kumar

2008-10-10T23:59:59.000Z

251

2014 Building America House Simulation Protocols  

SciTech Connect (OSTI)

As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

2014-03-01T23:59:59.000Z

252

* Presented at the 1998 International Workshop on Aspect-Oriented Programming (Kyoto, Japan; April 20, 1998) held at the 20th International Conference on Software Engineering.  

E-Print Network [OSTI]

design and implementation technique proposed by researchers at Xerox PARC. This project is assessing-oriented programming is a new software design and implementation technique proposed by re- searchers at Xerox PARC[2, develop and maintain certain kinds of application code while maintaining highly efficient code. To better

Walker, Robert James

253

Environmental Implementation Plan  

SciTech Connect (OSTI)

The Environmental Implementation Plan (EIP) is a dynamic long-range environmental-protection plan for SRS. The EIP communicates the current and future (five year) environmental plans from individual organizations and divisions as well as site environmental initiatives which are designed to protect the environment and meet or exceed compliance with changing environmental/ regulatory requirements. Communication with all site organizations is essential for making the site environmental planning process work. Demonstrating environmental excellence is a high priority embodied in DOE and WSRC policy. Because of your support and participation in the three EIP initiatives; Reflections, Sectional Revision, and Integrated Planning, improvements are being made to the EIP and SRS environmental protection programs. I appreciate the ``Partnership in Environmental Excellence`` formed by the environmental coordinators and professionals who work daily toward our goal of compliance and environmental excellence. I look forward to seeing continued success and improvement in our environmental protection programs through combined efforts of all site organizations to protect our employees, the public health, and the environment. Together, we will achieve our site vision for SRS to be the recognized model for Environmental Excellence in the DOE Nuclear Weapons Complex.

Not Available

1994-02-01T23:59:59.000Z

254

TRUPACT-1 implementation plan  

SciTech Connect (OSTI)

TRUPACT-1, the TRansUranic PACkage Transporter is a packaging designed to transport defense contact handled transuranic (CH-TRU) waste from generating and interim TRU waste storage facilities to the Waste Isolation Pilot Plant (WIPP). Prior to fabrication and procurement of a full fleet, an initial design (TRUPACT-1) will be introduced to the defense TRU waste complex through use in an operational prototype fleet which will consist of Units 1, 2, and 3. In an effort to provide a relatively smooth introduction of the TRUPACT-1, the TRUPACT Technical Team (TTT) has developed the following implementation plan. The plan provides detailed information on user handling opportunities, schedules, equipment, responsibilities, reporting and data collection activities to be performed. The intent of this document is to provide users of the TRUPACT-1 with a guidance document, complete with references, that will allow the smooth introduction of this new transportation system by providing the information necessary for collecting operational, performance and cost data. These data will be used in modeling and full fleet design and procurement activities. In addition, these data will help fine tune procedures in the inspection and maintenance document and the operational document. Additional objectives of this plan are to aid in the establishment of site operational, inspection and maintenance procedures as well as training of site operators and briefing state and local officials.

Hurley, J.D.; Tappen, J.J. (Westinghouse Electric Corp., Albuquerque, NM (United States). Joint Integration Office); Christensen, D.S. (USDOE Joint Integration Office, Albuquerque, NM (United States)) (eds.)

1985-09-01T23:59:59.000Z

255

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

256

Fibred Coalgebraic Logic and Quantum Protocols  

E-Print Network [OSTI]

Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

Daniel Marsden

2014-12-30T23:59:59.000Z

257

Chapter 18: Variable Frequency Drive Evaluation Protocol  

SciTech Connect (OSTI)

An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

Romberger, J.

2014-11-01T23:59:59.000Z

258

Separable states improve protocols with restricted randomness  

E-Print Network [OSTI]

It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterise the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models and separable, i.e. disentangled, states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that in particular, separable states may improve the so-called random access codes, which is a class of communication problems where one party tries to read a portion of the data held by another distant party in presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord.

T. K. Chuan; T. Paterek

2014-10-07T23:59:59.000Z

259

KYOTO UNIVERSITYKYOTO UNIVERSITY Kyoto University Financial Report 2013 09  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

260

Conduct of operations implementation plan  

SciTech Connect (OSTI)

This implementation plan describes the process and provides information and schedules that are necessary to implement and comply with the Department of Energy (DOE) Order 5480.19, {open_quotes}Conduct of Operations{close_quotes} (CoOp). This plan applies to all Pinellas Plant operations and personnel. Generally, this Plan discusses how DOE Order 5480.19 will be implemented at the Pinellas Plant.

Anderson, C.K.; Hall, R.L.

1991-02-20T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network [OSTI]

Services Administration. 10 IEA is the International Energy Agency. ESL-IC-08-10-11 Proceedings of the Eighth International Conference for Enhanced Building Operations, Berlin, Germany, October 20-22, 2008 2 The resultant protocols are intended to provide... Building Operations, Berlin, Germany, October 20-22, 2008 3 Chapter 1: Energy (Authors: MacDonald, Haberl). In Chapter 1 the protocols for measuring the building?s energy useare presented. These protocols begin with acollection of facility information...

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

262

DOE Transportation Protocols Topic Group Summary of Second Conference  

Broader source: Energy.gov (indexed) [DOE]

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

263

DOE Transportation Protocols Topic Group Conference Call Summary...  

Broader source: Energy.gov (indexed) [DOE]

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

264

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network [OSTI]

Decentralized Decision-making and Protocol. Design for Recycled Material Flows. Reverse logistics networks often consist of several tiers with independent

ihong

2006-07-24T23:59:59.000Z

265

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of...

266

A search for quantum coin-flipping protocols using optimization ...  

E-Print Network [OSTI]

Mar 3, 2014 ... We conduct two kinds of search: one for protocols. ?Department of ..... This operation maps a probability vector to a quantum state, see Sub-.

2014-03-02T23:59:59.000Z

267

Formal Modelling and Analysis of the NORM Multicast Protocol  

E-Print Network [OSTI]

Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude Elisabeth Lien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 iii #12;2.3.2 Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Ă?lveczky, Peter Csaba

268

DOE Cell Component Accelerated Stress Test Protocols for PEM...  

Broader source: Energy.gov (indexed) [DOE]

CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

269

Cell Component Accelerated Stress Test Protocols for PEM Fuel...  

Broader source: Energy.gov (indexed) [DOE]

USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

270

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased...  

Open Energy Info (EERE)

Purchased Electricity Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity AgencyCompany...

271

BPA Response to Comments on Oversupply Management Protocol  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

272

Development of an Accelerated Ash-Loading Protocol for Diesel...  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Ash-Loading Protocol for Diesel Particulate Filters Bruce G. Bunting and Todd J. Toops Oak Ridge National Laboratory Adam Youngquist and Ke Nguyen University of...

273

KYOTO UNIVERSITYKYOTO UNIVERSITY Financial Report  

E-Print Network [OSTI]

Report 201312 #12; 30 11 13AUN 2ASEAN+3 Educational Forum and Young Speakers Contest3 AUNASEAN University Network21 ASEAN+3 4 ASEAN+3 24 ...... 3,027 ...... 3,447 2451 ......13,403 ...... 9 Century Collections Online 1 KULINE 13AUN2 ASEAN+3 Educational Forum and Young Speakers Contest 6

Takada, Shoji

274

GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO  

E-Print Network [OSTI]

for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy, YU-MI MUN, NOAH TOLY & YOUNG-DOO WANG Position Paper prepared for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy tel: 302.831.8405 · web: www

Delaware, University of

275

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center in Humanities established. 1941 Chest Disease Research Institute and Institute of Atomic Energy established Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

276

Kyoto University 1 Year Contents  

E-Print Network [OSTI]

and Plasma Physics Laboratory merged into the Institute of Advance Energy. Student Counseling Center Chest Disease Research Institute and Institute of Atomic Energy established. 1944 Wood Research Laboratory established. 1996 Graduate School of Energy Science established. Institute of Atomic Energy

Takada, Shoji

277

Energy Sector Cybersecurity Framework Implementation Guidance  

Broader source: Energy.gov (indexed) [DOE]

DRAFT FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of...

278

Efficiency First - Contractor Outreach: Design & Implementation...  

Energy Savers [EERE]

Efficiency First - Contractor Outreach: Design & Implementation for Residential Retrofit Programs Efficiency First - Contractor Outreach: Design & Implementation for Residential...

279

Biofuel and Bioenergy implementation scenarios  

E-Print Network [OSTI]

and bioenergy markets are modelled with the aim to conduct quantitative analyses on the production and costsBiofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies #12;Biofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies By André

280

An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model  

E-Print Network [OSTI]

Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

C. Erven; Nelly Huei Ying Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

2014-05-18T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self-Organization  

E-Print Network [OSTI]

Analysis of the Impact of Hello Protocol Parameters over a Wireless Network Self of the HELLO protocol. This makes this HELLO protocol very important for wireless networks especially for self- organizing the network. Most of layer-3 protocols assume an ideal MAC layer. In such a case, HELLO protocol

Paris-Sud XI, Université de

282

Field and Lab Methods & Protocols University of Michigan  

E-Print Network [OSTI]

SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

Kling, George W.

283

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs  

E-Print Network [OSTI]

Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

Boyer, Edmond

284

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

285

Practical quantum oblivious transfer and bit commitment protocols  

E-Print Network [OSTI]

We propose a practical quantum oblivious transfer and a bit commitment protocols which replace the single-photon source with weak coherent pulses and allow error and loss in channel and detectors. These protocols can be realized with available optoelectronic apparatus.

Ya-Qi Song; Li Yang

2015-02-09T23:59:59.000Z

286

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

287

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

288

Internet Protocol Adoption: Learning from Bitcoin Position Paper  

E-Print Network [OSTI]

This position paper discusses two related questions: 1. Using the framework of network economics, what are success factors behind the adoption of Bitcoin (a cryptographic curreny), and can we copy them for other protocols? 2. Can we design more successful protocols if we have inband payment mechanisms to internalize the externalities that emerge during adoption and in steady state? 1.

Rainer Böhme; Westfälische Wilhelms-universität Münster

289

A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

Nahrstedt, Klara

290

Uniform Leader Election Protocols for Radio Networks Koji Nakano  

E-Print Network [OSTI]

Uniform Leader Election Protocols for Radio Networks #3; Koji Nakano School of Information Science be distinguished by serial or manufacturing number. The leader election problem asks to designate one of the station as leader. A leader election protocol is said to be uniform if in each time slot every station

Nakano, Koji

291

Hello Again: Stabilization of the Hello Protocol in OSPF  

E-Print Network [OSTI]

Hello Again: Stabilization of the Hello Protocol in OSPF Jorge A. Cobb Mohamed G. Gouda Deepinder Sidhu § Abstract The Hello protocol in OSPF allows each router in a network to check whether it can periodi- cally send hello messages to every neighboring router in the network. Associated with the Hello

Cobb, Jorge Arturo

292

Modelling unbounded parallel sessions of security protocols in CSP  

E-Print Network [OSTI]

Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

Roscoe, Bill

293

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

294

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks  

E-Print Network [OSTI]

Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

Kulkarni, Sandeep

295

Improved protocols of secure quantum communication using W states  

E-Print Network [OSTI]

Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

Chitra Shukla; Anindita Banerjee; Anirban Pathak

2012-04-20T23:59:59.000Z

296

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

297

ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13-57 Patrick Center for Environmental Research 117  

E-Print Network [OSTI]

of associated pressure gauges, and monitor the volume of gas left in the tank. Replace cylinders as needed. Any hoods. 3.1.4. Gas suspension tables. 3.1.5. Slide warmers/hot plates. 3.2. Chemistry Laboratory. 3 recommended. Periodically clean oil #12;ANSP Protocols for Analysis of NAWQA Algae Samples Protocol P-13

Charles, Donald

298

Operating Reserves: Billing Implementation Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

D M I N I S T R A T I O N 2 Overview Explain the billing delay in implementing new WECC OR standards Customer outreach New project schedule Review new OR billing...

299

HUD Choice Neighborhoods Implementation Grants  

Broader source: Energy.gov [DOE]

The U.S. Department of Housing and Urban Development (HUD) is accepting applications to support communities that have undergone a comprehensive local planning process and are ready to implement their "Transformation Plan" to redevelop the neighborhood.

300

Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level  

E-Print Network [OSTI]

Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

Kohm, Katherine E.

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final report: Revision 1  

SciTech Connect (OSTI)

Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing site are summarized as follows: In accordance with EPA-promulgated land cleanup standards, in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 clean up protocol has been developed. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR Part 192 relative to supplemental standards.

Gonzales, D.

1993-12-01T23:59:59.000Z

302

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect (OSTI)

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

303

E-Print Network 3.0 - aided routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: aided routing protocol Page: << < 1 2 3 4 5 > >> 1 Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Summary: network. LAR: Location Aided...

304

E-Print Network 3.0 - applicable protocol fails Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

identical protocol is used for different purposes ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 2 Protocol Interactions and...

305

Parallel decomposition of the logical link control protocol  

E-Print Network [OSTI]

INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

Bajpai, Dhruv Haribanshnath

1991-01-01T23:59:59.000Z

306

Protocol for secure quantum machine learning at a distant place  

E-Print Network [OSTI]

The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

2015-04-20T23:59:59.000Z

307

Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams  

SciTech Connect (OSTI)

An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new k{sub Q} data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of N{sub D,w} coefficients is discussed. It is expected that the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration.

McEwen, Malcolm, E-mail: malcolm.mcewen@nrc-cnrc.gc.ca [National Research Council, 1200 Montreal Road, Ottawa, Ontario (Canada)] [National Research Council, 1200 Montreal Road, Ottawa, Ontario (Canada); DeWerd, Larry [University of Wisconsin, 1111 Highland Avenue, Madison, Wisconsin 53705 (United States)] [University of Wisconsin, 1111 Highland Avenue, Madison, Wisconsin 53705 (United States); Ibbott, Geoffrey [Department of Radiation Physics, M D Anderson Cancer Center, 1515 Holcombe Boulevard, Houston, Texas 77030 (United States)] [Department of Radiation Physics, M D Anderson Cancer Center, 1515 Holcombe Boulevard, Houston, Texas 77030 (United States); Followill, David [IROC Houston QA Center, Radiological Physics Center, 8060 El Rio Street, Houston, Texas 77054 (United States)] [IROC Houston QA Center, Radiological Physics Center, 8060 El Rio Street, Houston, Texas 77054 (United States); Rogers, David W. O. [Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario (Canada)] [Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario (Canada); Seltzer, Stephen [National Institute of Standards and Technology, Gaithersburg, Maryland 20899 (United States)] [National Institute of Standards and Technology, Gaithersburg, Maryland 20899 (United States); Seuntjens, Jan [Medical Physics Unit, McGill University, 1650 Cedar Avenue, Montreal, Québec (Canada)] [Medical Physics Unit, McGill University, 1650 Cedar Avenue, Montreal, Québec (Canada)

2014-04-15T23:59:59.000Z

308

Islip Housing Authority Energy Efficiency Turnover Protocols, Islip, New York (Fact Sheet)  

SciTech Connect (OSTI)

More than 1 million HUD-supported public housing units provide rental housing for eligible low-income families across the country. A survey of over 100 PHAs across the country indicated that there is a high level of interest in developing low cost solutions that improve energy efficiency and can be seamlessly included in the refurbishment process. Further, PHAs, have incentives (both internal and external) to reduce utility bills. ARIES worked with two public housing authorities (PHAs) to develop packages of energy efficiency retrofit measures the PHAs can cost effectively implement with their own staffs in the normal course of housing operations at the time when units are refurbished between occupancies. The energy efficiency turnover protocols emphasized air infiltration reduction, duct sealing and measures that improve equipment efficiency. ARIES documented implementation in ten housing units. Reductions in average air leakage were 16-20% and duct leakage reductions averaged 38%. Total source energy consumption savings was estimated at 6-10% based on BEopt modeling with a simple payback of 1.7 to 2.2 years. Implementation challenges were encountered mainly related to required operational changes and budgetary constraints. Nevertheless, simple measures can feasibly be accomplished by PHA staff at low or no cost. At typical housing unit turnover rates, these measures could impact hundreds of thousands of unit per year nationally.

Not Available

2014-08-01T23:59:59.000Z

309

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect (OSTI)

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

310

Proposals for Non-PGM Catalyst Target and Test Protocols  

Broader source: Energy.gov (indexed) [DOE]

Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

311

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

312

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network [OSTI]

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

313

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

314

Design and simulation of Header Processor for Xpress Transfer Protocol  

E-Print Network [OSTI]

cannot meet the demands of future applications. Contemporary protocols provide traditional error-control and flow- control functions but do not provide fast and implicit connection setup, rapid re- quest/response and reliable multicast operations... OF SCIENCE August 1993 Major Subject: Electrical Engineering DESIGN AND SIMULATION OF HEADER PROCESSOR FOR XPRESS TRANSFER PROTOCOL A Thesis by GIRISH R. CHANDANGOUDAR Approved ss to style and content by: Hosame Abu-Amara (Chair of Committee) Bar G...

Chandangoudar, Girish R.

1993-01-01T23:59:59.000Z

315

Federal Sector Renewable Energy Project Implementation: ""What...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Federal Sector Renewable Energy Project Implementation: ""What's Working and Why Federal Sector Renewable Energy Project Implementation: ""What's Working and Why Presentation by...

316

Renewable Energy Project Planning and Implementation | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Planning and Implementation Renewable Energy Project Planning and Implementation Federal renewable energy projects can be large or small and managed by a third-party or the agency....

317

Energy Efficiency Financing Program Implementation Primer | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Efficiency Financing Program Implementation Primer Energy Efficiency Financing Program Implementation Primer This primer provides an overview of key considerations for state and...

318

Stimulating Energy Efficiency in Kentucky: An Implementation...  

Broader source: Energy.gov (indexed) [DOE]

Stimulating Energy Efficiency in Kentucky: An Implementation Model for States Stimulating Energy Efficiency in Kentucky: An Implementation Model for States This presentation, given...

319

Financing Program Design and Implementation Considerations  

Broader source: Energy.gov [DOE]

Designing and implementing clean energy financing programs takes more than simply identifying applicable financing structures and implementing them. State and local governments should also take...

320

Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer  

E-Print Network [OSTI]

A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit, and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80/s successful state transfer events out of 18,000/s repetitions.

Christoph Kurz; Michael Schug; Pascal Eich; Jan Huwer; Philipp Müller; Jürgen Eschner

2014-10-10T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

DATA BASE DESIGN AND IMPLEMENTATION  

E-Print Network [OSTI]

, integrity constraints, A brief history of database applications When not to use database Fundamentals8/26/2010 1 1 ITCS 3160 DATA BASE DESIGN AND IMPLEMENTATION JING YANG 2010 FALL Class 2: Database System Concepts and Architecture Review of Class 1 2 Database MDatabase management systems (DBMS) Concept

Yang, Jing

322

DATA BASE DESIGN AND IMPLEMENTATION  

E-Print Network [OSTI]

Approach A Brief History of Database Applications When Not to Use a DBMS Fundamentals of Database Systems8/24/2010 1 ITCS 3160 DATA BASE DESIGN AND IMPLEMENTATION JING YANG 2010 FALL Class 1 Database and database users Outline Introduction A 2 An Example Characteristics of the Database Approach Actors

Yang, Jing

323

Implementing Nutrient Management Practices in  

E-Print Network [OSTI]

/Implementation Efforts Nutrient and Pest Management Program (NPM) Certified Crop Adviser (CCA) Training Local Nutrient Assurance Team #12;Nutrient & Pest Management (NPM) Program What we do · Promote agricultural management conservation staff. · Over 400 participants to date Presented by: UWEX, NPM, DATCP, NRCS Financial support

Balser, Teri C.

324

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

325

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

Schneier, Bruce

326

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

Schneier, Bruce

327

Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches  

E-Print Network [OSTI]

Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

Anirban Pathak

2014-11-24T23:59:59.000Z

328

New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless  

E-Print Network [OSTI]

New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

Jain, Raj

329

Resources on Implementing Energy Savings Performance Contracts  

Broader source: Energy.gov [DOE]

Many resources are available to help Federal agencies implement energy savings performance contracts (ESPCs).

330

Designing and Implementing Effective Performance Assurance Plans  

Broader source: Energy.gov [DOE]

Presentation—given at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting— covers performance assurance planning and process, including performance-based contracts, and measurement and verification protocols.

331

Hybrid and optical implementation of the Deutsch-Jozsa algorithm  

E-Print Network [OSTI]

A hybrid model of the Deutsch-Jozsa algorithm is presented, inspired by the proposals of hybrid computation by S. Lloyd and P. van Loock et. al. The model is based on two observations made about both the discrete and continuous algorithms already available. First, the Fourier transform is a single-step operation in a continuous-variable (CV) setting. Additionally, any implementation of the oracle is nontrivial in both schemes. The steps of the computation are very similar to those in the CV algorithm, with the main difference being the way in which the qunats, or quantum units of analogic information, and the qubits interact in the oracle. Using both discrete and continuous states of light, linear devices, and photo-detection, an optical implementation of the oracle is proposed. For simplicity, infinitely squeezed states are used in the continuous register, whereas the optical qubit is encoded in the dual-rail logic of the KLM protocol. The initial assumption of ideal states as qunats will be dropped to study the effects of finite squeezing in the quality of the computation.

Luis A. Garcia; Jagdish R. Luthra

2009-12-31T23:59:59.000Z

332

Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols  

SciTech Connect (OSTI)

Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

2013-05-01T23:59:59.000Z

333

The Design and Implementation of Atomic Ion Shuttling Protocols in a Multi-dimensional Ion Trap Array  

E-Print Network [OSTI]

corner using control voltage sequences accounting for the complicated electric potential in the junc . . . . . . . . . . . . 53 2.6 Requirements on Electric Potential . . . . . . . . . . . . . . . . 59 3. Manipulation's of Science in Physics. May 4, 2006 #12;2 Abstract Harnessing the laws of Quantum Mechanics, Quantum Computers

Monroe, Christopher

334

1254 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 48, NO. 4, AUGUST 2001 Implementation of a Serial Protocol for the Liquid  

E-Print Network [OSTI]

, in a radiation-free environment. It is connected through four unidirectional optical links (the number of fibers of the liquid argon calorimeters, located in an irradiated environment. After a technical description are located in an irradiated environment (20 Gray/year and neutrons/cm /year) [3]. The information is intended

335

Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems Engineering Research and Development (PSEEnergyProjectProjectsDiffusion

336

A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11  

SciTech Connect (OSTI)

This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

1991-05-15T23:59:59.000Z

337

Protocol development for evaluation of commercial catalytic cracking catalysts  

SciTech Connect (OSTI)

A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

1988-09-01T23:59:59.000Z

338

A practical approach to the interGroup protocols  

SciTech Connect (OSTI)

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

2001-11-12T23:59:59.000Z

339

Routing Protocols for Cognitive Radio Networks: A Survey  

E-Print Network [OSTI]

with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

Kamruzzaman, S M

2010-01-01T23:59:59.000Z

340

Shear Transformation Zones: State Determined or Protocol Dependent?  

E-Print Network [OSTI]

The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

2014-08-18T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Fast Delivery Protocol for Total Order Broadcasting  

SciTech Connect (OSTI)

The conclusions of this report are: (1) Fast delivery protocol reduces the latency of message ordering for idle systems and keep comparable performances with communication history algorithms for busy systems; (2) The protocol optimizes the total ordering process by waiting for messages only from a subset of the machines in the group; and (3) The fast acknowledgment aggressively acknowledges total order messages to reduce the latency for idle system, and it is smart enough to hold the acknowledgments when the network communication is heavy.

Ou, Li [Tennessee Technological University; He, X. [Tennessee Technological University; Engelmann, Christian [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

342

A Hybrid Long-Distance Entanglement Distribution Protocol  

E-Print Network [OSTI]

We propose a hybrid (continuous-discrete variable) quantum repeater protocol for distribution of entanglement over long distances. Starting from entangled states created by means of single-photon detection, we show how entangled coherent state superpositions, also known as `Schr\\"odinger cat states', can be generated by means of homodyne detection of light. We show that near-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements.

Jonatan B. Brask; Ioannes Rigas; Eugene S. Polzik; Ulrik L. Andersen; Anders S. Sorensen

2010-04-01T23:59:59.000Z

343

Implementation Regulations 3TU MSc Sustainable Energy Technology Delft, 2014-2015 THE IMPLEMENTATION REGULATIONS  

E-Print Network [OSTI]

Implementation Regulations 3TU MSc Sustainable Energy Technology ­ Delft, 2014-2015 THE IMPLEMENTATION REGULATIONS 2014 - 2015 3TU MASTER'S DEGREE PROGRAMME Sustainable Energy Technology - Delft (SET) DELFT UNIVERSITY OF TECHNOLOGY #12;Implementation Regulations MSc Sustainable Energy Technology SET

344

CASL - Implementing Integrated Steam Tables  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, andAnalysis of Two-DimensionalImplementing

345

CASL - Implementing Integrated Steam Tables  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, andAnalysis of Two-DimensionalImplementingLift

346

Examining the Relationship Between Implementation and Student Outcomes: The Application of an Implementation Measurement Framework .  

E-Print Network [OSTI]

??The current study evaluated the implementation of evidence-based reading interventions using a multifaceted implementation measurement approach. Multilevel modeling was used to examine how three direct… (more)

Spear, Caitlin

2015-01-01T23:59:59.000Z

347

Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol  

E-Print Network [OSTI]

We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

2002-10-31T23:59:59.000Z

348

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas  

E-Print Network [OSTI]

Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract-- Unmanned aerial vehicle (UAV) has been used inspection and range extension. Moreover, UAVs are suited for situations that are too dangerous for direct

Dong, Liang

349

Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol  

SciTech Connect (OSTI)

The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

Romberger, J.

2014-11-01T23:59:59.000Z

350

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

351

A Review of Embedded Automotive Protocols Nicolas Navet  

E-Print Network [OSTI]

A Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst is given. Next, the current eorts of the automotive industry on middleware technologies which may

Navet, Nicolas

352

Air to Air Communication Protocol Arjan Durresi1  

E-Print Network [OSTI]

1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

Jain, Raj

353

Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"  

E-Print Network [OSTI]

In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

2014-04-28T23:59:59.000Z

354

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network [OSTI]

Biomolecular free energy profiles by a shootingĂ?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

355

Survivability validation protocol issues for a system-of-systems  

SciTech Connect (OSTI)

This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

1993-08-01T23:59:59.000Z

356

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 PVC Pipe Deployment Protocol: 1. Arrange time to meet should include: a. 12 pipes with caps (there should be ~3 pipes on "your" transects out in the field & place trap on the stake (using hole near top of pipe for screw head). e. Record UTM positions (easting

Johnson, Matthew

357

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

358

STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001  

E-Print Network [OSTI]

1 STOCKER FLY BRAIN IMMUNOFLUORESCENCE PROTOCOL January 8, 2001 Vosshall Lab 1. Anesthetize flies the brain, starting with the removal of the proboscis. Gently peel away the cuticle at the back of the fly the esophagus (hole in brain). Once all the cuticle has been removed, gently remove the fat body and trachea

359

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

360

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

WHOP: Wormhole Attack Detection Protocol using Hound Packet  

E-Print Network [OSTI]

WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

Dharmaraja, S.

362

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network  

E-Print Network [OSTI]

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

Dharmaraja, S.

363

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations  

E-Print Network [OSTI]

A Hierarchical Checkpointing Protocol for Parallel Applications in Cluster Federations S federation. As a cluster federation comprises of a large number of nodes, there is a high probability fits to the characteristics of a cluster federation (large number of nodes, high latency and low

Paris-Sud XI, Université de

364

CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea  

E-Print Network [OSTI]

1 CARD-FISH and Microautoradiography Protocol for Bacteria and Archaea by Gerhard Herndl Lab @ www FISH Hybridization www.microbial-oceanography.eu 2007 2 Sample Fixation 1. Fix samples in Ethanol 95% 7. Dry and mount in DAPI mix #12;CARD FISH Buffers and Chemicals www

Herndl, Gerhard

365

Reliable and Energy-Efficient Routing Protocol in Dense  

E-Print Network [OSTI]

Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks Min Chen, Taekyoung Kwon, Shiwen Mao, + Yong Yuan, Victor C.M. Leung* Department of Electrical and Computer@snu.ac.kr Department of Electrical and Computer Engineering Auburn University, 200 Broun Hall, Auburn, AL 36849

Chen, Min

366

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note  

E-Print Network [OSTI]

LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

Raizada, Manish N.

367

GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning  

E-Print Network [OSTI]

GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

Movileanu, Liviu

368

An adaptive protocol for distributed beamforming Stephan Sigg1  

E-Print Network [OSTI]

settings and propose a protocol that utilises organic computing principles to find optimum parameters is the approach to combine transmission signals from distinct transmit antennas simultaneously in order to create transmission [7, 8, 2]. Several open-loop and closed-loop carrier synchronisation approaches have been proposed

Beigl, Michael

369

How to Use Bitcoin to Design Fair Protocols Iddo Bentov  

E-Print Network [OSTI]

How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

370

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network [OSTI]

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

371

Safeguards Agreement and Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

2004-01-07T23:59:59.000Z

372

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

373

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

374

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

375

WSN-inspired Sleep Protocols for Heterogeneous LTE Networks  

E-Print Network [OSTI]

architecture becomes heterogenous, in particular 4G networks where LTE micro eNodeBs are deployed to strengthen algorithm to dynamically switch off and on the micro eNodeBs of an LTE heterogeneous network followingWSN-inspired Sleep Protocols for Heterogeneous LTE Networks Iulia Tunaru CEA CEA-Leti, Minatec

Paris-Sud XI, Université de

376

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

377

Localized radio frequency communication using asynchronous transfer mode protocol  

DOE Patents [OSTI]

A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

2007-08-14T23:59:59.000Z

378

An Energy-Aware Simulation Model and Transaction Protocol  

E-Print Network [OSTI]

1 An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution of Southern California Oct. 15, 2003 Outline ! Introduction ! MANET Simulation Model ! Energy-aware Network of analytical approaches ! We presents a simulation model to evaluating power management policies for a MANET

Pedram, Massoud

379

Deployment Support Leading to Implementation  

SciTech Connect (OSTI)

The following paragraphs summarize the progress of each research project funded under the WVU Cooperative Agreement during the third quarter of 1997 (July - September 1997). The projects are arranged according to their 1997 WVU task number. WVU Focus Area 1.0: Subsurface Contaminants, Containment and Remediation Task No. 1.1: Project discontinued. Task No. 1.2: Development of Standard Test Protocols and Barrier Design Models for Desiccation Barriers (K. Amininan & S. Ameri): A number of experiments were preformed this period to evaluate the ability of the dried sand-packs to act as a barrier to liquids. Water infiltration tests were done with a constant head, dispersing 80 ml of water, and by adding water in small increments. Results indicate that when the water is spilled over the sand-pack, it has the tendency to channel through the sand-pack, significantly reducing the capacity of the dried zone to retain liquid contaminants. This appears to be largely influenced by particle size. As the particle size is reduced, the capillary forces spread the water and prevent/delay channels from forming. The measured permeability values were in agreement with those measured with air. The water retention capacity and capillary rise were largely influenced by time and showed no sensitivity to channeling. The water retention capacity tests suggest the sand-packs can retain more water than the expected. Two sets of water infiltration and drying experiments were designed to evaluate the CAB?s ability to prevent spills from spreading. Ten ml of water was injected every 20 minutes and 80 ml of water was added at one time. When injected slowly, results showed the drying process to be similar to the original drying process. The second set indicted the drying process follows a slowly declining drying with no break through. Results also suggested that air flow through the sand-pack can remove water infiltration. The air flow appeared to prevent any water channeling and thus should cause lateral distribution of the water. The large tank that accommodates the sand bed and the necessary plumbing to simulate various well configurations was received. The monitoring equipment and the sensors are currently being installed. The experimental procedures for Phase II experiments are under further investigation and will be initiated upon installation of CATC and assembly of the monitoring system. Due to insufficient operating funds, the large scale experiments will not be done this year. Task No. 1.3: Technical Support - Development of Standard Test Protocols and Barrier Design Models for In Situ Formed Barriers (B. Overbey & D. Locke, BDM Federal): The Operating Permit Renewal Request for bench scale operations in the FETC B-17 building was submitted to the FETC Lab Safety Committee for approval on 8/14/97. A review of the revised NEPA documents prepared last year indicates that these documents are still applicable for the current work. The initial design and specifications for the CATC vessel were prepared. Construction of the CATC was initiated in early July, the vessel was received August 15, 1997, and on-site work was completed this quarter.

E. E. Cook

1997-10-01T23:59:59.000Z

380

Level Set Implementations on Unstructured Point Cloud  

E-Print Network [OSTI]

Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong A Thesis Submitted;Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong This is to certify that I have implementations on unstructured point cloud 15 3.1 Level set initialization

Duncan, James S.

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution  

E-Print Network [OSTI]

Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field-tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to non-optimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

Feihu Xu; He Xu; Hoi-Kwong Lo

2014-06-01T23:59:59.000Z

382

Implementation of Endomorphisms of the CAR Algebra  

E-Print Network [OSTI]

The implementation of non-surjective Bogoliubov transformations in Fock states over CAR algebras is investigated. Such a transformation is implementable by a Hilbert space of isometries if and only if the well-known Shale-Stinespring condition is met. In this case, the dimension of the implementing Hilbert space equals the square root of the Watatani index of the associated inclusion of CAR algebras, and both are determined by the Fredholm index of the corresponding one-particle operator. Explicit expressions for the implementing operators are obtained, and the connected components of the semigroup of implementable transformations are described.

Carsten Binnenhei

1997-01-10T23:59:59.000Z

383

Diamond turning machine controller implementation  

SciTech Connect (OSTI)

The standard controller for a Pnuemo ASG 2500 Diamond Turning Machine, an Allen Bradley 8200, has been replaced with a custom high-performance design. This controller consists of four major components. Axis position feedback information is provided by a Zygo Axiom 2/20 laser interferometer with 0.1 micro-inch resolution. Hardware interface logic couples the computers digital and analog I/O channels to the diamond turning machine`s analog motor controllers, the laser interferometer, and other machine status and control information. It also provides front panel switches for operator override of the computer controller and implement the emergency stop sequence. The remaining two components, the control computer hardware and software, are discussed in detail below.

Garrard, K.P.; Taylor, L.W.; Knight, B.F.; Fornaro, R.J.

1988-12-01T23:59:59.000Z

384

Energy efficient sensor network implementations  

SciTech Connect (OSTI)

In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. We analyze the following modes of operation; event detection, sleep(wake-up), data acquisition, data processing modes using low power, high performance embedded technology such as specialized embedded DSP processors and a low power FPGAs at the sensing node. We use compute intensive sensor node applications: an acoustic vehicle classifier (frequency domain analysis) and a video license plate identification application (learning algorithm) as a case study. We report performance and total energy usage for our system implementations and discuss the system architecture design trade offs.

Frigo, Janette R [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Kulathumani, Vinod [WEST VIRGINIA UNIV.; Rosten, Ed [CAMBRIDGE UNIV.; Wolinski, Christophe [IRISA; Wagner, Charles [IRISA; Charot, Francois [IRISA

2009-01-01T23:59:59.000Z

385

Implementation impacts of PRL methodology  

SciTech Connect (OSTI)

This report responds to a DOE-SR request to evaluate the impacts from implementation of the proposed Plutonium Recovery Limit (PRL) methodology. The PRL Methodology is based on cost minimization for decisions to discard or recover plutonium contained in scrap, residues, and other plutonium bearing materials. Implementation of the PRL methodology may result in decisions to declare as waste certain plutonium bearing materials originally considered to be a recoverable plutonium product. Such decisions may have regulatory impacts, because any material declared to be waste would immediately be subject to provisions of the Resource Conservation and Recovery Act (RCRA). The decision to discard these materials will have impacts on waste storage, treatment, and disposal facilities. Current plans for the de-inventory of plutonium processing facilities have identified certain materials as candidates for discard based upon the economic considerations associated with extending the operating schedules for recovery of the contained plutonium versus potential waste disposal costs. This report evaluates the impacts of discarding those materials as proposed by the F Area De-Inventory Plan and compares the De-Inventory Plan assessments with conclusions from application of the PRL. The impact analysis was performed for those materials proposed as potential candidates for discard by the De-Inventory Plan. The De-Inventory Plan identified 433 items, containing approximately 1% of the current SRS Pu-239 inventory, as not appropriate for recovery as the site moves to complete the mission of F-Canyon and FB-Line. The materials were entered into storage awaiting recovery as product under the Department`s previous Economic Discard Limit (EDL) methodology which valued plutonium at its incremental cost of production in reactors. An application of Departmental PRLs to the subject 433 items revealed that approximately 40% of them would continue to be potentially recoverable as product plutonium.

Caudill, J.A.; Krupa, J.F.; Meadors, R.E.; Odum, J.V.; Rodrigues, G.C.

1993-02-01T23:59:59.000Z

386

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

387

Multicast Protocols for Scalable On-Demand Download Niklas Carlsson Derek L. Eager  

E-Print Network [OSTI]

not model packet loss recovery, although our analyses and protocols are compatible with erasure coded data bandwidth and maximum client delay for this batching with constant batch delay (bcd) protocol, as follows

Vernon, Mary K.

388

The role of social factors in a dyadic training protocol: implications for computer-based instruction  

E-Print Network [OSTI]

of the active interlocked modeling (AIM) protocol were examined using a complex perceptual-motor task. A total of 105 male participants were randomly assigned to either the AIM protocol or an individual-based control condition. Verbal communication...

Tubre, Travis Charles

1997-01-01T23:59:59.000Z

389

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

390

PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS  

SciTech Connect (OSTI)

The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

Mickalonis, J.

2014-09-16T23:59:59.000Z

391

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected  

E-Print Network [OSTI]

Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

392

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

Demirbas, Murat

393

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

394

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky  

E-Print Network [OSTI]

Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

Zelikovsky, Alexander

395

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1  

E-Print Network [OSTI]

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

Wu, Jie

396

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Wagner, David

397

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

Boult, Terrance E.

398

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier  

E-Print Network [OSTI]

Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

Schneier, Bruce

399

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

Shihada, Basem

400

Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe  

E-Print Network [OSTI]

. . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

Roscoe, Bill

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

402

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

403

4. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing to handle that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded. #12;Abortion of Protocol at the Sender Site 6 - The Sender can re-transmit the same data at most M

Southampton, University of

404

6. The Bounded Re-transmission Protocol Jean-Raymond Abrial  

E-Print Network [OSTI]

- The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault that problem: timers. - We would like to see how we can formalize such timers #12;The Bounded Retransmission that the Receiver does not confuse (?) a new data with a retransmitted one. #12;Abortion of Protocol at the Sender

Southampton, University of

405

A Sensing Error Aware MAC Protocol for Cognitive Radio Networks  

E-Print Network [OSTI]

Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

Hu, Donglin

2011-01-01T23:59:59.000Z

406

Single-step distillation protocol with generalized beam splitters  

SciTech Connect (OSTI)

We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

2003-07-01T23:59:59.000Z

407

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol  

E-Print Network [OSTI]

WLDF 311 Treefrog Study; Fall 2007 Pipe Checking Protocol: 1. Arrange time to meet/travel to study that each pipe is checked. If there is a frog(s), then: a. Take the trap off the stake without letting frogs). If the frogs don't come out, put some more water in the pipe, swirl and "swoosh" them out. b. Pick up each frog

Johnson, Matthew

408

Building America 2014 House Simulation Protocols | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review: Top Five EEREDepartmentFebruary 4,Brent Nelson About2014 House Simulation Protocols

409

Superior Energy Performance Certification Protocol | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: AlternativeEnvironment,Institutes and1 Special Report:StepRenewable EnergyofCertification Protocol

410

Schedule optimization study implementation plan  

SciTech Connect (OSTI)

This Implementation Plan is intended to provide a basis for improvements in the conduct of the Environmental Restoration (ER) Program at Hanford. The Plan is based on the findings of the Schedule Optimization Study (SOS) team which was convened for two weeks in September 1992 at the request of the U.S. Department of Energy (DOE) Richland Operations Office (RL). The need for the study arose out of a schedule dispute regarding the submission of the 1100-EM-1 Operable Unit (OU) Remedial Investigation/Feasibility Study (RI/FS) Work Plan. The SOS team was comprised of independent professionals from other federal agencies and the private sector experienced in environmental restoration within the federal system. The objective of the team was to examine reasons for the lengthy RI/FS process and recommend ways to expedite it. The SOS team issued their Final Report in December 1992. The report found the most serious impediments to cleanup relate to a series of management and policy issues which are within the control of the three parties managing and monitoring Hanford -- the DOE, U.S. Environmental Protection Agency (EPA), and the State of Washington Department of Ecology (Ecology). The SOS Report identified the following eight cross-cutting issues as the root of major impediments to the Hanford Site cleanup. Each of these eight issues is quoted from the SOS Report followed by a brief, general description of the proposed approach being developed.

Not Available

1993-11-01T23:59:59.000Z

411

The Waste Management Quality Assurance Implementing Management Plan (QAIMP)  

E-Print Network [OSTI]

DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

Albert editor, R.

2009-01-01T23:59:59.000Z

412

CRAD, Chemical Management Implementation - June 30, 2011 | Department...  

Broader source: Energy.gov (indexed) [DOE]

Chemical Management Implementation - June 30, 2011 CRAD, Chemical Management Implementation - June 30, 2011 June 30, 2011 Chemical Management Implementation Inspection Criteria,...

413

Protocols of radiocontaminant air monitoring for inhalation exposure estimates  

SciTech Connect (OSTI)

Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

Shinn, J.H.

1995-09-01T23:59:59.000Z

414

REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).  

SciTech Connect (OSTI)

Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

2010-01-01T23:59:59.000Z

415

Improved Audit Implementation Through Programmed Report Delivery  

E-Print Network [OSTI]

Studies of energy audit recommendations have identified four primary barriers to implementation, perceived process interference, finances, organizational changes, and knowledge limitations leading to a bias against innovative technologies...

Brown, M. L.; Gurta, M. E.; Meffert, W. A.

416

Implementation of Title V in California  

SciTech Connect (OSTI)

This presentation provides information on California`s Title V operating permit programs for stationary sources mandated by the 1990 Clean Air Act amendments. It covers background, applicability, regulatory history, requirements, and issues. In addition, specific information is provided on the progress of Title V implementation in California, including: the roles of implementing agencies, the status of district Title V programs, number and distribution of Title V sources, cost of Title V implementation, and highlights of Title V implementation in the State. The question and answer format is intended to facilitate easy access to specific information related to the Title V operating permit programs in California.

Werner, B.; Cook, B.

1996-12-31T23:59:59.000Z

417

Implementation of Department of Energy Oversight Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order implements the policy that establishes a Department-wide oversight process to protect the public, workers, environment, and national security assets effectively through continuous improvement.

2011-04-25T23:59:59.000Z

418

Criticality Safety Controls Implementation Inspection Criteria...  

Broader source: Energy.gov (indexed) [DOE]

Criticality Safety Controls Implementation Inspection Criteria, Approach, and Lines of Inquiry, October 23, 2009, (HSS CRAD 64-18, Rev 0 ) Criticality Safety Controls...

419

Council on Environmental Quality - Regulations for Implementing...  

Open Energy Info (EERE)

OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Council on Environmental Quality - Regulations for Implementing the Procedural Provisions of the NEPALegal...

420

Implementation of motion capture support in smartphones.  

E-Print Network [OSTI]

??This thesis investigates the feasibility of developing cross-platform smart phone applications that utilize the Qualisys motion capture system. An Application Programming Interface that implements an… (more)

Martinsson, Johannes

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Mid-Blend Ethanol Fuels ? Implementation Perspectives  

Broader source: Energy.gov (indexed) [DOE]

Blend Ethanol Fuels - Implementation Perspectives William Woebkenberg - US Fuels Technical and Regulatory Affairs Mercedes-Benz Research & Development North America July 25, 2013...

422

State Energy Program: Kentucky Implementation Model Resources  

Broader source: Energy.gov [DOE]

Below are resources associated with the U.S. Department of Energy's Weatherization and Intergovernmental Programs Office State Energy Program Kentucky Implementation Model.

423

"Technology Wedges" for Implementing Green Manufacturing  

E-Print Network [OSTI]

issues in green design and manufacturing." ManufacturingFOR IMPLEMENTING GREEN MANUFACTURING David Dornfeld BerkeleyCalifornia KEYWORDS Green Manufacturing, Technology,

Dornfeld, David; Wright, Paul

2007-01-01T23:59:59.000Z

424

Building America Expert Meeting: Retrofit Implementation - A...  

Energy Savers [EERE]

projects underway across the United States, and included representatives from utilities, energy program implementation firms, affordable housing agencies, and the financing...

425

Preparing for Project Implementation Assigning Accountability...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Assigning Accountability for Each Project, April 14, 2010 Preparing for Project Implementation Assigning Accountability for Each Project, April 14, 2010 Assigning Accountability...

426

Energy Sector Cybersecurity Framework Implementation Guidance  

Broader source: Energy.gov (indexed) [DOE]

JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector...

427

Solar Schools Assessment and Implementation Project: Financing...  

Broader source: Energy.gov (indexed) [DOE]

on K-12 Schools Solar Schools Assessment and Implementation Project: Financing Options on Solar Installations on K-12 Schools This report focuses on financial options developed...

428

Energy Efficiency Post-2011 Implementation Proposal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to provide BPA with recommendations on program implementation details, including: 1. Energy Efficiency Incentive (EEI) 2. Small, Rural, Residential Focus 3. Conservation...

429

Energy Sector Cybersecurity Framework Implementation Guidance...  

Broader source: Energy.gov (indexed) [DOE]

Cybersecurity Framework Implementation Guidance - Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014 Energy Sector Cybersecurity Framework...

430

Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems  

SciTech Connect (OSTI)

The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

2014-06-01T23:59:59.000Z

431

Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals  

E-Print Network [OSTI]

Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

2010-09-20T23:59:59.000Z

432

UCSD Implementing Procedures Effective Date: July 1, 1996 Page 1  

E-Print Network [OSTI]

UCSD Implementing Procedures (HR-S-1/Definitions of Terms B. UCSD Implementing Procedures 14/Affirmative Action C. UCSD Implementing Procedures 23/Performance Appraisal D. UC PPSM 30/Salary E. UCSD Implementing Procedures 30/Salary Equity Increase

Tsien, Roger Y.

433

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1  

E-Print Network [OSTI]

Langerhans Lab Protocols Fish tank water changing protocol.docx written 11/26/12 by JW Page 1 of 1 Fish Tank Water Changing Fry and tanks: 1. Remove air stone & lid, then take tank from shelf and place fry to make sure it matches # on tank label. 4. Use small (air stone size) plastic tubing to siphon

Langerhans, Brian

434

Development of a microfluidic platform for integrated DNA sequencing protocols  

E-Print Network [OSTI]

This thesis describes the design and development of a microfluidic platform to reduce costs and improve the quality of in the DNA sequencing methodology currently implemented at the Broad Institute in Cambridge, Massachusetts. ...

Kumar, Mayank, S.M. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

435

Wind power communication Design and implementation  

E-Print Network [OSTI]

Wind power communication ­ Design and implementation of test environment for IEC61850/UCA2 Elforsk rapport 02:16 Anders Johnsson, Jörgen Svensson April 2002 #12;#12;Wind power communication ­ Design 2002 #12;#12;Wind power communication ­ Design and implementation of test environment for IEC61850/UCA2

436

UCSD Implementing Procedures 36/Classification of Positions  

E-Print Network [OSTI]

UCSD Implementing Procedures (HR-S-1) 36/Classification of Positions I. REFERENCES AND RELATED POLICIES A. UCSD Implementing Procedures 20 ­ Recruitment B. UC PPSM 36 - Classification of Positions C shall be obtained prior to any commitment to the concerned individual. III. PROCEDURES A. New

Tsien, Roger Y.

437

A Spatial Computing Architecture Implementing Computation Circuits  

E-Print Network [OSTI]

A Spatial Computing Architecture for Implementing Computation Circuits David Grant Supervisor: Dr Architecture Tools Preliminary Results Conclusions #12;3 Introduction Computational Circuits Software MB of memory ­ Add a few million gates ??? #12;5 Architecture and Tools to implement computational

Lemieux, Guy

438

Implementation and Performance of Parallelised Turbo Decoders  

E-Print Network [OSTI]

1 Implementation and Performance of Parallelised Turbo Decoders Enes Erdin TUBITAK Defense In this paper, we discuss the implementation of a low latency decoding algorithm for turbo codes and repeat. Index Terms Turbo codes, repeat accumulate codes, parallellised turbo decoding, BCJR, FPGA, metric

Yýlmaz, �zgür

439

hal00270574, Testing Data Types Implementations from  

E-Print Network [OSTI]

is data type abstraction, testing a concrete implementation raises the issue of the gap betweenhal­00270574, version 1 ­ 6 Apr 2008 Testing Data Types Implementations from Algebraic Speci#12.legall@ibisc.univ-evry.fr Abstract. Algebraic speci#12;cations of data types provide a natural basis for testing data types

Paris-Sud XI, Université de

440

Extending and implementing RASP Stefania Costantini  

E-Print Network [OSTI]

Extending and implementing RASP Stefania Costantini Universit`a di L'Aquila Stefania Programming), called RASP, standing for ASP with Resources. RASP supports declarative reasoning on production. Finally, we report on raspberry, a prototypical implementation of RASP. This tool consists of a compiler

Formisano, Andrea

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Implementation Regulations MSc Chemical Engineering 2013-2014 THE IMPLEMENTATION REGULATIONS  

E-Print Network [OSTI]

.......................................................................................................4 Article 7 ­ The Nuclear Science & Engineering track. The programme comprises the following tracks: - Chemical Product Engineering, - Process Engineering, - NuclearImplementation Regulations MSc Chemical Engineering 2013-2014 THE IMPLEMENTATION REGULATIONS 2013

442

Efficient protocols for deterministic secure quantum communication using GHZ-like states  

E-Print Network [OSTI]

Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

Anindita Banerjee; Anirban Pathak

2012-01-18T23:59:59.000Z

443

Addendum to the Building America House Simulation Protocols  

SciTech Connect (OSTI)

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

444

Generic protocol for environmental audits at federal facilities  

SciTech Connect (OSTI)

The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

NONE

1989-08-01T23:59:59.000Z

445

The two phase commit protocol simulation and analysis  

E-Print Network [OSTI]

IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

Bokil, Anupam

1993-01-01T23:59:59.000Z

446

Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras  

E-Print Network [OSTI]

assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

Qin, Ni

2010-01-16T23:59:59.000Z

447

Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergyDepartment ofOil'sofAppendix B,Protocol for Addressing Induced Seismicity

448

Climate VISION: Private Sector Initiatives: Lime: GHG Inventory Protocols  

Office of Scientific and Technical Information (OSTI)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation In closing,-- Energy, science,Links - TechnicalGHGGHG Inventory Protocols

449

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

SciTech Connect (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

450

"The cream on the pudding..." : An analysis of the Clean Development Mechanism in the Indian wind power sector.  

E-Print Network [OSTI]

??The thesis examines the effects of the Clean Development Mechanism (CDM), a flexible mechanism under the Kyoto Protocol, on the Indian wind power sector. Indian… (more)

Turkanovic, Zlata

2010-01-01T23:59:59.000Z

451

Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France  

E-Print Network [OSTI]

Essentials, March 2007. OECD/Nuclear Energy Agency. "Nuclear Energy and the Kyoto Protocol"OECD/IEA Report OECD/Nuclear Energy Agency. "Nuclear Energy

Grigoriadis, Theocharis N

2009-01-01T23:59:59.000Z

452

E-Print Network 3.0 - asia carbon storage Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy ? Massimo Tavoni1... ., and Dev. Economics, Ohio State University While carbon sequestration was included in the Kyoto Protocol Source: Ris National Laboratory...

453

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

Ahvar, Ehsan; Piran, Mohammad Jalil

2011-01-01T23:59:59.000Z

454

Building America Indoor Temperature and Humidity Measurement Protocol  

SciTech Connect (OSTI)

When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

Engebrecht-Metzger, C.; Norton, P.

2014-02-01T23:59:59.000Z

455

Robustness of two-way quantum communication protocols against Trojan horse attack  

E-Print Network [OSTI]

We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

2005-08-23T23:59:59.000Z

456

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

2006-12-15T23:59:59.000Z

457

Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, dated 6-27-13, cancels DOE O 142.1A. Certified 12-3-14.

2006-12-15T23:59:59.000Z

458

Resources on Implementing Energy Savings Performance Contracts...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

an ESPC Detailed Energy Survey Planning and Reporting for O&M in Federal ESPCs FEMP O&M Best Practices Guide Life Cycle Costing Tools Helps Federal agencies implement energy- and...

459

Parabolic cylinder functions implemented in Matlab  

E-Print Network [OSTI]

Routines for computation of Weber's parabolic cylinder functions and their derivatives are implemented in Matlab for both moderate and great values of the argument. Standard, real solutions are considered. Tables of values are included.

E. Cojocaru

2009-01-15T23:59:59.000Z

460

Oracle accrual plans from requirements to implementation  

SciTech Connect (OSTI)

Implementing any new business software can be an intimidating prospect and this paper is intended to offer some insight in to how to approach this challenge with some fundamental rules for success. Los Alamos National Laboratory (LANL) had undergone an original ERP implementation of HRMS, Oracle Advanced Benefits, Worker Self Service, Manager Self Service, Project Accounting, Financials and PO, and recently completed a project to implement Oracle Payroll, Time and Labor and Accrual Plans. This paper will describe some of the important lessons that can be applied to any implementation as a whole, and then specifically how this knowledge was applied to the design and deployment of Oracle Accrual Plans for LANL. Finally, detail on the functionality available in Oracle Accrual Plans will be described, as well as the detailed setups.that were utilized at LANL.

Rivera, Christine K [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Graph Implementations for Nonsmooth Convex Programs  

E-Print Network [OSTI]

Summary. We describe graph implementations, a generic method for represent- ... object-oriented features of Matlab to turn it into an optimization modeling language: ..... For matrix and array expressions, these rules are applied on an elemen-.

2007-09-07T23:59:59.000Z

462

Design and implementation of the DDA network  

E-Print Network [OSTI]

Udo W. Pooch (Member) Pierre J. Catala (Member) Ric ard A. Volz (Head of Department) December 1996 Major Subject: Computer Science ABSTRACT Design and Implementation of the DDA Network. (December 1996) Wenhu Lu, B. S. , Fudan University; M...

Lu, Wenhu

1996-01-01T23:59:59.000Z

463

Phosphorylation based insulation devices design and implementation  

E-Print Network [OSTI]

This thesis presents the analysis of a phosphorylation based insulation device implemented in Saccharomyces cerevisae and the minimization of the retroactivity to the input and retroactivity to the output of a single cycle ...

Rivera Ortiz, Phillip M. (Phillip Michael)

2013-01-01T23:59:59.000Z

464

The Mechanized Verification of Garbage Collector Implementations  

E-Print Network [OSTI]

Abstract The Mechanized Verification of Garbage Collector Implementations Andrew Evan Mc complex, requiring a garbage collector. Garbage collectors are becoming increasingly sophis- ticated to adapt them to high-performance, concurrent and real-time applications, making internal collector

465

Kuali Financial System Implementation Collector Interface Meeting  

E-Print Network [OSTI]

Kuali Financial System Implementation Collector Interface Meeting December 17, 2008 Presenters of the Kuali Financial System (KFS) Collector Interface Format Differences from FRS Answer your questions #12 Collector File collector

Stephens, Graeme L.

466

IMPLEMENTATION OF ONCE-THROUGH COOLING  

E-Print Network [OSTI]

IMPLEMENTATION OF ONCE-THROUGH COOLING MITIGATION THROUGH ENERGY INFRASTRUCTURE PLANNING AND PROCUREMENT Michael R. Jaske Electricity Supply Analysis Division California Energy Commission Dennis C ...........................................................................................................................................1 Energy Agencies' Presumptions About Once-through Cooling Mitigation

467

Indoor robot gardening: design and implementation  

E-Print Network [OSTI]

This paper describes the architecture and implementation of a distributed autonomous gardening system with applications in urban/indoor precision agriculture. The garden is a mesh network of robots and plants. The gardening ...

Correll, Nikolaus

468

NEXT GENERATION NUCLEAR PLANT PROJECT IMPLEMENTATION STRATEGY  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NEXT GENERATION NUCLEAR PLANT PROJECT IMPLEMENTATION STRATEGY Presented by NGNP Industry Alliance November 30, 2009 I In nd du us st tr ry y A Al ll li ia an nc ce e Clean,...

469

Environmental Management System `We are implementing an  

E-Print Network [OSTI]

in our Environmental Policy Statement. Specifically we will: · Comply with relevant environmental. · Publishing an environmental policy which sets out our key targets (see opposite). · EstablishingEnvironmental Management System `We are implementing an Environmental Management System to address

470

A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes  

Broader source: Energy.gov [DOE]

Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003

471

E-Print Network 3.0 - aware routing protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Mobile Ad Hoc Networks Morteza Maleki, Karthik Dantu... the network lifetime. Simulation results show that the proposed power-aware source routing protocol has... . The...

472

E-Print Network 3.0 - acid protocols handbook Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to follow a protocol other than Standard Methods, i.e., to report negative acidities as zero... Net alkalinity and net acidity 2: Practical considerations ... Source: Kirby, Carl...

473

E-Print Network 3.0 - area adapted protocol Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Support for Flexible, Function-Based Communication Systems Douglas C. Schmidt Burkhard Stiller Ahmed Tantawy Summary: applications to adaptively update protocol mechanisms and...

474

On the group theoretic structure of a class of quantum dialogue protocols  

E-Print Network [OSTI]

Intrinsic symmetry of the existing protocols of quantum dialogue are explored. It is shown that if we have a set of mutually orthogonal $n$-qubit states {\

Chitra Shukla; Vivek Kothari; Anindita Banerjee; Anirban Pathak

2012-03-27T23:59:59.000Z

475

Development and quantitative analyses of a universal rRNA-subtraction protocol for microbial metatranscriptomics  

E-Print Network [OSTI]

Metatranscriptomes generated by pyrosequencing hold significant potential for describing functional processes in complex microbial communities. Meeting this potential requires protocols that maximize mRNA recovery by ...

Stewart, Frank J.

476

Breaking and making quantum money: toward a new quantum cryptographic protocol  

E-Print Network [OSTI]

Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as we show in this paper, the only previously published scheme [1] is insecure. We introduce a category of quantum money protocols which we call collision-free. For these protocols, even the bank cannot prepare multiple identical-looking pieces of quantum money. We present a blueprint for how such a protocol might work as well as a concrete example which we believe may be insecure.

Andrew Lutomirski; Scott Aaronson; Edward Farhi; David Gosset; Avinatan Hassidim; Jonathan Kelner; Peter Shor

2009-12-21T23:59:59.000Z

477

Hardware implementation of a Hamming network  

E-Print Network [OSTI]

technology yet, the analog version was restricted to fixed-analog values (voltages). Simulation results showed the feasibility of the proposed hardware implementation, and experi- mentally, all the basic circuits performed as expected. In conclusion... evolved as one of the most challenging, fascinating and promising fields of study. The long-term goal of neural network researchers is to implement a machine that can make its own decisions and learn from self-experience. A machine that could approach...

Robinson Gonzalez, Moise?s Emanuel

1991-01-01T23:59:59.000Z

478

SEPARATIONS AND WASTE FORMS CAMPAIGN IMPLEMENTATION PLAN  

SciTech Connect (OSTI)

This Separations and Waste Forms Campaign Implementation Plan provides summary level detail describing how the Campaign will achieve the objectives set-forth by the Fuel Cycle Reasearch and Development (FCRD) Program. This implementation plan will be maintained as a living document and will be updated as needed in response to changes or progress in separations and waste forms research and the FCRD Program priorities.

Vienna, John D.; Todd, Terry A.; Peterson, Mary E.

2012-11-26T23:59:59.000Z

479

26AUTUMN 2014 Kyoto University Newsletter  

E-Print Network [OSTI]

International Offices: The European Center in Heidelberg and the ASEAN Center in Bangkok World-renowned KU

Takada, Shoji

480

KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS  

E-Print Network [OSTI]

Integrated Human Studies/ Human and Environmental Studies 127 112 140 155 - - 70 46 Energy Science - - 128 1 Brazil 18 Paraguay 1 Uruguay 1 Argentine 5 Chile 4 Bolivia 1 Peru 5 Ecua

Takada, Shoji

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

The ContikiMAC Radio Duty Cycling Protocol Adam Dunkels  

E-Print Network [OSTI]

consumes as much power when passively lis- tening for transmissions from other devices as it does when-ups, and a transmission phase-lock optimization, to allow run-time optimization of the energy-efficiency of transmissions the ContikiMAC mechanism and its under- lying principles. Section 3 describes the implementation of Contiki

482

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

483

IBM NJE protocol emulator for VAX/VMS  

SciTech Connect (OSTI)

Communications software has been written at Argonne National Laboratory to enable a VAX/VMS system to participate as an end-node in a standard IBM network by emulating the Network Job Entry (NJE) protocol. NJE is actually a collection of programs that support job networking for the operating systems used on most large IBM-compatible computers (e.g., VM/370, MVS with JES2 or JES3, SVS, MVT with ASP or HASP). Files received by the VAX can be printed or saved in user-selected disk files. Files sent to the network can be routed to any node in the network for printing, punching, or job submission, as well as to a VM/370 user's virtual reader. Files sent from the VAX are queued and transmitted asynchronously to allow users to perform other work while files are awaiting transmission. No changes are required to the IBM software.

Engert, D.E.

1981-01-01T23:59:59.000Z

484

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect (OSTI)

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

485

Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software  

SciTech Connect (OSTI)

This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

2013-09-06T23:59:59.000Z

486

Implementation Implementation  

E-Print Network [OSTI]

. Increase of the power and number of processors of supercomputers Site Computer kProc Tflops DOE(US) SGI 14 126 Computational Res. Lab.(India) EKA Cluster Xeon 14 117 Government Agency (Sweden) Cluster with the LOBPCG method 1 Theoretical background The Norm-Conserving method (NC) The Projector Augmented-Wave

Knyazev, Andrew

487

Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol  

E-Print Network [OSTI]

1 Intelligent Network-Layer Management for Wireless Mesh Networks: Dynamic Tuning of a Reactive Routing Protocol Dan Marconett, Minsoo Lee, Xiaohui Ye and S. J. Ben Yoo Dept. of Electrical and Computer learning to dynamically modify reactive routing protocol parameters in real-time, to better facilitate

Kolner, Brian H.

488

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray  

E-Print Network [OSTI]

Reactive Protocols for Aircraft Electric Power Distribution Huan Xu, Ufuk Topcu, and Richard M. Murray Abstract-- The increasing complexity of electric power sys- tems leads to integration and verification challenges. We consider the problem of designing a control protocol for the aircraft electric

Murray, Richard M.

489

Energy-Ecient Initialization Protocols for Radio Networks with no Collision Detection  

E-Print Network [OSTI]

Energy-EĂ?cient Initialization Protocols for Radio Networks with no Collision Detection #3; K been initialized in advance. The main contribution of this work is to propose energy- e not be possible while on mission, we are interested in designing protocols that are highly energy

Nakano, Koji

490

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1  

E-Print Network [OSTI]

LLaannggeerrhhaannss LLaabb PPrroottooccoollss Chemical Waste Disposal Protocol.docx pg 1 of 1 Chemical Waste Disposal Protocol For Chemical Waste Pick-Up: 1. Log on to http://www.ncsu.edu/ehs. 2. Click waste item being submitted. 7. Fill out and affix a Hazardous Waste label, from the drawer labeled

Langerhans, Brian

491

The evaluation of an analytical protocol for the determination of substances in waste for hazard classification  

E-Print Network [OSTI]

1 The evaluation of an analytical protocol for the determination of substances in waste for hazard The classification of waste as hazardous could soon be assessed in Europe using largely the hazard properties of its knowledge of the component constituents of a given waste will therefore be necessary. An analytical protocol

Boyer, Edmond

492

An analytical protocol for the knowledge of waste by Pierre HENNEBERT1  

E-Print Network [OSTI]

An analytical protocol for the knowledge of waste by substances Pierre HENNEBERT1 , Arnaud PAPIN2 1 Technologique ALATA, BP n°2, 60550 Verneuil en Halatte, France. Abstract The hazardousness of waste could samples of different industrial wastes have been tested following (with differences) this protocol by two

Paris-Sud XI, Université de

493

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations  

E-Print Network [OSTI]

Improving TCP Throughput over Lossy Links Using Protocol-Level Speculations Haowei Bai Honeywell@ou.edu Abstract-- The degradation of Transport Control Protocol (TCP) throughput in networks with lossy links. This is very similar to processor performance degradation due to control hazards in CPU design. First, two

Minnesota, University of

494

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland ................................................................................................................2 7. Guidance for testing ANSI N42.42 data format requirements ................................2 8..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.48 PREPARED BY: DIV682 TITLE: Spectroscopic Personal

495

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity.  

E-Print Network [OSTI]

Protocol for GL spin columns p10, 200ug capacity. p200, 600ug capacity. Glscienceinc.com product tips (exact protocol from GL Sciences): 1. Bring samples up in 65 uL of Buffer A. 2. Condition a. Add

Richardson, David

496

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks  

E-Print Network [OSTI]

Hector is an Energy effiCient Tree-based Optimized Routing protocol for wireless networks Nathalie geographic locations. We propose HECTOR, a hybrid energy efficient tree-based optimized routing protocol, based on two sets of virtual coordinates. One set is based on rooted tree coordinates, and the other

Stojmenovic, Ivan

497

EHS-Net Tomato Handling Study EHS-Net Tomato Handling Study Protocol  

E-Print Network [OSTI]

EHS-Net Tomato Handling Study 1 EHS-Net Tomato Handling Study Protocol I. Project Overview Title EHS-Net Tomato Handling Study Protocol Summary Few studies have examined in detail the nature Health Specialists Network (EHS-Net) special study. EHS- Net is a collaboration involving the Centers

498

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao  

E-Print Network [OSTI]

provide significant energy savings when compared to the existing Query Tree protocol while sharingEnergy-Aware Tag Anti-Collision Protocols for RFID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and Computer Engineering University of Massachusetts at Amherst Email: {vnambood, lgao

Namboodiri, Vinod

499

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks  

E-Print Network [OSTI]

A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye and B. Sikdar a "Dynamic Query-tree Energy Balancing" (DQEB) protocol to dynamically adjust the tree structure and minimize networks. In [15] it has been shown that the minimum- energy broadcast tree problem is NP

Sikdar, Biplab

500

Optimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low  

E-Print Network [OSTI]

Abstract-- Motivated by the power-grid-side challenges in the integration of electric vehicles, we proposeOptimal Decentralized Protocol for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low a decentralized protocol for negotiating day-ahead charging schedules for electric vehicles. The overall goal

Low, Steven H.