Powered by Deep Web Technologies
Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

2

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

3

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

4

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

5

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

6

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

7

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

8

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network (OSTI)

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

9

A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?  

E-Print Network (OSTI)

EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

Bugnion, Véronique.; Reiner, David M.

10

Multi-gas assessment of the Kyoto protocol  

E-Print Network (OSTI)

The Kyoto Protocol is an international agreement aimed at limiting emissions of several greenhouse gases (GHGs; specifically: CO2, CH4, N2O, PFCs, HFCs, and SF6), and allows credit for approved sinks for CO2. It does not ...

Reilly, John M.; Prinn, Ronald G.; Harnisch, Jochen.; Fitzmaurice, Jean.; Jacoby, Henry D.; Kicklighter, David W.; Stone, Peter H.; Sokolov, Andrei P.; Wang, Chien.

11

Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol  

E-Print Network (OSTI)

Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry - especially data centers, are responsible for considerable amounts of CO2 emissions and will very soon be faced with legislative restrictions, such as the Kyoto protocol, defining caps at different organizational levels (country, industry branch etc.) A lot has been done around energy efficient data centers, yet there is very little work done in defining flexible models considering CO2. In this paper we present a first attempt of modeling data centers in compliance with the Kyoto protocol. We discuss a novel approach for trading credits for emission reductions across data centers to comply with their constraints. CO2 caps can be integrated with Service Level Agreements and juxtaposed to other computing commodities (e.g. computational power, storage), setting a foundation for implementing next-generation schedulers and pricing models that support Kyoto-compliant CO2 trading ...

Lucanin, Drazen; Mastelic, Toni; Brandic, Ivona

2012-01-01T23:59:59.000Z

12

The effects on developing countries of the Kyoto Protocol and CO? emissions trading  

E-Print Network (OSTI)

This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelène.

13

Impacts of the Kyoto protocol on U.S. energy markets and economic activity  

SciTech Connect

The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

NONE

1998-10-01T23:59:59.000Z

14

IPv6 Advanced Protocols Implementation  

Science Conference Proceedings (OSTI)

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not ...

Qing Li; Jinmei Tatuya; Keiichi Shima

2007-04-01T23:59:59.000Z

15

Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol  

Gasoline and Diesel Fuel Update (EIA)

2 2 Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol July 1999 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should be attributed to the Energy Information Administration and should not be construed as advocating or reflecting any policy position of the Department of Energy or of any other organization. Service Reports are prepared by the Energy Information Administration upon special request and are based on assumptions specified by the requester. Preface The analysis in this report was undertaken at the request of the Committee on Science of the U.S.

16

Implementing the UN Kyoto Protocol: Clean Development Mechanism...  

NLE Websites -- All DOE Office Websites (Extended Search)

(Sustainable Energy Advisors) report on Chinese CDM activities, based on their related energy efficiency consulting activities undertaken for clients including the World Bank,...

17

Kyoto's Unfinished Business  

E-Print Network (OSTI)

The authors offer a provisional assessment of where the Kyoto negotiations have left the climate change issue. They present a few widely divergent assesments of what the Kyoto Protocol on Climate Change will accomplish, ...

Jacoby, Henry D.; Prinn, Ronald G.; Schmalensee, Richard.

18

An object-oriented implementation of the Xpress Transfer Protocol  

SciTech Connect

Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

Strayer, W.T.; Gray, S.; Cline, R.E. Jr.

1994-10-01T23:59:59.000Z

19

kyoto1.htm  

Gasoline and Diesel Fuel Update (EIA)

THE COMMITTEE ON SCIENCE THE COMMITTEE ON SCIENCE U.S. HOUSE OF REPRESENTATIVES OCTOBER 9, 1998 At the request of the House of Representatives' Committee on Science, the Energy Information Administration has completed a detailed study of the potential, carbon-related impacts of the Kyoto Protocol on the price of energy in the United States and on the overall economy. The uncertainties involved in such an analysis are many, not the least of which is ambiguity about how much carbon emissions from energy use would actually have to be reduced in the United States versus how much of the Kyoto Protocol requirement could be met by other factors, such as reduced emissions from other greenhouse gases and international emissions trading. For this reason, further studies will clearly be needed.

20

TDM MAC protocol design and implementation for wireless mesh networks  

Science Conference Proceedings (OSTI)

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

Dimitrios Koutsonikolas; Theodoros Salonidis; Henrik Lundgren; Pascal LeGuyadec; Y. Charlie Hu; Irfan Sheriff

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Implementation of a cluster based routing protocol for mobile networks  

Science Conference Proceedings (OSTI)

We show the implementation and the simulation results of a hierarchical, cluster based routing protocol for mobile ad hoc networks using Parallel Virtual Machine (PVM). The network represented by a graph is partitioned into clusters by a graph ...

Geoffrey Marshall; Kayhan Erciyes

2005-05-01T23:59:59.000Z

22

How to Implement a Protocol for Babel RMI  

Science Conference Proceedings (OSTI)

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

23

Japanese nuclear power and the Kyoto agreement  

E-Print Network (OSTI)

We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

24

An experiment using Mec: Eurotri, Physical Layer Protocol Implemented Version  

E-Print Network (OSTI)

This work describes a part of a cooperation between LaBRI and Schlumberger Industries for developping eletricity meters. This part deals with the design and the conception of communication protocols to provide a distributed kernel with safe rendezvous primitives. The implemented version of the protocol is detailed and its safety proven using Mec. Contents 1 Industrial Environment 2 2 Hardware and Inter-Processor Communication 2 2.1 Physical Aspects : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2 Potential Problems and Solutions : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.1 Loss of data due to polling rate : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.2 Loss or spontaneous creation of data on the line : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2.2.3 Transmission errors : : : : : : : : : : : : : : : : : : : : :...

Didier Egay Paul; Alain Griffault; Jean-pierre Radoux

1994-01-01T23:59:59.000Z

25

Protocols for implementing DOE authorized release of radioactive scrap metals  

SciTech Connect

A process to implement the US Department of Energy`s (DOE) policy for authorized release of radioactive materials from DOE facilities is provided in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material, published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. A computerized management tool--P2Pro(RSM)--has been developed to aid in carrying out the release process for radioactive metals. It contains protocols for the authorized release process and relevant information to facilitate the evaluation of scrap metals for reuse and recycle. The P2Pro(RSM) protocols provide DOE and its contractors with an effective, user-friendly tool for managing authorized release activities P2Pro(RSM) is designed to be used in the Windows{sup {trademark}} environment. The protocols incorporate a relational database coupled with a graphic-user interface to guide the user through the appropriate steps so authorized release limits can be developed. With the information provided in the database, an as-low-as-reasonably-achievable (ALARA) optimization process can be easily set up and run for up to 10 alternatives for disposition of radioactive scrap metals. The results of the ALARA optimization process can be printed in a series of reports and submitted as part of the application for the authorized release of the radioactive scrap metals.

Chen, S.Y.; Arnish, J.; Kamboj, S.; Nieves, L.A. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1999-11-01T23:59:59.000Z

26

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cédric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

27

Oak Ridge National Laboratory's Preparations for Additional Protocol Implementation  

SciTech Connect

The United States Additional Protocol (AP) with the International Atomic Energy Agency (IAEA) entered into force (EIF) January 6, 2009. In anticipation of the EIF, the Department of Energy (DOE) National Nuclear Security Administration Office of International Regimes and Agreements (NA-243) began the initial DOE AP data call on November 3, 2008. This paper describes the Oak Ridge National Laboratory's (ORNL's) preparation, organization, and development efforts to successfully implement the AP and complete the AP data call. ORNL had 35 days to identify declarable activities and finalize the declaration line items (DLIs) for submission to NA-243. To be able to respond within the required time frame, many preparation activities at ORNL were necessary, such as determining the AP coordinator (APC) and team roles; conducting site awareness training; creating the ORNL Standards-Based Management System (SBMS) procedure Reporting of Nuclear Fuel Cycle Activities; training personnel; and defining site implementation software tools. Identifying, updating, compiling, reviewing, and submitting the DLIs to NA-243 were all critical activities for successfully implementing the AP and completing the AP data call at ORNL.

McCowan, Janie [ORNL; Cain, Ronald A [ORNL

2009-01-01T23:59:59.000Z

28

The evolution of a climate regime: Kyoto to Marrakech  

E-Print Network (OSTI)

At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

29

Simulation of a VPN implementation based on MPLS protocol, a case study: VPN-MPLS for MSN-AT  

Science Conference Proceedings (OSTI)

In this paper, we present the implementation of a Virtual Private Network (VPN) using a Multi-Protocol Label Switching (MPLS) protocol. Because this protocol is very promising, economically and technologically, we have adopted it as the basic protocol ... Keywords: MPLS, VPN, network, protocol, security

N. Djenane; A. Benaouda; S Harous

2009-12-01T23:59:59.000Z

30

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle  

E-Print Network (OSTI)

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi to a clean slate networking approach in the Haggle platform. The remainder of this paper is organised, 6, 2, 3]. In addition to routing protocol there is also a need for the provision of frameworks

Mascolo, Cecilia

31

Extending WS-Security to Implement Security Protocols for Web Services  

E-Print Network (OSTI)

Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inherited from the advantages of using Web service technologies, such as extensibility and end-to-end security across multiple environments that do not support a connection-based communication.

Bela, Genge

2009-01-01T23:59:59.000Z

32

A differential game of joint implementation of environmental projects  

Science Conference Proceedings (OSTI)

This paper proposes a two-player, finite-horizon differential game model to analyze joint implementation in environmental projects, one of the flexible mechanisms considered in the Kyoto Protocol. Our results show that allowing for foreign investments ... Keywords: Differential games, Environment, Joint implementation

MichèLe Breton; Georges Zaccour; Mehdi Zahaf

2005-10-01T23:59:59.000Z

33

Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA  

E-Print Network (OSTI)

The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. In these applications, numerous embedded devices running on batteries are distributed in an area communicating via wireless radios. This work presents a method which can be used for comparing current consumption of wireless data transfer embedded systems. This paper implements a small subset of the IEEE 802.15.4 protocol to achieve a point to point communication. The implemented protocol uses 802.15.4 MAC compliant data and acknowledgment packets. Current consumption is measured while doing one data packet transmission. Measurements are compared with existing work. IEEE 802.15.4 protocol implementation is done using Verilog language. Code impl...

Bhat, Naagesh S

2012-01-01T23:59:59.000Z

34

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

35

Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage  

Science Conference Proceedings (OSTI)

This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. ... Keywords: NAS, NFS, RPC, RAID

K. J. Latesh Kumar

2013-09-01T23:59:59.000Z

36

Architectural Support for an Efficient Implementation of a Software-Only Directory Cache Coherence Protocol  

E-Print Network (OSTI)

Software-only directory cache coherence protocols emulate directory management by handlers executed on the compute processor in shared-memory multiprocessors. While their potential lies in lower implementation cost and complexity than traditional hardware-only directory protocols, the miss penalty for cache misses induced by application data accesses as well as directory accesses is a critical issue to address. In this paper, we study important support mechanisms for software-only directory protocols in the context of a processor node organization for a cache-coherent NUMA architecture. We find that it is possible to remove or hide software handler latency for local as well as remote read misses by adopting simple hardware support mechanisms. To further reduce the overhead of software handler execution, we study the effects of directory data caching. While this could pollute the caches, our results suggest that this effect is marginal and that software handler execution over...

Håkan Grahn; Per Stenström

1995-01-01T23:59:59.000Z

37

Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for QAP/QIP Review Protocol for QAP/QIP Review March 2010 1 Table of Content 1.1 Overview ............................................................................................................................................... 2 1.2 Purpose .................................................................................................................................................. 2 1.3 EM-HQ Corporate Review Process ...................................................................................................... 3 1.3.1 Phase 1: EM-HQ Approval for Implementation of QAP/QIP ..................................... 3 1.3.2 Phase 2: EM-HQ Verification and Validation (V&V) of QAP/QIP Implementation . 4 1.4 Contact Information .............................................................................................................................. 5

38

Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation  

SciTech Connect

The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP staff and investigate specific ways to improve implementation. Another meeting in July 2011 focused on preparations for outreach to industry and universities. In this paper PNRI describes current implementation of the AP in the Philippines, and both DOE/INSEP and PNRI provide their perspectives on their cooperation to enhance that implementation.

Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

2011-07-19T23:59:59.000Z

39

DOE Preparation for U.S. Implementation of the Additional Protocol  

Science Conference Proceedings (OSTI)

The United States signed the International Atomic Energy Agency (IAEA) Additional Protocol (AP) to the Safeguards Agreement in 1998. President Bush submitted the AP to the U.S. Senate for advice and consent to ratification, and the Senate gave that consent unanimously in March 2004. The only remaining major step before implementation is for the President to declare entry into force. For several years, the Department of Energy has been planning for the potential ratification of the AP and its implementation in the DOE Complex. Preparations are taking place in four task areas: directives development, computer reporting system, field trials, and information sessions. Directives development consists of revising DOE Order 142.2 and developing a new associated Manual to incorporate AP provisions. The revised Order describes the AP-related responsibilities of relevant DOE offices, and the Manual provides additional detail on those responsibilities. The AP Reporting System will be a tool to receive and manage declarations that DOE makes to the IAEA. The Reporting System will be computer-based and will be used by DOE headquarters staff, field offices, and contractors. Field trials are intended to test existing AP preparations in the DOE Complex and to discover further actions that are necessary for DOE to be fully prepared for actual AP implementation. An initial field trial was held in November 2003. Information sessions are being designed to explain AP provisions and responsibilities to DOE headquarters and field office staff and to DOE contractors. This paper describes the four tasks and their current status.

Killinger, Mark H.; Hendrickson, Paul L.; Curtis, Michael M.; Mcrae, Larry P.; Kovacic, Donald; Wrenn, George E.; Bedke, Michael L.

2004-07-01T23:59:59.000Z

40

Modeling and Analyzing the Implementation of Latency-Insensitive Protocols Using the Polychrony Framework  

Science Conference Proceedings (OSTI)

As Globally Asynchronous and Locally Synchronous (GALS) based System-on-chip (SoC) are gaining importance, a special case of GALS when the global clocking is preserved, but the interconnect delays of multiple clock cycles are to be tolerated has also ... Keywords: SIGNAL language, clock hierarchy, endochrony, isochrony, latency-insensitive protocols, synchronous data flow graph

Bin Xue; Sandeep K. Shukla

2009-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

42

Developing the Autism Model of Implementation for Autism spectrum disorder community providers: study protocol  

E-Print Network (OSTI)

organizational and community intervention strategy for implementing evidence-based children’s mental healthorganizational and community context: A framework for building evidence on dissemination and implementation in healthOrganizational climate mediates the effect of culture on work attitudes and turnover in mental health

Drahota, Amy; Aarons, Gregory A; Stahmer, Aubyn C

2012-01-01T23:59:59.000Z

43

Control of CO2 Emissions of China under Kyoto Protocol  

Science Conference Proceedings (OSTI)

the paper explores the major factors that affect CO2 emissions by the analysis for time-series of China since Chinese innovation and opening. The analysis concludes that there is no inverse-U curve between economic development and CO2 emissions. The ...

Zhao Yong

2009-10-01T23:59:59.000Z

44

Strengthening evaluation and implementation by specifying components of behaviour change interventions: a study protocol  

E-Print Network (OSTI)

cumulative basic science, there are some fundamental requirements. It’s essential to develop and use common shared tools and a common language, so that replication, and building on solid work, becomes accepted practice and is valued (http... by providing (a) a web-based handbook and resources for skills training (e.g., video recordings of Michie et al. Implementation Science 2011, 6:10 http://www.implementationscience.com/content/6/1/10 Page 6 of 8 simulated interventions) and (b) training...

Michie, Susan; Abraham, Charles; Eccles, Martin P; Francis, Jill J; Hardeman, Wendy; Johnston, Marie

2011-02-07T23:59:59.000Z

45

John Cahn to Receive 2011 Kyoto Prize For Fundamental ...  

Science Conference Proceedings (OSTI)

John Cahn to Receive 2011 Kyoto Prize For Fundamental Contributions to Materials Science. For Immediate Release: June 24, 2011. ...

2011-06-27T23:59:59.000Z

46

John Cahn to Receive 2011 Kyoto Prize for Fundamental ...  

Science Conference Proceedings (OSTI)

John Cahn to Receive 2011 Kyoto Prize for Fundamental Contributions to Materials Science. From NIST Tech Beat: July 6, 2011. ...

2011-07-06T23:59:59.000Z

47

Use of V{sub eff} and iso-NTCP in the implementation of dose escalation protocols  

SciTech Connect

This report investigates the use of a normal tissue complication probability (NTCP) model, 3-D dose distributions, and a dose volume histogram reduction scheme in the design and implementation of dose escalation protocols for irradiation of sites that are primarily limited by the dose to a normal tissue which exhibits a strong volume effect (e.g., lung, liver). Plots containing iso-NTCP contours are generated as a function of dose and partial volume using a parameterization of a NTCP description. Single step dose volume histograms are generated from 3-D dose distributions using the effect-volume (V{sub eff}) reduction scheme. In this scheme, the value of V{sub eff} for each dose volume histogram is independent of dose units (Gy, %). Thus, relative dose distributions (%) may be used to segregate patients by V{sub eff} into bins containing different ranges of V{sub eff} values before the assignment of prescription doses (Gy). The doses for each bin of V{sub eff} values can then be independently escalated between estimated complication levels (iso-NTCP contours). Given that for the site under study, an investigator believes that the NTCP parameterization and the V{sub eff} methodology at least describe the general trend of clinical expectations, the concepts discussed allow the use of patient specific 3-D dose/volume information in the design and implementation of dose escalation studies. The result is a scheme with which useful prospective tolerance data may be systematically obtained for testing the different NTCP parameterizations and models. 41 refs., 4 figs., 2 tabs.

Haken, R.K.T.; Martel, M.K.; Kessler, M.L.; Hazuka, M.B.; Lawrence, T.S.; Robertson, J.M.; Turrisi, A.T.; Lichter, A.S. [Univ. of Michigan, Ann Arbor, MI (United States)

1993-10-20T23:59:59.000Z

48

Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans  

Energy.gov (U.S. Department of Energy (DOE))

Review protocol and lines of inquiry that are used as basis for technical review and approval of site-specific quality assurance programs.

49

Chapter 12, Survey Design and Implementation Cross-Cutting Protocols for Estimating Gross Savings: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 12: Survey Design and Chapter 12: Survey Design and Implementation Cross-Cutting Protocols for Estimating Gross Savings Robert Baumgartner, Tetra Tech Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 12 - 1 Chapter 12 - Table of Contents 1 Introduction ............................................................................................................................ 2 2 The Total Survey Error Framework ....................................................................................... 4 2.1 TSE Framework for Evaluating Survey and Data Quality .............................................. 4 2.2 Sampling Errors ............................................................................................................... 5

50

GraduateScho ol of Energy Science, Kyoto University  

E-Print Network (OSTI)

GraduateScho ol of Energy Science, Kyoto University GraduateScho ol of Energy Science, Kyoto University The Department of Socio-Environmental Energy Science aims to establish ideal energy systems. For this purpose, various energy problems are systematically analyzed from sociological, political, economical

Takada, Shoji

51

Kyoto-Related Fossil-Fuel CO2 Emission Totals  

NLE Websites -- All DOE Office Websites (Extended Search)

Kyoto-Related Emissions Kyoto-Related Emissions Kyoto-Related Fossil-Fuel CO2 Emission Totals DOI: 10.3334/CDIAC/ffe.007_V2012 world map Kyoto-Related Fossil-Fuel CO2 Emission Totals Year Annex B Countries Non Annex B Countries Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) Fossil-Fuel CO2 Emissions (million metric tonnes C) Bunkers (million metric tonnes C) 1990 3894 90 2111 46 1991 3801 94 2299 38 1992 3750 109 2263 44 1993 3685 107 2339 48 1994 3656 107 2469 54 1995 3681 110 2570 59 1996 3704 111 2657 72 1997 3727 114 2737 74 1998 3746 118 2698 82 1999 3678 124 2718 90 2000 3725 130 2821 90 2001 3781 120 2936 92 2002 3764 128 3013 94 2003 3853 123 3347 98 2004 3888 135 3683 107 2005 3933 142 3926 106

52

http://www.kyoto-u.ac.jp/ja 22 22  

E-Print Network (OSTI)

://www.kyoto-u.ac.jp/en Integrated Human Studies Integrated Human Studies Letters Letters Education Educational Sciences Law Economics Economics and Management Science Science Medicine Medical Science (6) Human Health Sciences Pharmaceutical Sciences Pharmaceutical Sciences Pharmacy (6) Engineering Global Engineering, Architecture

Takada, Shoji

53

http://www.kyoto-u.ac.jp/ja 22 22  

E-Print Network (OSTI)

://www.kyoto-u.ac.jp/en Integrated Human Studies Integrated Human Studies Letters Letters Education Educational Sciences Law Economics Economics and Management Science Science Medicine Medical Science (6) Human Health Sciences Pharmaceutical Sciences Sciences for Drug Discovery Pharmacy (6) Engineering Global Engineering, Architecture

Takada, Shoji

54

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

55

In Proceedings of the 2nd Symposium on Operating Systems Design and Implementation, October 1996 Performance Evaluation of Two HomeBased Lazy Release Consistency Protocols for  

E-Print Network (OSTI)

Performance Evaluation of Two Home­Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems, called Overlapped Home­based LRC (OHLRC), takes advantage of the communication processor found on each

56

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

the deployment of renewable power generation in the U.S.240nations to shift power generation bases to sustainable low-of fos- sil fuel fired power generation facilities, is

Ferrey, Steven

2010-01-01T23:59:59.000Z

57

Measuring Emissions Against an Alternative Future: Fundamental Flaws in the Structure of the Kyoto Protocol's  

E-Print Network (OSTI)

with over 80 CDM and renewable energy professionals involved in CDM project development, including project in renewable energy and hydropower development in India. It also draws on analysis of the UNEP Risoe CDM registered hydro projects in China. This paper presents the following findings: The majority of CDM projects

Kammen, Daniel M.

58

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

Seeking Phaseout of Coal-Fired Plants, 39 ENV'Tr Rvr'. (BNA)built more new coal-fired power plants than Britain-the seat

Ferrey, Steven

2010-01-01T23:59:59.000Z

59

Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat  

E-Print Network (OSTI)

are from combustion of fossil fuels. 114 A fossil fuelparticularly from fossil-fuel sources, is very likely to beJacobson, Control of Fossil-Fuel Particulate Black Carbon

Ferrey, Steven

2010-01-01T23:59:59.000Z

60

Impacts of the Kyoto Protocol on U.S. Energy Markets and Economic...  

Gasoline and Diesel Fuel Update (EIA)

Economic Activity October 1998 Energy Information Administration Office of Integrated Analysis and Forecasting U.S. Department of Energy Washington, DC 20585 This report was...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Implementing the protocol on environmental protection to the Antarctic Treaty: Future applications of geographic information systems within the Committee for Environmental Protection  

Science Conference Proceedings (OSTI)

With the entry into force of the Protocol on Environmental Protection to the Antarctic Treaty (the Protocol) in January 1998, key operational aspects of the newly established Committee for Environmental Protection (CEP), such as its advisory capacity to Antarctic Treaty Consultative Meetings (ATCMs) need to be urgently addressed. This paper advocates the use of a geographic information system (GIS) environmental database to reinforce the advisory capacity of the CEO. The demonstrated links between the provisions of the Protocol and GIS capabilities illustrate the potential this has to assist the CEP in delivering informed advice to ATCMs. The range of GIS applications that could be utilized by the CEP in fulfilling its functions are examined by reference to precedents in Europe (CORINE) and Australia (ARIS).

Cordonnery, L. [Univ. of the South Pacific, Port Vila (Vanuatu). Law School

1999-08-01T23:59:59.000Z

62

Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information  

Open Energy Info (EERE)

Kyoto: Think Global, Act Local (K:TGAL) Kyoto: Think Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) Agency/Company /Organization Netherlands Development Cooperation Sector Land, Climate Topics GHG inventory Website http://www.communitycarbonfore Program Start 2003 Program End 2009 References K:TGAL[1] Kyoto: Think Global, Act Local (K:TGAL) Screenshot "Kyoto: Think Global, Act Local (K:TGAL) is a research and capacity building program, financed by the Netherlands Development Cooperation, it is investigating the possibilities and potential for Community Based Forest Management of existing natural forest to be included as an eligible carbon mitigation activity under international climate change agreements in the future, particularly under REDD policy. The program involves research teams

63

DOE M 142.2-1 Admin Chg 1, Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency  

Directives, Delegations, and Requirements

This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America ...

2008-09-04T23:59:59.000Z

64

PROTOCOLS MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

as your end-user's. For instance, if you always issue the same set of commands when you enter SPIRES, you can assemble the commands in a protocol and add it, with your account as...

65

Deriving Efficient Cache Coherence Protocols Through Refinement  

Science Conference Proceedings (OSTI)

We address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users ... Keywords: DSM protocols, communication protocols, refinement

Ratan Nalumasu; Ganesh Gopalakrishnan

2002-01-01T23:59:59.000Z

66

An Aerosol Climatology at Kyoto: Observed Local Radiative Forcing and Columnar Optical Properties  

Science Conference Proceedings (OSTI)

In order to evaluate the radiative effect of the atmospheric aerosol at Kyoto, Japan, surface solar irradiance and columnar aerosol optical properties were observed in the period between September 1998 and December 2001. The aerosol optical ...

Takahiro Yabe; Robert Höller; Susumu Tohno; Mikio Kasahara

2003-06-01T23:59:59.000Z

67

A class-chest for deriving transport protocols  

SciTech Connect

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

Strayer, W.T.

1996-10-01T23:59:59.000Z

68

Published in the Proceedings of the 2nd Symposium of Operating Systems Design and Implementation (OSDI'96) Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for  

E-Print Network (OSTI)

(OSDI'96) Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual protocols. The #12;rst, Home-based LRC (HLRC), is based on the Automatic Update Release Con- sistency (AURC protocol, called Overlapped Home-based LRC (OHLRC), takes advantage of the communication processor found

Zhou, Yuanyuan

69

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

70

Annual Report of the Institute for Frontier Medical Sciences Kyoto University  

E-Print Network (OSTI)

Annual Report of the Institute for Frontier Medical Sciences Kyoto University #12;#12;Institute for Frontier Medical Sciences 1 2 3 4 5 6 #12;#12;Institute for Frontier Medical Sciences 1 #12;Annual Report 2011 2 #12;Institute for Frontier Medical Sciences #12;Annual Report 2011 3 #12;Institute for Frontier

Takada, Shoji

71

Hardware implementation of wireless bit rate adaptation  

E-Print Network (OSTI)

This thesis presents a hardware implementation of the SoftRate bit-rate adaptation protocol. SoftRate is a new bit-rate adaptation protocol, which uses per-bit confidence hints generated by the convolutional decoder to ...

Gross, Samuel A

2010-01-01T23:59:59.000Z

72

Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements  

E-Print Network (OSTI)

in existing plants (co-firing) is already competitive with other fuels at a CO2 price of about 20 Euros

73

NFS version 4 Protocol  

Science Conference Proceedings (OSTI)

NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and 3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2000-12-01T23:59:59.000Z

74

Delta Coherence Protocols: The Home Update Protocol  

SciTech Connect

We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

Williams, C.; Reynolds, P.F.; de Supinoki, B.

2000-07-21T23:59:59.000Z

75

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

76

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

77

Transition from Legacy Protocols to IEC 61850  

Science Conference Proceedings (OSTI)

Implementation of International Electrotechnical Commission (IEC) standard 61850, “Substation Automation,” within a utility is not necessarily easy or straightforward, especially when it is carried out within existing substations. During the transition, it is usually necessary to operate with both older devices supporting only legacy protocols and new, intelligent electronic devices, which now come with the IEC 61850 protocol. Both must coexist for a certain period in a substation ...

2012-12-31T23:59:59.000Z

78

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network (OSTI)

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil. This fact alone tells us that oil is a finite resource, which in turn means that it is subject to depletion1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict

Keeling, Stephen L.

79

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Center for Reliable Electric Power Transmission Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 1 1 National Center for Reliable Electric Power Transmission A Center for Advanced Power Electronics Dr. H. Alan Mantooth, Director Dr. Simon Ang, Associate Director Dr. Juan Carlos Balda, Associate Director Dr. Roy McCann, Associate Director University of Arkansas - Fayetteville http://ncrept.eleg.uark.edu Silicon Carbide Research for Reliable Electric Power: Design and Test National Center for Reliable Electric Power Transmission Alan Mantooth, University of Arkansas 2 Research advanced power electronic solutions for grid- connected applications Fault currents continue to rise in urban centers and the use of FCLs provides an attractive way to extend the useful life of

80

Kyoto Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: V gs,S5 ; Channel 2: V gs,S6 ; Channel 3: V XFMR,S ; Channel 4: I SourceInductor Energy Storage Current RES Current Both currents are positive, showing that both sources...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Econophysics on Real Economy -The First Decade of the Kyoto Econophysics Group-  

E-Print Network (OSTI)

Research activities of Kyoto Econophysics Group is reviewed. Strong emphasis has been placed on real economy. While the initial stage of research was a first high-definition data analysis on personal income, it soon progressed to firm dynamics, growth rate distribution and establishment of Pareto's law and Gibrat's law. It then led to analysis and simulation of firm dynamics on economic network. Currently it covers a wide rage of dynamics of firms and financial institutions on complex network, using Japanese large-scale network data, some of which are not available in other countries. Activities of this group for publicising and promoting understanding of econophysics is also reviewed.

Aoyama, Hideaki; Ikeda, Yuichi; Iyetomi, Hiroshi; Souma, Wataru

2010-01-01T23:59:59.000Z

82

A generalized binding framework for the Low Level Reader Protocol (LLRP)  

E-Print Network (OSTI)

This Master of Engineering Thesis describes the design, implementation and testing of an XML binding framework for the RFID Low Level Reader Protocol (LLRP). LLRP is a recently released protocol which standardizes the ...

Poulopoulos, Dimitrios

2008-01-01T23:59:59.000Z

83

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

84

Test Purpose Generation for Timed Protocol Testing  

Science Conference Proceedings (OSTI)

Test purposes are requirements, usually constructed by hand, which aim at testing critical properties on implementations. These ones are then used by testing methods to generate test cases. Writing them manually is a heavy task, this is why we propose ... Keywords: Timed protocols, conformance testing, test purpose, testability

Sébastien Salva; Antoine Rollet

2009-07-01T23:59:59.000Z

85

Commercial Buildings Communications protocols  

Science Conference Proceedings (OSTI)

There are many automation and control protocols in use in commercial building and residential sectors today. For both commercial building and residential sectors there are several thousand manufacturers throughout the world that supply end-use electrical appliances and other building fixtures that communicate using these automation and control protocols. Some of these protocols are based on open standards (for example, BACnet, DALI) while others are semi-proprietary (for example, Zigbee, LonWorks, Modbus...

2008-05-15T23:59:59.000Z

86

House Simulation Protocols Report  

Energy.gov (U.S. Department of Energy (DOE))

Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and...

87

A Simple Protocol to Communicate Channels over Channels  

Science Conference Proceedings (OSTI)

In this paper we present the communication protocol that we use to implement first class channels. Ordinary channels allow data communication (like CSP/Occam); first class channels allow communicating channel ends over a channel. This enables processes ...

Henk L. Muller; David May

1998-09-01T23:59:59.000Z

88

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

89

A Protocol for Multimedia CDMA Personal Communication Networks  

Science Conference Proceedings (OSTI)

In this paper, a joint CDMA/TDMA protocol has been proposed for integrated video-phone/voice/data traffic in personal communication networks (PCN). The videophone service is implemented according to H.261 standard. The concept of dynamic boundary ... Keywords: CDMA, MAC, multimedia, personal communication networks, protocol

P. Xie; E. Gunawan; B. H. Soong; C. B. Soh

2000-09-01T23:59:59.000Z

90

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

91

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

92

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

93

The SUPDUP Protocol  

E-Print Network (OSTI)

The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

Stallman, Richard M.

1983-07-01T23:59:59.000Z

94

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory  

E-Print Network (OSTI)

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory Byung and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared on homeless and home-based LRC protocols. We compared the performance between Tread- Marks, which uses

Huang, Zhiyi

95

Optimal protocols for nonlocality distillation  

Science Conference Proceedings (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

96

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

97

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

98

Shim6: reference implementation and optimization  

Science Conference Proceedings (OSTI)

Shim6 is an important multihoming solution. This paper studies shim6 from several perspectives, including shim6 protocol implementation, shim6 mechanism optimization and security enhancement. In order to provide a shim6 research platform, we implement ... Keywords: IPv6, Shim6, multihoming

Jun Bi; Ping Hu; Lizhong Xie

2008-05-01T23:59:59.000Z

99

A PPPoE implementation for linux  

Science Conference Proceedings (OSTI)

Many DSL service providers use PPPoE for residential broadband Internet access. This paper briefly describes the PPPoE protocol, presents strategies for implementing it under Linux and describes in detail a user-space implementation of a PPPoE client.

David F. Skoll

2000-10-01T23:59:59.000Z

100

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

102

CPRA Implementation  

U.S. Energy Information Administration (EIA)

CPRA IMPLEMENTATION. Since the 1930’s Louisiana has lost over 1,829 square miles of land. Between 1990 and 2001 wetland loss was approximately 13 ...

103

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

104

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

105

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

106

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim  

E-Print Network (OSTI)

Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

Lee, Ben

107

Developmental issues in environmental reporting protocols  

SciTech Connect

In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

Schrock, D.W.; Stoops, J.L. [Pacific Northwest Lab., Richland, WA (United States); Meier, A.K.; Vine, E.L. [Lawrence Berkeley Lab., CA (United States); Solomon, B.D. [Environmental Protection Agency (United States)

1994-08-01T23:59:59.000Z

108

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol – Verification and Certification Protocol (November 1985, Rev. 1)

109

Securing Block Storage Protocols over IP  

Science Conference Proceedings (OSTI)

This document discusses how to secure block storage and storage discovery protocols running over IP (Internet Protocol) using IPsec and IKE (Internet Key Exchange). Threat models and security protocols are developed for iSCSI (Internet Protocol Small ...

B. Aboba; J. Tseng; J. Walker; V. Rangan; F. Travostino

2004-04-01T23:59:59.000Z

110

Appraisal Process Protocols, Independent Oversight - November...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Protocols, Independent Oversight - November 2012 Appraisal Process Protocols, Independent Oversight - November 2012 November 2012 Updated Independent Oversight...

111

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

112

Protocol to co-operation agreement with Iran  

E-Print Network (OSTI)

A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

2001-01-01T23:59:59.000Z

113

Protocol for maximizing energy savings and indoor environmental quality  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

114

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

115

RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits  

Science Conference Proceedings (OSTI)

Message Passing Interface (MPI) is a popular parallel programming model for scientific applications. Most high-performance MPI implementations use Rendezvous Protocol for efficient transfer of large messages. This protocol can be designed using either ... Keywords: InfiniBand, MPI, communication overlap

Sayantan Sur; Hyun-Wook Jin; Lei Chai; Dhabaleswar K. Panda

2006-03-01T23:59:59.000Z

116

TREnD: a Timely, Reliable, Energy-efficient and Dynamic WSN Protocol for Control Applications  

E-Print Network (OSTI)

1 TREnD: a Timely, Reliable, Energy-efficient and Dynamic WSN Protocol for Control Applications for energy consumption. TREnD is implemented on a test-bed and compared to some existing protocols. In this paper, we develop TREnD1 , an energy-efficient The authors are with the ACCESS Linnaeus Center

117

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

118

Fusion Implementation  

SciTech Connect

If a fusion DEMO reactor can be brought into operation during the first half of this century, fusion power production can have a significant impact on carbon dioxide production during the latter half of the century. An assessment of fusion implementation scenarios shows that the resource demands and waste production associated with these scenarios are manageable factors. If fusion is implemented during the latter half of this century it will be one element of a portfolio of (hopefully) carbon dioxide limiting sources of electrical power. It is time to assess the regional implications of fusion power implementation. An important attribute of fusion power is the wide range of possible regions of the country, or countries in the world, where power plants can be located. Unlike most renewable energy options, fusion energy will function within a local distribution system and not require costly, and difficult, long distance transmission systems. For example, the East Coast of the United States is a prime candidate for fusion power deployment by virtue of its distance from renewable energy sources. As fossil fuels become less and less available as an energy option, the transmission of energy across bodies of water will become very expensive. On a global scale, fusion power will be particularly attractive for regions separated from sources of renewable energy by oceans.

J.A. Schmidt

2002-02-20T23:59:59.000Z

119

Protocols and Systems Services  

E-Print Network (OSTI)

Current data-centers rely on TCP/IP over Fast- and Gigabit-Ethernet for data communication even within the cluster environment for costeffective designs, thus limiting their maximum capacity. Together with raw performance, such data-centers also lack in efficient support for intelligent services, such as requirements for caching documents, managing limited physical resources, load-balancing, controlling overload scenarios, and prioritization and QoS mechanisms, that are becoming a common requirement today. On the other hand, the System Area Network (SAN) technology is making rapid advances during the recent years. Besides high performance, these modern interconnects are providing a range of novel features and their support in hardware (e.g., RDMA, atomic operations, QoS support). In this paper, we address the capabilities of these current generation SAN technologies in addressing the limitations of existing data-centers. Specifically, we present a novel framework comprising of three layers (communication protocol support, data-center service primitives and advanced data-center services) that work together to tackle the issues associated with existing data-centers. We also present preliminary results in the various aspects of the framework, which demonstrate close to an order of magnitude performance benefits achievable by our framework as compared to existing data-centers in several cases.

Balaji Vaidyanathan Narravula; P. Balaji; K. Vaidyanathan; S. Narravula; H. -w. Jin; D. K. Panda

2006-01-01T23:59:59.000Z

120

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Climate Change Taxes and Energy Efficiency in Japan  

E-Print Network (OSTI)

In 2003 Japan proposed a Climate Change Tax to reduce its CO2 emissions to the level required by the Kyoto Protocol. If implemented, the tax would be levied on fossil fuel use and the revenue distributed to several sectors ...

Kasahara, Satoru.

122

Don't optimize existing protocols, design optimizable protocols  

Science Conference Proceedings (OSTI)

As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of setting these parameters to optimize an objective. In recent years, optimization ...

Jiayue He; Jennifer Rexford; Mung Chiang

2007-07-01T23:59:59.000Z

123

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

124

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; L. Masinter; P. Leach; T. Berners-Lee

1999-06-01T23:59:59.000Z

125

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; T. Berners-Lee

1997-01-01T23:59:59.000Z

126

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

127

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocols Report This image shows a cover of a report titled "Building America House Simulation Protocols." The Building America logo is shown in the lower left corner of...

128

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

129

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

130

Effects of Synoptic-scale Wind under the Typical Summer Pressure Pattern on the Mesoscale High-Temperature Events in the Osaka and Kyoto Urban Areas in Japan by the WRF model  

Science Conference Proceedings (OSTI)

The actual conditions of the mesoscale summer high temperatures (HT) recorded in Osaka-Kyoto urban area in Japan were investigated by using our observation network. The daytime temperatures observed on ten HT events in this area were the highest ...

Yuya Takane; Yukitaka Ohashi; Hiroyuki Kusaka; Yoshinori Shigeta; Yukihiro Kikegawa

131

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

132

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

133

Formal apparatus for measurement of lightweight protocols  

Science Conference Proceedings (OSTI)

Lightweight protocols are an important topic in the area of computer communications. With the proliferation of security services not only ordinary communication protocols, but also cryptographic protocols, i.e. security services, have become a subject ... Keywords: Lightweight protocols, Security, Security services metrics, Standardization, Ubiquitous computing

Denis Tr?ek; Damjan Kova?

2009-02-01T23:59:59.000Z

134

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

135

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

136

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

137

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses  

E-Print Network (OSTI)

Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

Marcos Curty; Norbert Lütkenhaus

2004-11-05T23:59:59.000Z

138

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

139

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

140

Implementing for Implementing Executive Order 13423  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING EXECUTIVE IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" March 29, 2007 0 Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM-HQ Review Field Self Assessment Site Specific QAP-QIP EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 This memorandum serves to transmit the Protocol for EM Review/Field Self-Assessment of Site-Specific QAP/QIP. The subject document is developed as part of continued efforts to ensure technical consistency, transparency, and clarity of QA requirements and expectations. Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 More Documents & Publications Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans SOPP-43, EM-23 Quality Assurance Oversight

142

Event:GHG Protocol Latin America and Caribbean Regional Training: How to  

Open Energy Info (EERE)

Protocol Latin America and Caribbean Regional Training: How to Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program: all day on 2011/08/29 Aug 29 - Sept 2: Bogota, Colombia This regional workshop will provide training for government agencies, business/industry associations and key NGOs on how to establish and implement national- or regional-level corporate greenhouse gas (GHG) emissions reporting programs and trainings. The workshop will include two parts: a training of trainers of corporate GHG accounting and reporting, and a corporate GHG program design course. Members of the Brazil GHG Protocol Program, the Mexico GHG Protocol

143

Homeless and homebased lazy release consistency protocols on distributed shared memory  

E-Print Network (OSTI)

This paper describes the comparison between homeless and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared Memory (DSM) in cluster computing. We present a performance evaluation of parallel applications running on homeless and home-based LRC protocols. We compared the performance between Tread-Marks, which uses homeless LRC protocol, and our home-based DSM system. We found that the home-based DSM system has shown better scalability than TreadMarks in parallel applications we tested. This poor scalability in the homeless protocol is caused by a hot spot and garbage collection, but we have shown that these factors do not affect the scalability of the home-based protocol.

Byung-hyun Yu; Zhiyi Huang; Stephen Cranefield; Martin Purvis

2004-01-01T23:59:59.000Z

144

Remote implementation of partially unknown operations and its entanglement costs  

E-Print Network (OSTI)

We present the generalized version of Wang's protocol[A.M.Wang, Phys.Rev.A 74,032317 (2006)] for the remote implementation(sometimes referred to as quantum remote control) of partially unknown quantum operations. The protocol only requires no more than half of the entanglements used in Bidirectional Quantum State Teleportation. We also propose a protocol for another form of quantum remote control. It can remotely implement a unitary operation which is a combination of the projective representations of a group. Moreover, we prove that the Schmidt rank of the entanglements cannot not be less than the number of controlled parameters of the operations, which for the first time gives a lower bound on entanglement costs in remote implementation of quantum operations.

Shu-Hui Luo; An-Min Wang

2013-01-24T23:59:59.000Z

145

Cryptographic voting protocols: a systems perspective  

Science Conference Proceedings (OSTI)

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software ...

Chris Karlof; Naveen Sastry; David Wagner

2005-07-01T23:59:59.000Z

146

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

147

Improving Accelerated Weathering Protocols to Anticipate ...  

Science Conference Proceedings (OSTI)

... Step # Water Spray Irradiance ... water sprays during the dark cycle augmented with numerous shorter sprays ? New Protocol correctly ...

2013-04-19T23:59:59.000Z

148

Former Worker Program Medical Protocol | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medical Protocol Former Worker Program Medical Protocol April 2013 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which...

149

Protocols for conducting Environmental Management Assessments of DOE organizations  

SciTech Connect

To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

1993-08-01T23:59:59.000Z

150

QSG - Categorize Implementation  

Science Conference Proceedings (OSTI)

... IMPLEMENT A DECOMMISSIONING STRATEGY When an information system is removed from operation, the information ...

2009-05-13T23:59:59.000Z

151

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

152

Analyzing the effect of routing protocols on media access control protocols in radio networks  

SciTech Connect

We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

153

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

154

An Intelligent Evaluation Model Based on the LEACH Protocol in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

This paper aims to introduce some key parameters for the tracking application in wireless sensor networks. In this work the LEACH protocol with J-sim simulation tool has been implemented, and consequently some useful trade-off analysis results among ... Keywords: J-sim, LEACH, EDCR, Evaluation Model

Ning Cao; Russell Higgs; Gregory M. P. O'Hare

2012-10-01T23:59:59.000Z

155

An Underwater Network Testbed: Design, Implementation and Measurement  

E-Print Network (OSTI)

An Underwater Network Testbed: Design, Implementation and Measurement Zheng Peng, Jun-Hong Cui-Lab, an underwater acoustic sensor network lab testbed. Aqua-Lab consists of a water tank, a set of acoustic algorithms and protocols designed for underwater sensor networks. Categories and Subject Descriptors C.2.m

Wang, Bing

156

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting  

E-Print Network (OSTI)

We propose a family of sifting-less quantum-key-distribution protocols which use reverse-reconciliation, and are based on weak coherent pulses (WCPs) polarized along m different directions. When m=4, the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing. We compute their total keyrate as function of the channel transmission T, using general information theoretical arguments and we show that they have a higher keyrate than the more standard protocols, both for fixed and optimized average photon number of the WCPs. When no decoy-state protocols (DSPs) are applied, the scaling of the keyrate with transmission is improved from T2 for BB84 to T^(1+1/(m-2)). If a DSP is applied, we show how the keyrates scale linearly with T, with an improvement of the prefactor by 75.96 % for m=4. High values of $ m $ allow to asymptotically approach the keyrate obtained with ideal single photon pulses. The fact that the keyrates of these sifting-less protocols are higher compared to those of the aforementioned more standard protocols show that the latter are not optimal, since they do not extract all the available secret key from the experimental correlations.

Fabio Grazioso; Frédéric Grosshans

2013-06-25T23:59:59.000Z

157

California Energy Efficiency Evaluation Protocols | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

bpCaliforniaEnergyEfficiencyEvaluationProtocols.pdf Document Details Affiliation: California Public Utilities Commission Focus: Adoption Compliance Building Type: Commercial...

158

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

159

Field Monitoring Protocol: Heat Pump Water Heaters  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson National Renewable Energy Laboratory C.E. Hancock Mountain Energy...

160

FLIP: A flexible interconnection protocol for heterogeneous internetworking  

E-Print Network (OSTI)

This paper describes the Flexible Interconnection Protocol, or FLIP, whose main goal is to allow interconnection of heterogeneous devices with varying power, processing, and communication capabilities, ranging from simple sensors to more powerful computing devices such as laptops and desktops. The vision is that FLIP will be used to interconnect such devices forming clouds in the farthest branches/leaves of the Internet, while still providing connectivity with the existing IP-based Internet infrastructure. Through its flexible, customizable headers FLIP integrates just the functions required by a given application and that can be handled by the underlying device. Simple devices like sensors will benefit from incurring close to optimal overhead saving not only bandwidth, but, more importantly, energy. More sophisticated devices in the cloud can be responsible for implementing more complex functions like reliable/ordered data delivery, communication with other device clouds and with the IP infrastructure. FLIP is designed to provide a basic substrate on which to build network- and transport-level functionality. In heterogeneous environments, FLIP allows devices with varying capabilities to coexist and interoperate under the same network infrastructure. We present the basic design of FLIP and describe its implementation under Linux. We also report on FLIP’s performance when providing IPv4 and IPv6 as well as transport-layer functionality a la TCP and UDP. We show FLIP’s energy efficiency in different sensor network scenarios. For example, we use FLIP to implement the directed diffusion communication paradigm and obtain an improvement of 50 % in energy savings over an existing directed diffusion implementation. Finally, we showcase FLIP’s flexibility by demonstrating its ability to incorporate new protocol functions

Ignacio Solis; Katia Obraczka

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

IEEE 1588 Products & Implementations  

Science Conference Proceedings (OSTI)

... Facsimile. 100 Bureau Drive, M/S 8220 Gaithersburg, MD 20899-8220. IEEE 1588 Products & Implementations. This page ...

2012-11-06T23:59:59.000Z

162

Environmental Protection Implementation Plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. The Environmental Protection Implementation Plan serves as an aid to management and staff to implement new environmental programs in a timely manner.

Brekke, D.D.

1994-01-01T23:59:59.000Z

163

Hierarchical implementation of a wireless communications system  

E-Print Network (OSTI)

Personal communications devices, such as the cellular phone, currently dominate the field of wireless communications. Product specifications such as weight, battery life, and transmission capacity pertain to consumer and marketing requirements, but do not readily suggest engineering requirements such as communications protocols, component requirements, and integrated circuit techniques. During the design and implementation phases of large mixed-signal integrated circuit systems, engineers need a method to determine these requirements and verify proper system performance without having to perform several iterations of the expensive integrated circuit fabrication process. The purpose of this thesis is to illustrate a strategy for implementing large mixed-signal systems using a hierarchical modeling approach that connects the high-level system design to the low-level transistor design. This work describes the design and implementation of portions of a transceiver similar to that used in the Personal Communications System (PCS). Several components of the transceiver have been fully implemented, sent for fabrication, and subsequently tested. The technique used to design and implement the transceiver employs top-down design and three levels of modeling to form a complete hierarchical implementation. Behavioral modeling is used at the system-level. The second level of modeling adopts digital and analog macromodeling for individual components. Transistor-level circuit simulators and device models are used in the lowest level of modeling. Implementation of large mixed-signal systems, such as wireless communications devices, is likely to result in single-chip solutions in the near future. As a result, design and implementation techniques must be devised which allow the designer to accurately and inexpensively determine and optimize transistor-level circuits from system requirements. The results of this work show that the techniques presented in this thesis can assist the mixed-signal system designer in determining engineering requirements and verifying proper system operation.

Mayhugh, Terry L

2000-01-01T23:59:59.000Z

164

Entanglement cost of implementing controlled-unitary operations  

E-Print Network (OSTI)

We investigate the minimum entanglement cost of the deterministic implementation of two-qubit controlled-unitary operations using local operations and classical communication (LOCC). We show that any such operation can be implemented by a three-turn LOCC protocol, which requires at least 1 ebit of entanglement when the resource is given by a bipartite entangled state with Schmidt number 2. Our result implies that there is a gap between the minimum entanglement cost and the entangling power of controlled-unitary operations. This gap arises due to the requirement of implementing the operations while oblivious to the identity of the inputs.

Akihito Soeda; Peter S. Turner; Mio Murao

2010-08-06T23:59:59.000Z

165

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

166

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the system‘s performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

167

Security protocols, properties, and their monitoring  

Science Conference Proceedings (OSTI)

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties ... Keywords: language-based security, monitoring of history-based properties, runtime verification, security automata, security protocols, temporal logic

Andreas Bauer; Jan Juerjens

2008-05-01T23:59:59.000Z

168

Proof-Based design of security protocols  

Science Conference Proceedings (OSTI)

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer ...

Nazim Benaissa; Dominique Méry

2010-06-01T23:59:59.000Z

169

RTP Control Protocol Extended Reports (RTCP XR)  

Science Conference Proceedings (OSTI)

This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session Description Protocol (SDP). XR packets are composed of ...

T. Friedman; R. Caceres; A. Clark

2003-11-01T23:59:59.000Z

170

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

171

A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks  

E-Print Network (OSTI)

Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

Shukla, Ashish

2010-01-01T23:59:59.000Z

172

Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol  

E-Print Network (OSTI)

in technologies to convert cellulose-based raw materials into biofuels or renewable energy standards that provide crops from the food supply to biofuel raw materials was responsi- ble for the huge increase. Or so to his myriad duties, in recognition of the growing importance of cellulose as a raw material

173

Alabama Compliance Implementation  

NLE Websites -- All DOE Office Websites (Extended Search)

Alabama Alabama Compliance Implementation and Evaluation (CIE) Guide BUILDING TECHNOLOGIES PROGRAM COMPLIANCE IMPLEMENTATION AND EVALUATION (CIE) GUIDE 2 This Guide is designed to assist state and local code jurisdictions in achieving statewide compliance with the 2009 International Energy Conservation Code (IECC) for residential buildings and ANSI/ASHRAE/IESNA Standard 90.1-2007 for commercial buildings. COMPLIANCE IMPLEMENTATION AND EVALUATION (CIE) GUIDE 3 Alabama WHAT'S INSIDE CIE Guide Overview-Flow Diagram ........................................................................................................................... 5 PART 1: Guide Overview .................................................................................................................................................

174

OPM Scheme Editor 2: A graphical editor for specifying object-protocol structures  

SciTech Connect

This document describes an X-window based Schema Editor for the Object-Protocol Model (OPM). OPM is a data model that supports the specification of complex object and protocol classes. objects and protocols are qualified in OPM by attributes that are defined over (associated with) value classes. Connections of object and protocol classes are expressed in OPM via attributes. OPM supports the specification (expansion) of protocols in terms of alternative and sequences of component (sub) protocols. The OPM Schema Editor allows specifying, displaying, modifying, and browsing through OPM schemas. The OPM Schema Editor generates an output file that can be used as input to an OPM schema translation tool that maps OPM schemas into definitions for relational database management systems. The OPM Schema Editor was implemented using C++ and the X11 based Motif toolkit, on Sun SPARCstation under Sun Unix OS 4.1. This document consists of the following parts: (1) A tutorial consisting of seven introductory lessons for the OPM Schema Editor. (2) A reference manual describing all the windows and functions of the OPM Schema Editor. (3) An appendix with an overview of OPM.

Chen, I-Min A.; Markowitz, V.M.; Pang, F.; Ben-Shachar, O.

1993-07-01T23:59:59.000Z

175

Design and Implementation  

Science Conference Proceedings (OSTI)

... The application for database administration and the web interface for generating reports are implemented using the Tcl/Tk[OUST] scripting ...

176

Information requested in Protocol No  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2010 1, 2010 Smart Grid RFI U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Re: Smart Grid RFI: Addressing Policy and Logistical Challenges In response to the Department of Energy's (DOE) Request for Information regarding smart grid implementation listed in the September 17, 2010 Federal Register, the New York Independent System Operator, Inc. (NYISO) offers the attached white paper entitled "Envisioning a Smarter Grid for New York Consumers." This white paper, issued by the NYISO in September 2010, was filed at the New York Public Service Commission (NYPSC) in response to a call for comments in its Smart Grid Proceeding. 1 The NYISO would also like to bring to the DOE's attention a white paper prepared

177

Overview of the InterGroup protocols  

SciTech Connect

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

2001-03-01T23:59:59.000Z

178

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

179

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

180

NREL Test-to-Failure Protocol (Presentation)  

DOE Green Energy (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

182

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Römer; Marco Antonio Zúñiga

2010-02-01T23:59:59.000Z

183

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

184

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

185

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

186

The security of Ping-Pong protocol  

E-Print Network (OSTI)

Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

Jian-Chuan Tan; An Min Wang

2008-08-28T23:59:59.000Z

187

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Name The Greenhouse Gas Protocol Initiative: Allocation...

188

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

189

High Performance Computing Data Center Metering Protocol | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

190

Event:GHG Protocol Latin America and Caribbean Regional Training...  

Open Energy Info (EERE)

GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol...

191

An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol based on the IEEE 1588 standard that was designed for wired networks and the PBS (Pairwise Broadcast Synchronization) protocol that was designed for sensor networks, as none of them is able to provide the needed synchronization accuracy for our application on its own. The main goals of our new synchronization protocol are: to ensure the accuracy of local clocks up to a tenth of a microsecond and to provide an important energy saving. Our results obtained using NS-2 (Network Simulator) show that the performance of our solution (IEEE 1588-PBS) matches...

Albu, Roxana; Thierry, Gayraud; Pascal, Berthou

2010-01-01T23:59:59.000Z

192

Implementation Proposal for  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation Proposal for Implementation Proposal for The National Action Plan on Demand Response Report to Congress Prepared by staff of the Federal Energy Regulatory Commission and the U.S. Department of Energy The opinions and views expressed in this staff report do not necessarily represent those of the Federal Energy Regulatory Commission, its Chairman, or individual Commissioners, and are not binding on the Commission. Implementation Proposal for The National Action Plan on Demand Response July 2011 TABLE OF CONTENTS Executive Summary ............................................................................................... iii I. Introduction ......................................................................................................1

193

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

194

Unveiling the Implementation Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge National Laboratory www.ornl.gov Oak Ridge National Laboratory www.ornl.gov Unveiling the Implementation Guide October 11, 2011 Michaela Martin Program Manager Residential, Commercial, and Industrial Energy Efficiency Oak Ridge National Laboratory 2 | Oak Ridge National Laboratory www.ornl.gov Guiding Principles for Successfully Implementing Industrial Energy Assessment Recommendations * New resource for industry * Identifies key principles and actions that lead to successful implementation of energy assessment recommendations * Connects readers with a variety of trusted resources * Simple tools for supporting energy management programs and continuous energy performance improvement efforts * Available in hard copy and on the web Implementation Guide Overview 3 | Oak Ridge National Laboratory www.ornl.gov

195

Environmental protection Implementation Plan  

SciTech Connect

This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

R. C. Holland

1999-12-01T23:59:59.000Z

196

Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report  

Science Conference Proceedings (OSTI)

Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

Not Available

1993-09-01T23:59:59.000Z

197

CA/CPS: A Communications ZEBRA implementation using CPS  

Science Conference Proceedings (OSTI)

CZ/CPS is an implementation of the Communications ZEBRA distributed computing environment utilizing the CPS communications protocol. CZ/CPS is intended for parallelization of high energy physics application programs using the CERN Program Library memory and data structure management features. CZ/CPS provides transparent communication of ZEBRA data structures among cooperative processes using standard interfaces for ZEBRA I/O. Examples of usage in a CPS HBOOK4 and GEANT3 application are provided.

Roberts, L.A.

1991-05-01T23:59:59.000Z

198

Strategy for Verifying Security Protocols with Unbounded Message Size  

Science Conference Proceedings (OSTI)

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy ... Keywords: automatic strategies, flaw detection, intruder model, security protocols, verification

Y. Chevalier; L. Vigneron

2004-04-01T23:59:59.000Z

199

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

200

The queue protocol: a deadlock-free, homogeneous, non-two-phase locking protocol  

Science Conference Proceedings (OSTI)

The M-pitfall protocol (MPP) is the most general homogeneous non-two-phase locking protocol which supports shared and exclusive locks. It has two major disadvantages: it is not deadlock-free and it has the paradoxical property that concurrency is often ...

Udo Kelter

1988-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

202

Routing Protocols to Maximize Battery Efficiency  

E-Print Network (OSTI)

In this paper we propose a routing protocol for wireless ad hoc networks whose nodes are largely battery powered. The battery capacity of the nodes is viewed as a common resource of the system and its use is to be optimized. Results from a previous study on battery management have shown that: (1) pulsed current discharge outperforms constant current discharge, (2) battery capacity can be improved by using a bursty discharge pattern due to charge recovery effects that take place during idle periods, (3) given a certain value of current drawn off the battery, higher current impulses degrade battery performance, even if the percentage of higher current impulses is relatively small. We develop a network protocol based on these findings. This protocol favors routes whose links have a low energy cost. We also distribute multihop traffic in a manner that allows all nodes a good chance to recover their battery energy reserve.

Carla F. Chiasserini; Ramesh R. Rao

2000-01-01T23:59:59.000Z

203

Interpolation of recurrence and hashing entanglement distillation protocols  

E-Print Network (OSTI)

We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

Karl Gerd H. Vollbrecht; Frank Verstraete

2004-04-20T23:59:59.000Z

204

Interpolation of recurrence and hashing entanglement distillation protocols  

Science Conference Proceedings (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

205

EPICS Version 4 - Implementing Complex Data Types  

SciTech Connect

Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

Marty Kraimer,; John dalesio

2012-11-27T23:59:59.000Z

206

Implementation and analysis of the BitTorrent protocol with a multi-agent model  

Science Conference Proceedings (OSTI)

A peer to peer (P2P) computer network relies on direct connections between participants instead of conventional centralized resources. This kind of network is useful for many purposes, but its killer application nowadays is file sharing. BitTorrent is ... Keywords: BitTorrent, JADE, Model, Multi-agent, P2P

E. Costa-Montenegro; J. C. Burguillo-Rial; F. Gil-Castiñeira; F. J. González-Castaño

2011-01-01T23:59:59.000Z

207

Demonstration of distributed TDMA MAC protocol implementation with OLSR on linux enriched WARP  

Science Conference Proceedings (OSTI)

In this demo we present software extension for the Wireless open Access Research Platform (WARP), named as Linux Enriched WARP (LE-WARP). The objective of the LE-WARP is twofold. First, to make the WARP more independent from external systems, e.g., need ... Keywords: ad hoc, linux, olsr, synchronization, tdma, warp

Hannu Tuomivaara; Matti Raustia; Markku Jokinen

2009-09-01T23:59:59.000Z

208

Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms  

E-Print Network (OSTI)

and analysis of the resource footprint in terms of energy consumption, CPU usage and memory consumption and applications, aiding in future optimisations. Keywords-resource footprint; energy; mobile ad hoc net- works, this infrastructure is typically rendered useless (e.g., wiped out or severely overloaded). Thus, any infrastructure

209

Policy to implementation: evidence-based practice in community mental health ¿ study protocol  

E-Print Network (OSTI)

Institutes of Health; OSC: Organizational Social Context;evidence from organizational theory to mental health serviceon Youth Mental health: Assessing the organizational social

2013-01-01T23:59:59.000Z

210

Guidelines for Inter-Control Center Communications Protocol (ICCP) Implementation: Plant Controls to Dispatch Computer  

Science Conference Proceedings (OSTI)

Deregulation of the electric power industry has led to sweeping changes to the manner in which power plants are controlled to meet environmental constraints and to support power transmission system stability and utility loads. Generating stations that were once base-loaded are now being cycled daily to minimum generating capacities, if not taken off-line completely. With generation costs directly impacting operations, higher-cost units are cycled the most often. As a result, an increasing number of power...

1999-09-28T23:59:59.000Z

211

Design and Implementation of MAC Protocol for SmartGrid HAN Environment  

Science Conference Proceedings (OSTI)

Recent environmental changes have shown the world the importance of sustainable development and these changes demand concrete solutions. The Smart Grid solution is recognized as a key technology to cope with these challenges, not just concerning the ... Keywords: HAN, MAC, SmartGrid, wireless sensor network

Min Seok Kim; Sung Ryul Kim; Jeonghyun Kim; Younghwan Yoo

2011-08-01T23:59:59.000Z

212

The broadband bearer connection control protocol: performance driven design and implementation  

Science Conference Proceedings (OSTI)

Broadband Access Networks (ANs) is a field of major activity in telecommunications technology. The V"B"5 interface was introduced to support interconnection between these ANs and Service Nodes (SNs) that may be operated by different providers. The first ... Keywords: Broadband access networks, Service nodes, Static resource allocation

P Giannakakis; N Lepidas; I Pikrammenos; I.S Venieris

1999-10-01T23:59:59.000Z

213

Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform  

E-Print Network (OSTI)

, Vikas Gelara, Shashi Raj Singh , Thanasis Korakis , Pei Liu , Shivendra Panwar Department of Electrical on the channel quality. Therefore, the poorer the channel is, the lower the transmission rate that should be used. A possible solution to this problem is the use of neighboring stations as relays to reduce channel time usage

Panwar, Shivendra S.

214

PICs Implementation Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP 04-2301 WIPP 04-2301 Passive Institutional Controls Implementation Plan August 19, 2004 United States Department of Energy Waste Isolation Pilot Plant Carlsbad Field Office Carlsbad, New Mexico DOE/WIPP 04-2301 Passive Institutional Controls Implementation Plan Waste Isolation Pilot Plant Carlsbad, New Mexico August 19, 2004 Prepared for: Washington Regulatory and Environmental Services an affiliate of Washington TRU Solutions, LLC P.O. Box 2078 Carlsbad, New Mexico 88221 Prepared by: John Hart and Associates, P.A. 2815 Candelaria Road, N.W. Albuquerque, New Mexico 87107 (505) 344-7868 DOE/WIPP 04-2301 i Table of Contents List of Tables .....................................................................................................................ii

215

Implementing the National Broadband  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Type text] Type text] Response to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 EnerNOC Page 2 of 8 EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." EnerNOC is a provider of demand response and energy efficiency solutions to utilities, Independent

216

Permanent Markers Implementation Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP 04-3302 WIPP 04-3302 Permanent Markers Implementation Plan August 19, 2004 United States Department of Energy Waste Isolation Pilot Plant Carlsbad Field Office Carlsbad, New Mexico DOE/WIPP 04-3302 ii Permanent Markers Implementation Plan Waste Isolation Pilot Plant Carlsbad, New Mexico August 19, 2004 Prepared for: Washington Regulatory and Environmental Services an affiliate of Washington TRU Solutions, LLC P.O. Box 2078 Carlsbad, New Mexico 88221 Prepared by: John Hart and Associates, P.A. 2815 Candelaria Road, N.W. Albuquerque, New Mexico 87107 (505) 344-7868 DOE/WIPP 04-3302 iii Table of Contents Table of Contents.................................................................................................

217

Environmental Protection Implementation Plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. This report focuses on the following: notification of environmental occurrences; general planning and reporting; special programs and plans; environmental monitoring program; and quality assurance and data verification.

Brekke, D.D.

1995-11-01T23:59:59.000Z

218

Environmental protection implementation plan  

SciTech Connect

This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

Holland, R.C.

1998-03-01T23:59:59.000Z

219

Self-Protecting Session Initiation Protocol Stack  

Science Conference Proceedings (OSTI)

We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular ... Keywords: Cellular automata, Denial of Service, SIP, Self-protecting

Zoran Rusinovic; Nikola Bogunovic

2008-09-01T23:59:59.000Z

220

On communication protocols for tactical navigation assistance  

Science Conference Proceedings (OSTI)

Using tactical navigation systems is popular for military as well as search and rescue applications. For such applications, the significance of the tactical navigation systems arises especially when groups with the same goal move together on the terrain. ... Keywords: C-TRAMAF, Gossip-based ad hoc routing, N-Gossip, communication protocols, cross layer, digital battlefield, tactical navigation

Evren Onem; H. Birkan Yilmaz; Fatih Alagöz; Tuna Tugcu

2008-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Symbolic protocol analysis for monoidal equational theories  

Science Conference Proceedings (OSTI)

We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved ...

Stéphanie Delaune; Pascal Lafourcade; Denis Lugiez; Ralf Treinen

2008-02-01T23:59:59.000Z

222

A Simulation Model of the DOCSIS Protocol  

Science Conference Proceedings (OSTI)

The number of households and businesses using hybrid fiber coaxial cable networks for Internet access is rapidly approaching 40 million in the United States. The cable industry has standardized on a single medium access control (MAC) and physical layer ... Keywords: Data Over Cable Service Interface Specification (DOCSIS), Simulation methods, Transmission Control Protocol (TCP) performance, broadband access, hybrid fiber coaxial cable networks

Jim Martin; James Westall

2007-02-01T23:59:59.000Z

223

Measurement Protocols for Optimized Fuel Assembly Tags  

Science Conference Proceedings (OSTI)

This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

2008-11-01T23:59:59.000Z

224

Power-Save Protocols Corey Andalora  

E-Print Network (OSTI)

rate, etc. Outputs Average routing time per packet Overall power consumption of network #12;Project-84, July 2001. #12;BECA Nodes independently transition to the idle state and back to the sleep state. WhenOff By One Power-Save Protocols Corey Andalora Keith Needels #12;Agenda Topic explanation Problem

Kaminsky, Alan

225

Community-Aware Scheduling Protocol for Grids  

Science Conference Proceedings (OSTI)

Much work has been done to exploit the effectiveness and efficiency of job scheduling upon distributed computational––resources. With regard to existing resource topology and administrative constraints, scheduling approaches are designed ... Keywords: Community-Aware Scheduling Protocol, CASP, Grid, Scheduling, SmartGRID, MaGate

Ye Huang; Amos Brocco; Nik Bessis; Pierre Kuonen; Beat Hirsbrunner

2010-04-01T23:59:59.000Z

226

Interaction protocols for cross-organisational workflows  

Science Conference Proceedings (OSTI)

Workflow technologies are widely used in industry and commerce to assist in the specification, execution and completion of well defined processes within organisations. As industrial and commercial relations have evolved, based on advances on information ... Keywords: Cross-organisational workflows, Hierarchical Petry nets, Interaction protocols, Knowledge-based systems, Workflow integration

FláVio Soares CorrêA Da Silva; Mirtha Lina FernáNdez Venero; Diego Mira David; Mohammad Saleem; Paul W. H. Chung

2013-01-01T23:59:59.000Z

227

Calibrating embedded protocols on asynchronous systems  

Science Conference Proceedings (OSTI)

Embedding is a method of projecting one topology into another. In one-to-one node embedding, paths in the target topology correspond to links in the original topology. A protocol running on the original topology can be modified to be executed on a target ... Keywords: Asynchronous system, Channel system, Distributed system, Fault tolerance, Graph embedding, Transient fault, Virtual topology

Yukiko Yamauchi; Doina Bein; Toshimitsu Masuzawa; Linda Morales; I. Hal Sudborough

2010-05-01T23:59:59.000Z

228

Implementing the National Broadband  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPACE DATA CORPORATION SPACE DATA CORPORATION Space Data is the leader in high altitude balloon borne communications platforms where between 65-100,000 feet we have flown over 20,000 commercial SkySite® flights totaling over 250,000 flight hours as well as supply the military with our StarFighter® platform which extends 2 way radio communications from under 10 miles to over 400 miles. We were founded in 1999 and to develop our technology we decided that the ReFlex paging protocol was appropriate and that FCC licensed spectrum was available. Hence we participated in FCC Auctions 40, 41 and 50 and through secondary market transactions accumulated almost 2 of the 3 MHz allocated to Narrowband PCS (NPCS) in the 901/930/940 MHz bands. Through the auctions and continued subsequent transactions we have been able to

229

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

230

Executive Order 13423 Implementing Instructions  

Energy.gov (U.S. Department of Energy (DOE))

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

231

Blackout Final Implementation Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report Report on the Implementation of the Task Force Recommendations U.S.-Canada Power System Outage Task Force Natural Resources Canada U.S. Department of Energy September 2006 Final Report on the Implementation of the Task Force Recommendations U.S.-Canada Power System Outage Task Force September 2006 Natural Resources Canada U.S. Department of Energy Acknowledgments This document was prepared by staff of Natural Resources Canada and the U.S. Department of Energy. The principal contributors are listed in Annex 1. The staff wish to acknowledge the contributions of the U.S. Federal Energy Regulatory Commission and the Ontario Ministry of Energy. The staff also wish to acknowl- edge the support and cooperation of the North American Electric Reliability Council and, in particular, of Mr. David Nevius, Senior Vice President and Direc- tor of Reliability Assessment & Performance

232

TOSHIYUKI SUGAWA ## KYOTO UNIVERSITY Abstract. ###############################  

E-Print Network (OSTI)

. ############################### ##### ############ 1. ###### R # ##### ######### R ##### (1=2, 1=2)-## oeR # R ### ####### ##### R ######## z = z(p) : U ! V C #### oeR = oeR (z)|dz| ###### oeR (z) # V = z(U) ####################### Remark. #### oeR (z) ### z ################### ####### ########## #################### ('ff: Uff

Sugawa, Toshiyuki

233

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network (OSTI)

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

S. V. Chekanov

2013-06-27T23:59:59.000Z

234

Investigating the limits of randomized benchmarking protocols  

E-Print Network (OSTI)

In this paper, we analyze the performance of randomized benchmarking protocols on gate sets under a variety of realistic error models that include systematic rotations, amplitude damping, leakage to higher levels, and 1/f noise. We find that, in almost all cases, benchmarking provides better than a factor-of-two estimate of average error rate, suggesting that randomized benchmarking protocols are a valuable tool for verification and validation of quantum operations. In addition, we derive new models for fidelity decay curves under certain types of non-Markovian noise models such as 1/f and leakage errors. We also show that, provided the standard error of the fidelity measurements is small, only a small number of trials are required for high confidence estimation of gate errors.

Jeffrey M. Epstein; Andrew W. Cross; Easwar Magesan; Jay M. Gambetta

2013-08-13T23:59:59.000Z

235

An Evaluation of UDP Transport Protocols  

Science Conference Proceedings (OSTI)

Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

Carter, S

2004-12-21T23:59:59.000Z

236

A Novel Adaptive Home Migration Protocol in Home-based DSM  

E-Print Network (OSTI)

Home migration is used to tackle the home assignment problem in home-based software distributed shared memory systems. We propose an adaptive home migration protocol to optimize the single-writer pattern which occurs frequently in distributed applications. Our approach is unique in its use of a per-object threshold which is continuously adjusted to facilitate home migration decisions. This adaptive threshold is monotonously decreasing with increased likelihood that a particular object exhibits a lasting single-writer pattern. The threshold is tuned according to the feedback of previous home migration decisions at runtime. We implement this new adaptive home migration protocol in a distributed Java Virtual Machine that supports truly parallel execution of multi-threaded Java applications on clusters. The analysis and the experiments show that our new home migration protocol demonstrates both the sensitivity to the lasting single-writer pattern and the robustness against the transient single-writer pattern. In the latter case, the protocol inhibits home migration in order to reduce the home redirection overhead.

Weijian Fang Cho-Li; Cho-li Wang; Wenzhang Zhu; Francis C. M. Lau

2004-01-01T23:59:59.000Z

237

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

238

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

239

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

240

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quorum-Oriented Multicast Protocols for Data Replication  

E-Print Network (OSTI)

this paper we have presented a family of quorum multicast protocols, called naive, reschedule, retry, and count. We have shown that these protocols provide good availability while using fewer messages and requiring less latency than a simple multicast

H. Garcia-molina; Darrell Long; Richard A. Golding; R. M. Metcalfe

1991-01-01T23:59:59.000Z

242

A Protocol for Quantum Energy Distribution  

E-Print Network (OSTI)

A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

Masahiro Hotta

2008-03-11T23:59:59.000Z

243

Building America House Simulation Protocols (Revised)  

Science Conference Proceedings (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

244

Exploring Virtual Network Selection Algorithms in DSM Cache Coherence Protocols  

E-Print Network (OSTI)

lines in the modified state. In a home-based directory protocol, every cache line is assigned a home

Heinrich, Mark

245

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

246

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

247

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

248

Implementation of end-to-end abstractions in a network service architecture  

Science Conference Proceedings (OSTI)

To support the increasing diversity of systems and protocols in the Internet, modern routers offer a variety of data path processing functions. Such "network services" are easy to implement on a single node, but a network-wide deployment is difficult. ... Keywords: data path service, network architecture, network socket, next-generation internet

Shashank Shanbhag; Tilman Wolf

2008-12-01T23:59:59.000Z

249

Design and Implementation of a P2P Cooperative Proxy Cache System  

Science Conference Proceedings (OSTI)

In this paper, we design and implement a P2P cooperative proxy caching system based on a novel P2P cooperative proxy caching scheme. To effectively locate the cached web documents, a TTL-based routing protocol is proposed to manage the query and response ...

James Z. Wang; Vipul Bhulawala

2005-09-01T23:59:59.000Z

250

A survey on real-world implementations of mobile ad-hoc networks  

Science Conference Proceedings (OSTI)

Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simplification of real-world properties such as radio characteristics or node ... Keywords: Emulation, Experiment, Implementation, Mobile ad-hoc networks, Real-world, Routing, Testbed

Wolfgang Kiess; Martin Mauve

2007-04-01T23:59:59.000Z

251

Design and implementation of a portable and extensible FTP to NFS gateway  

Science Conference Proceedings (OSTI)

In this paper, we present the design and implementation of an FTP to NFS gateway. The gateway exports an "FTP file system" to NFS clients. Once this file system is mounted on a client machine, files and directories accessible through the FTP protocol ...

Deepak Gupta; Vikrant Sharma

2002-06-01T23:59:59.000Z

252

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

253

Building Technologies Office: Open-Protocol Platform for Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

254

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks  

E-Print Network (OSTI)

This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

Yu, Hong

2012-01-01T23:59:59.000Z

255

Implementing the National Broadband  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Before the Before the Department of Energy Washington, D.C. 20585 In the Matter of Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy NBP RFI: Communications Requirements COMMENTS OF BALTIMORE GAS & ELECTRIC COMPANY I. Introduction BGE is the nation's oldest and most experienced utility company. It has met the energy needs of central Maryland for nearly 200 years. Today, it serves more than 1.2 million business and residential electric customers, and approximately 650,000 gas customers in an economically diverse, 2,300-square-mile area encompassing Baltimore City and all or part of ten central Maryland counties.

256

Implementing the National Broadband  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DAKOTA ELECTRIC ASSOCIATION DAKOTA ELECTRIC ASSOCIATION I. Introduction a. Identification/description of our company Dakota Electric Association (DEA) is an Incorporated Cooperative Association which distributes electricity to more than 100,000 members in Dakota County and surrounding areas. DEA is the second largest electric cooperative in the state of Minnesota, and is a member cooperative of Great River Energy (GRE). II. Executive Summary DEA has deployed a fully integrated IP network to 26 substation sites. An IP based network transports data information for Supervisory Control and Data Acquisition (SCADA) and Load Management systems. A private Wide Area Network (WAN) was implemented by DEA in 2001 due to lack of comprehensive coverage by major carriers. In addition to the WAN, DEA relies on commercial services to communicate with load

257

Environmental Implementation Plan  

SciTech Connect

The purpose of the Environmental Implementation Plan (EIP) is to show the current and future (five years) environmental plans from individual site organizations and divisions, as well as site environmental programs and initiatives which are designed to protect the environment and meet or exceed changing environmental/regulatory requirements. Communicating with site organizations, departments, and committees is essential in making the site's environmental-planning process work. The EIP gives the site the what, when, how, and why for environmental requirements. Through teamwork and proactive planning, a partnership for environmental excellence is formed to achieve the site vision for SRS to become the recognized model for Environmental Excellence in the Department of Energy's Nuclear Weapons Complex.

Not Available

1993-03-15T23:59:59.000Z

258

Environmental Implementation Plan  

SciTech Connect

The purpose of the Environmental Implementation Plan (EIP) is to show the current and future (five years) environmental plans from individual site organizations and divisions, as well as site environmental programs and initiatives which are designed to protect the environment and meet or exceed changing environmental/regulatory requirements. Communicating with site organizations, departments, and committees is essential in making the site`s environmental-planning process work. The EIP gives the site the what, when, how, and why for environmental requirements. Through teamwork and proactive planning, a partnership for environmental excellence is formed to achieve the site vision for SRS to become the recognized model for Environmental Excellence in the Department of Energy`s Nuclear Weapons Complex.

1993-03-15T23:59:59.000Z

259

Environmental Implementation Plan  

SciTech Connect

The purpose of the Environmental Implementation Plan (EIP) is to show the current and future (five years) environmental plans from individual site organizations and divisions, as well as site environmental programs and initiatives which are designed to protect the environment and meet or exceed changing environmental/regulatory requirements. Communicating with site organizations, departments, and committees is essential in making the site's environmental-planning process work. The EIP gives the site the what, when, how, and why for environmental requirements. Through teamwork and proactive planning, a partnership for environmental excellence is formed to achieve the site vision for SRS to become the recognized model for Environmental Excellence in the Department of Energy's Nuclear Weapons Complex.

1993-03-15T23:59:59.000Z

260

A protocol for instruction stream processing  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.

Bergstra, J A

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Foreign Obligations Implementation Status Presentation  

National Nuclear Security Administration (NNSA)

January 13, 2004 Crowne Plaza Ravinia Atlanta, January 13, 2004 Crowne Plaza Ravinia Atlanta, January 13, 2004 Crowne Plaza Ravinia Atlanta, Georgia Georgia Obligations Accounting Implementation Workshop Obligations Accounting Implementation Workshop Foreign Obligations Implementation Status Brian G. Horn U.S. Nuclear Regulatory Commission January 13, 2004 Obligations Accounting Implementation Workshop January 13, 2 Obligations Accounting Implementation Workshop January 13, 2004 Crowne Plaza Ravinia Atlanta, GA 004 Crowne Plaza Ravinia Atlanta, GA Overview of Meeting Overview of Meeting * Review how the Obligation Tracking System is working * Presentations: - Review of Government notification procedures - Establishment of the beginning Obligation Balances for sites

262

View-Oriented Update Protocol with Integrated Diff for View-based Consistency  

E-Print Network (OSTI)

with a traditional diff-based protocol and an existing home-based protocol. Experimen- tal results demonstrate the performance of the proposed protocol is significantly better than the diff-based protocol and the home-based

Werstein, Paul

263

IMPLEMENTING REAL TIME RATINGS FOR PATH 15  

E-Print Network (OSTI)

PG&E's standard SCADA protocol, to the Fresno area SCADA (Supervisory Control And Data Acquisition at Gates substation and further, via PG&E's standard SCADA protocol, to the Fresno area SCADA system

264

Draft NISTIR 7946, CVSS Implementation Guidance  

Science Conference Proceedings (OSTI)

... SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet 626 Explorer, Mozilla Firefox, Google Chrome, Opera ...

2013-09-04T23:59:59.000Z

265

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared  

E-Print Network (OSTI)

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols. The protocol com- bines the advantages of homeless and home-based protocols. During lock synchronization a home-based page-based memory update using the invalidation coherence protocol. The protocol is called

Werstein, Paul

266

Environmental Implementation Plan  

SciTech Connect

The Environmental Implementation Plan (EIP) is a dynamic long-range environmental-protection plan for SRS. The EIP communicates the current and future (five year) environmental plans from individual organizations and divisions as well as site environmental initiatives which are designed to protect the environment and meet or exceed compliance with changing environmental/ regulatory requirements. Communication with all site organizations is essential for making the site environmental planning process work. Demonstrating environmental excellence is a high priority embodied in DOE and WSRC policy. Because of your support and participation in the three EIP initiatives; Reflections, Sectional Revision, and Integrated Planning, improvements are being made to the EIP and SRS environmental protection programs. I appreciate the ``Partnership in Environmental Excellence`` formed by the environmental coordinators and professionals who work daily toward our goal of compliance and environmental excellence. I look forward to seeing continued success and improvement in our environmental protection programs through combined efforts of all site organizations to protect our employees, the public health, and the environment. Together, we will achieve our site vision for SRS to be the recognized model for Environmental Excellence in the DOE Nuclear Weapons Complex.

1994-02-01T23:59:59.000Z

267

The Pilgrim: A New Consistency Protocol for Distributed Shared Memory  

E-Print Network (OSTI)

We propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at each site. This protocol was developed for the cooperative platform called CAliF: Cooperative Application Framework. This system uses the DSM to allow programmers to share objects or variables without having to manage the exchange. We present an algorithm which uses the token technique. The token is data structure which contains the updates of shared data. These data are carried through the ring on the token, named Pilgrim. Pilgrim protocol provides both reliable consistency and guaranteed performance according to the type of application described. The protocol is discussed and proved, and we demonstrate its qualities. Key words: consistency protocol, cooperative work, distributed shared memory, virtual ring. 1 Introduction In this paper, we propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at eac...

H. Guyennet; J-c. Lapayre; M. Tréhel

1997-01-01T23:59:59.000Z

268

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

269

Electricity Policy Coordination and Implementation | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Implementation Electricity Policy Coordination and Implementation OE is laying the framework for a modern electricity system by contributing to the development and implementation...

270

Former Worker Medical Screening Program Implementation | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Former Worker Medical Screening Program Implementation Former Worker Medical Screening Program Implementation Program implementation focuses on four specific activities, which are:...

271

SERAPH implementation plans  

DOE Green Energy (OSTI)

The Solar Energy Research Institute (SERI) devotes a significant research effort to the application of solar technology in the industrial sector. It is well known that US industries consume a significant amount of energy, a large portion of which is required in a temperature range in which concentrating solar collectors work effectively. The SERAPH facility (Solar Energy Research and Applications in Process Heat) will provide at SERI the capability of addressing many of the technical issues that currently hamper industrial solar thermal energy system implementation. The primary building blocks of SERAPH are the solar delivery subsystem, control, and data acquisition subsystem (including sequencing and emergency supervision), energy distribution subsystem and two physical areas set aside for storage development and the introduction of load devices. Emphasis has been placed on creating a versatile test facility within which the solar industry can work with SERI in the development of solar systems that will be attractive to potential industrial users. SERAPH will have an initial capability of producing steam at a rate of 900 lb/h (410 kg/h) which corresponds to an energy delivery rate of 1.5 million Btu/h (1.6 x 10/sup 6/ kJ/h) at 430/sup 0/F (220/sup 0/C) with expansion capability to approximately 600/sup 0/F (315/sup 0/C). The initial system controls will be analog with supervisory and direct digital control to follow. The issues to be addressed at SERAPH will be computer predictive model validation and refinement, control strategy development, solar equipment evaluation, and the accumulation of operating and maintenance experience. A consistent theme throughout the planning and operation of SERAPH is the need to develop and follow practices that are consistent with conventional industrial operating procedures.

Castle, J.; Su, W.; Dougherty, D.A.; Wright, J.D.

1979-05-01T23:59:59.000Z

272

Building America House Simulation Protocols (Revised)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

273

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

274

High Performance Computing Data Center Metering Protocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

275

A simulation of the FASTBUS protocols  

E-Print Network (OSTI)

FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

Booth, A W

1981-01-01T23:59:59.000Z

276

NEPA Implementation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation Implementation NEPA Implementation Selected documents providing guidance on the implementation of NEPA. September 7, 2012 OMB and CEQ Joint Memorandum on Environmental Collaboration and Conflict Resolution This Office of Management and Budget (OMB) and Council on Environmental Quality (CEQ) joint memorandum expands and builds on the November 28, 2005, Environmental Conflict Resolution (ECR) Memorandum, directing departments and agencies to increase the appropriate and effective use of third-party assisted environmental collaboration as well as environmental conflict resolution to resolve problems and conflicts that arise in the context of environmental, public lands, or natural resources issues, including matters related to energy, transportation, and water and land management.

277

IMPLEMENTATION GUIDANCE | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

detailed operational procedures used to implement the Department of Energy (DOE) Procedural Rules for the Assessment of Civil Penalties for Classified Information Security...

278

Educational Technology| Leadership and Implementation.  

E-Print Network (OSTI)

?? The purpose of this study was to evaluate two important aspects of educational technology: leadership and implementation. The research conducted in this study aimed… (more)

Galla, Anthony J.

2011-01-01T23:59:59.000Z

279

NMR implementations of Gauss sums  

E-Print Network (OSTI)

I describe the use of NMR experiments which implement Gauss sums as a method for factoring numbers and discuss whether this approach can be computationally useful.

Jonathan A. Jones

2008-07-10T23:59:59.000Z

280

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

APPENDIX J: STATEMENT OF COMPLIANCE WITH DOE SEISMICITY PROTOCOL  

NLE Websites -- All DOE Office Websites (Extended Search)

compliance with the "Protocol for Induced Seismicity Associated with Enhanced Geothermal Systems". Calpine Corporation and other Geysers geothermal operators have long been...

282

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network (OSTI)

Nov 14, 2006 ... Optimization Online. Decentralized Decision-making and Protocol Design for Recycled Material Flows. I-Hsuan Hong (ihong ***at*** ...

283

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide Emergency Management Oversight...

284

Analysis of limiting information characteristics of quantum-cryptography protocols  

SciTech Connect

The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

Sych, D V; Grishanin, Boris A; Zadkov, Viktor N [Department of Physics, M.V. Lomonosov Moscow State University, Moscow (Russian Federation)

2005-01-31T23:59:59.000Z

285

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li • Jianxia Ning • Zhengyuan Xu •. Srikanth V. Krishnamurthy • Gang Chen. Ó Springer ...

286

DOE Transportation Protocols Topic Group Conference Call Summary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

287

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

288

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

a quantitative and qualitative estimation of uncertainty associated with a GHG inventory. Overview The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a...

289

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms  

E-Print Network (OSTI)

Pressure Routing for Underwater Sensor Networks . . . . . .of Aloha Protocols for Underwater Acoustic Sensor Networks.Critical Applications in Underwater Sensor Networks. In

Noh, Young Tae

2012-01-01T23:59:59.000Z

290

Communication Protocols and Data Standards for Energy-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Development Contact Us Department Contacts Media Contacts Communication Protocols and Data Standards for Energy-Related Purposes Speaker(s): Bruce Nordman Date: January 13,...

291

Qubit-string-based bit commitment protocols with physical security  

E-Print Network (OSTI)

Several kinds of qubit-string-based(QS-based) bit commitment protocols are presented, and a definition of information-theoretic concealing is given. All the protocols presented here are proved to be secure under this definition. We suggest an attack algorithm to obtain the local unitary transformation introduced in no-go theorem, which is used to attack the binding condition, then study the security of our QS-based bit commitment protocols under this attack via introducing a new concept "physical security of protocol". At last we present a practical QS-based bit commitment scheme against channel loss and error.

Li Yang; Chong Xiang; Bao Li

2010-11-23T23:59:59.000Z

292

iTOUGH2 Universal Optimization Using the PEST Protocol  

Science Conference Proceedings (OSTI)

iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

Finsterle, S.A.

2010-07-01T23:59:59.000Z

293

Development of DOE complex wide authorized release protocols for radioactive scrap metals.  

SciTech Connect

Within the next few decades, several hundred thousand tons of metal are expected to be removed from nuclear facilities across the U.S. Department of Energy (DOE) complex as a result of decontamination and decommissioning (D&D) activities. These materials, together with large quantities of tools, equipment, and other items that are commonly recovered from site cleanup or D&D activities, constitute non-real properties that warrant consideration for reuse or recycle, as permitted and practiced under the current DOE policy. The provisions for supporting this policy are contained in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. The objective of this study is to develop readily usable computer-based release protocols to facilitate implementation of the Handbook in evaluating the scrap metals for reuse and recycle. The protocols provide DOE with an effective oversight tool for managing release activities.

Chen, S. Y.

1998-11-23T23:59:59.000Z

294

Implementation Report: Energy Conservation Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Section 141 of the to Section 141 of the Energy Policy Act of 2005 U.S. Department of Energy February 2007 Table of Contents List of Acronyms .............................................................................................................. 3 Introduction ...................................................................................................................... 4 State of New York, et al. v. Bodman; and NRDC, Inc. et al v. Bodman ............................ 5 Multi-Year Schedule and Implementation Update..................................................... 6 Multi-Year Schedule....................................................................................................... 6 Implementation Update .................................................................................................. 9

295

Implementation Report: Energy Conservation Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

to Section 141 of the to Section 141 of the Energy Policy Act of 2005 U.S. Department of Energy February 2007 Table of Contents List of Acronyms .............................................................................................................. 3 Introduction ...................................................................................................................... 4 State of New York, et al. v. Bodman; and NRDC, Inc. et al v. Bodman ............................ 5 Multi-Year Schedule and Implementation Update..................................................... 6 Multi-Year Schedule....................................................................................................... 6 Implementation Update .................................................................................................. 9

296

Biofuel and Bioenergy implementation scenarios  

E-Print Network (OSTI)

Biofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies #12;Biofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies By André of this project are to provide structured and clear data on the availability and performance of biofuels

297

Molecular Implementation of Combinatory Computing  

E-Print Network (OSTI)

Molecular Implementation of Combinatory Computing for Nanostructure Synthesis and Control: Progress Molecular combinatory computing makes use of a small set of chemical re- actions that together have by several simulated nano-assembly applications, and discuss a possible molecular implementation in terms

MacLennan, Bruce

298

Implementing an Operator Excellence Program  

Science Conference Proceedings (OSTI)

This document is designed to offer power plant operations staff the essential elements that EPRI believes are necessary to effectively implement a successful Operator Excellence Program (OEP). The elements consist of the following: • Creation of an OEP implementation team • Project management considerations • Blended training program considerations • Qualification and certification considerations • An effective quality assurance program

2002-12-29T23:59:59.000Z

299

World Carbon Emissions, 1990, 2010, and 2020  

U.S. Energy Information Administration (EIA)

•Even if the Annex I countries were to reach the emissions levels specified under the Kyoto Climate Change Protocol, ...

300

Wireless System Considerations When Implementing NERC Critical...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Wireless System Considerations When Implementing NERC Critical Infrastructure...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Water Quality Standards Implementation (Oklahoma) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation (Oklahoma) Water Quality Standards Implementation (Oklahoma) Eligibility Agricultural Construction Fuel Distributor Industrial InstallerContractor Investor-Owned...

302

A scalable wireless routing protocol secure against route truncation attacks  

Science Conference Proceedings (OSTI)

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative ...

Amitabh Saxena; Ben Soh

2010-05-01T23:59:59.000Z

303

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

304

Cryptography and game theory: designing protocols for exchanging information  

Science Conference Proceedings (OSTI)

The goal of this paper is finding fair protocols for the secret sharing and secure multiparty computation (SMPC) problems, when players are assumed to be rational. It was observed by Halpern and Teague (STOC 2004) that protocols with bounded number of ...

Gillat Kol; Moni Naor

2008-03-01T23:59:59.000Z

305

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

306

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

307

HLP: a next generation inter-domain routing protocol  

Science Conference Proceedings (OSTI)

It is well-known that BGP, the current inter-domain routing protocol, has many deficiencies. This paper describes a hybrid link-state and path-vector protocol called HLP as an alternative to BGP that has vastly better scalability, isolation and convergence ... Keywords: BGP, convergence, inter-domain routing, scalability

Lakshminarayanan Subramanian; Matthew Caesar; Cheng Tien Ee; Mark Handley; Morley Mao; Scott Shenker; Ion Stoica

2005-08-01T23:59:59.000Z

308

Energy-Efficient Networking Energy-Aware Routing Protocol  

E-Print Network (OSTI)

from to a physical server in another DC, when, the second DC has access to the renewable energy sourcesEnergy-Efficient Networking Energy-Aware Routing Protocol Minimum Power Topology Energy-Aware Admission Control Management of Resources in the Liquid Network Summary Energy Efficient Protocols in Self

Tobagi, Fouad

309

Statistical estimation of the quality of quantum-tomography protocols  

SciTech Connect

We present a complete methodology for testing the performances of quantum tomography protocols. The theory is validated by several numerical examples and by the comparison with experimental results achieved with various protocols for whole families of polarization states of qubits and ququarts including pure, mixed, entangled, and separable.

Bogdanov, Yu. I.; Bukeev, I. D. [Institute of Physics and Technology, Russian Academy of Sciences, 117218, Moscow (Russian Federation); Brida, G.; Genovese, M.; Shurupov, A. P. [INRIM, Strada delle Cacce 91 I-10135, Torino (Italy); Kravtsov, K. S. [Prokhorov General Physics Institute, Russian Academy of Sciences, Moscow, 119991 (Russian Federation); Kulik, S. P.; Soloviev, A. A. [Faculty of Physics, Moscow State University, 119992, Moscow (Russian Federation); Moreva, E. V. [Moscow National Research Nuclear University ' ' MEPHI' ' , 115409, Moscow (Russian Federation)

2011-10-15T23:59:59.000Z

310

Sound Multi-party Business Protocols for Service Networks  

E-Print Network (OSTI)

on the transitions. The states of the protocol are mapped to states in the DFA, and the protocol evolves transitions. All transitions outgoing the initial state are message-based, and their associated time to the considerations stated in Section 2.1 regarding when a transition can be traversed according to its time condition

Politécnica de Madrid, Universidad

311

Self-stabilizing multicast protocols for ad hoc networks  

Science Conference Proceedings (OSTI)

We propose two distributed algorithms to maintain respectively the minimum weight spanning tree (MST) based multi-cast tree and the shortest path (SPST) multi-cast tree in a given ad hoc network for a given multi-cast group; our algorithms are fault ... Keywords: convergence, distributed system, fault tolerance, multi-cast protocol, self-stabilizing protocol, system graph

Sandeep K. S. Gupta; Pradip K. Srimani

2003-01-01T23:59:59.000Z

312

Performance evaluation of Atomic Commit Protocols for mobile transactions  

Science Conference Proceedings (OSTI)

The commitment of a distributed transaction is ensured with the use of an Atomic Commit Protocol (ACP). Due to their great importance for transaction systems, the recent advances in mobile computing development have renewed the interest in the ... Keywords: atomic commit protocols, mobile ACPs, mobile databases, mobile networks, mobile transaction processing, performance evaluation, simulation, wireless networks

Nadia Nouali-Taboudjemat; Lynda Boukantar; Habiba Drias

2007-08-01T23:59:59.000Z

313

Analysis of DSR protocol in event-B  

Science Conference Proceedings (OSTI)

This paper presents an incremental formal development of the Dynamic Source Routing (DSR) protocol in Event-B. DSR is a reactive routing protocol, which finds a route for a destination on demand, whenever communication is needed. Route discovery is an ... Keywords: abstract model, ad hoc network, event-b, event-driven approach, proof-based development, refinement

Dominique Méry; Neeraj Kumar Singh

2011-10-01T23:59:59.000Z

314

On the Security of the Ping-Pong Protocol  

E-Print Network (OSTI)

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

Kim Bostroem; Timo Felbinger

2007-08-22T23:59:59.000Z

315

A hierarchical multicast protocol in mobile IPv6 networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a hierarchical multicast protocol in Mobile IPv6 networks (HMoM), which utilizes the advantages of hierarchical mobility management in handling unicast routing. The multicast agent is selected dynamically and can be located ... Keywords: Mobile IP, Mobile multicast, Protocol, Routing

Ping Wang; Yunze Cai; Jinjie Huang; Xiaoming Xu

2006-12-01T23:59:59.000Z

316

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

317

Protective Force Protocols for ESS Supported Performance Tests and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

318

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

319

Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols  

E-Print Network (OSTI)

In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.

Javaid, Nadeem; Javaid, Akmal; Malik, Shahzad A

2011-01-01T23:59:59.000Z

320

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Client/Server distributed processing using SunOS remote procedure protocol  

SciTech Connect

Over the last ten years the development of PC's and workstations has changed the way computing is performed. Previously, extensive computations were performed on large high speed mainframe machines with substantial storage capacity. Large capital and operational costs were associated with these machines. The advent of more powerful workstations has brought more computational cycles to the users at lower cost than was achieved with busy timesharing systems. However, many users still can't afford individual special purpose hardware or gigabytes of storage. A successful distributed processing environment must share these resources. Client/Server models have been proposed to address the issues of shared resources. They are not a new idea, but their implementation has been difficult. With the introduction of SUN's public domain Remote Procedure Call (RPC) Protocol and SUN's interface generator, RPCGEN, their implementation has been made easier. SUN has developed a set of C'' callable routines that handle the Client/Server operations. The availability of Network File System (NFS) on the SRL CRAY and the arrival of Wollongong's latest version of NFS has allowed applications and information sharing between computing platforms. This paper reviews the Client/Server model with respect to SUN's RPC implementation. The discussion will focus on the RPC connection between local and remote machines, the RPC Paradigm for making remote procedure calls, and the programming levels of the RPC libraries. The paper will conclude with summaries of two applications developed at SRL using the protocol and their effect on our computing environment. These include the Nuclear Plant Analyzer and an animation of fluids using behavioral simulation of atom-like particles.

Hammer, K.E.; Gilman, T.L.

1990-01-01T23:59:59.000Z

322

Migrating Interface Implementation to Aspects  

Science Conference Proceedings (OSTI)

Separation of concerns and modularization are the cornerstones of software engineering. However, when a system is decomposed into units, functionalities often emerge which cannot be assigned to a single element of the decomposition. The implementation ...

Paolo Tonella; Mariano Ceccato

2004-09-01T23:59:59.000Z

323

ARM - Expectations for Campaign Implementation  

NLE Websites -- All DOE Office Websites (Extended Search)

govField CampaignsExpectations for Campaign Implementation Schedule and Availability Preproposals now open for AMF and AAF Preproposals due 01 Feb Invited full proposals due 01 May...

324

Implementing controlled languages in GF  

Science Conference Proceedings (OSTI)

This paper introduces GF, Grammatical Framework, as a tool for implementing controlled languages. GF provides a high-level grammar formalism and a resource grammar library that make it easy to write grammars that cover similar fragments in several natural ...

Krasimir Angelov; Aarne Ranta

2009-06-01T23:59:59.000Z

325

Oracle Essbase 9 Implementation Guide  

Science Conference Proceedings (OSTI)

Develop high-performance multidimensional analytic OLAP solutions with Oracle Essbase Build multidimensional Essbase database cubes and develop analytical Essbase applicationsStep-by-step instructions with expert tips from installation to implementationCan ...

Joseph Sydney Gomez; Sarma Anantapantula

2009-06-01T23:59:59.000Z

326

An Emulated Digital CNN Implementation  

Science Conference Proceedings (OSTI)

A new emulated digital CNN Universal Machine chip architecture is introduced and the main steps of the design process are shown in this paper. One core processor can be implemented on 2 × 2 mm^2 silicon ...

Péter Keresztes; ákos Zarándy; Tamás Roska; Péter Szolgay; Tamás Bezák; Timót Hidvégi; Péter Jónás; Attila Katona

1999-11-01T23:59:59.000Z

327

IEC 61850 Implementation and Transition  

Science Conference Proceedings (OSTI)

This IEC 61850 Implementation and Transition survey report summarizes results of an EPRI survey designed to understand adoption and usage of IEC 61850 within utilities as of 2011. Implementing IEC 61850 within a utility is not necessarily easy or straightforward. While transitioning electromechanical relays to microprocessors is a relatively straightforward process, taking advantage of the entire suite of benefits enabled by IEC-61850-enabled devices is another matter altogether. Utilities have to consid...

2011-12-06T23:59:59.000Z

328

Enterprise Service Bus Implementation Profile  

Science Conference Proceedings (OSTI)

The purpose of this report is to define an implementation profile for International Electrotechnical Commission (IEC) 61968 using technologies commonly found on an Enterprise Service Bus (ESB). More specifically, this document describes how message payloads defined by parts 3 through 9 of IEC 61968 are conveyed using Web Services and the Java Message Service (JMS). The goal is to provide details that are sufficient to enable implementations of IEC 61968 to be interoperable.

2009-04-30T23:59:59.000Z

329

regarding the proposed USFWS Draft Revised Indiana Bat Summer Survey Protocol. If you require any additional information or have any questions please feel free to contact us.  

E-Print Network (OSTI)

1. Going with an entirely acoustic based presence/probable absence survey protocol for Indiana bats range-wide with unproven and highly contested bat call identification software is ill-advised. It is not based upon current scientific, peer reviewed literature. The pilot study that was completed was extremely narrow in scope and did not prove that this can work. Other recent studies have indicated that Indiana bat call identification is problematic at best. Proceeding with implementation of an untested acoustic survey protocol in 2013 could create significant hardship for the Indiana bat. 2. When this protocol was originally presented in 2012 it was claimed that acoustic presence/probable absence surveys would cost significantly less to complete than surveys completed using the 2007 protocol. At that time, acoustic survey sights consisted of 2 nights. There were really no actual cost differences between the 2007 and 2012 survey protocol. Now that the 2013 survey protocol requires 6 acoustic survey sight nights the cost is actually higher and the length of the entire project is significantly longer. 3. Can project proponents assume presence on large scale projects without doing any

Clarification Questions; Wildlife Service (usfws

2013-01-01T23:59:59.000Z

330

An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model  

E-Print Network (OSTI)

Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

C. Erven; N. Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

2013-08-23T23:59:59.000Z

331

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

332

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

333

Quantum discord as a resource in quantum protocols  

E-Print Network (OSTI)

We show quantum discord to be a resource in quantum information processing. This is accomplished by proving a relation between quantum discord and the yield of the quantum protocols. Our results are derived by studying the fully quantum Slepian-Wolf protocol -- a unification of all bipartite, unidirectional and memoryless quantum communication protocols -- in the presence of noise. As examples, we elucidate the significance of quantum discord in quantum teleportation, superdense coding, and entanglement distillation. Finally, we provide the first quantitative relation between quantum discord and the query complexity of quantum computations.

Madhok, Vaibhav

2012-01-01T23:59:59.000Z

334

Building Technologies Office: Implementation, Certification and Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

Implementation, Implementation, Certification and Enforcement to someone by E-mail Share Building Technologies Office: Implementation, Certification and Enforcement on Facebook Tweet about Building Technologies Office: Implementation, Certification and Enforcement on Twitter Bookmark Building Technologies Office: Implementation, Certification and Enforcement on Google Bookmark Building Technologies Office: Implementation, Certification and Enforcement on Delicious Rank Building Technologies Office: Implementation, Certification and Enforcement on Digg Find More places to share Building Technologies Office: Implementation, Certification and Enforcement on AddThis.com... About Standards & Test Procedures Implementation, Certification & Enforcement Standardized Templates for Reporting Test Results

335

Analysing the WAP class 2 wireless transaction protocol using coloured Petri nets  

Science Conference Proceedings (OSTI)

Coloured Petri nets (CPNs) are used to specify and analyse the Class 2 Wireless Transaction Protocol (WTP). The protocol provides a reliable request/response service to the Session layer in the Wireless Application Protocol (WAP) architecture. When only ...

Steven Gordon; Jonathan Billington

2000-06-01T23:59:59.000Z

336

Federal Agency NEPA Implementing Procedures  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agency NEPA Implementing Procedures Agency NEPA Implementing Procedures Note: Some Departments' agencies have their own NEPA implementing procedures. To access Department-wide NEPA implementing procedures, click on the name of the Federal Department. To access NEPA implementing procedures for Department's agencies, click on the provided links. Department/ Agency: Division: Link: Department of Agriculture Agricultural Research Service http://www.ecfr.gov/cgi- in/text- idx?c=ecfr&SID=47c103e07fd64e933c7f74c 4b3c4ac9a&rgn=div5&view=text&node=7:6. 1 2 1 8&id 7 Animal and Plant Health Inspection Service http://www.ecfr.gov/cgi-bin/text- idx?c=ecfr&SID=47c103e07fd64e933c7f74c 4b3c4ac9a&rgn=div5&view=text&node=7:5. 1.1.1.21&idno=7 Farm Service Agency http://www.ecfr.gov/cgi-bin/text-

337

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

338

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

339

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

340

Open-Protocol Platform for Commercial Building Operations and Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

342

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

343

Toward a Standardized Metadata Protocol for Urban Meteorological Networks  

Science Conference Proceedings (OSTI)

With the growing number and significance of urban meteorological networks (UMNs) across the world, it is becoming critical to establish a standard metadata protocol. Indeed, a review of existing UMNs indicate large variations in the quality, quantity, and ...

Catherine L. Muller; Lee Chapman; C.S.B. Grimmond; Duick T. Young; Xiao-Ming Cai

2013-08-01T23:59:59.000Z

344

A Study of Transport Protocols for Wide Area Scientific Applications  

SciTech Connect

This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

Vishal Misra

2011-03-01T23:59:59.000Z

345

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

346

Typhoon: a reliable data dissemination protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers, prompt retransmissions, and frequency diversity to reduce contention ...

Chieh-Jan Mike Liang; R?zvan Mus?loiu-E.; Andreas Terzis

2008-01-01T23:59:59.000Z

347

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 USChina Electric Vehicle Initiative Meeting August 23-24, 2012...

348

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network (OSTI)

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

349

Exploiting home automation protocols for load monitoring in smart buildings  

Science Conference Proceedings (OSTI)

Monitoring and controlling electrical loads is crucial for demand-side energy management in smart grids. Home automation (HA) protocols, such as X10 and Insteon, have provided programmatic load control for many years, and are being widely deployed in ...

David Irwin; Sean Barker; Aditya Mishra; Prashant Shenoy; Anthony Wu; Jeannie Albrecht

2011-11-01T23:59:59.000Z

350

Office of Safety and Emergency Management Evaluations Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

<: iisS Offlct of Hulth , S.ftly ind St curity OFFICE OF SAFETY AND EMERGENCY MANAGEMENT EVALUATIONS PROTOCOL FOR THE DEVELOPMENT AND MAINTENANCE OF CRITERIA AND REVIEW APPROACH...

351

Protocol for Laboratory Testing of SCR Catalyst: 2nd Edition  

Science Conference Proceedings (OSTI)

With the widespread deployment of selective catalytic NOx reduction (SCR) throughout the U.S. fleet of coal fired utility boilers, there was a need to establish standardized protocols to test catalyst. In 2006, EPRI issued a protocol that provided a uniform basis for testing SCR catalyst. In 2007, a wide range of industry representatives, including members of the Post-Combustion NOx Control Program, catalyst vendors, an independent catalyst testing laboratory, a catalyst reconditioner, and a provider of ...

2007-12-21T23:59:59.000Z

352

Launch implementation | Open Energy Information  

Open Energy Info (EERE)

Launch implementation Launch implementation Jump to: navigation, search Stage 4 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

353

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications  

E-Print Network (OSTI)

These protocols waste energy through radio switching, idlePacket-based protocols also waste energy through neighborrouting table may be a waste of energy. In this instance, a

Ramanathan, Nithya; Yarvis, Mark D; Chhabra, Jasmeet; Kushalnagar, Nandakishore; Krishnamurthy, Lakshman; Estrin, D

2005-01-01T23:59:59.000Z

354

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

355

Implementation Trafton et al. Implementation Science 2010, 5:26  

E-Print Network (OSTI)

previously [25]. This study was approved and overseen by the Stanford University Human Research Protection and Implement Decision Support Systems' from the VA Health Service Research and Develop- ment (HSR&D) Program://www.implementationscience.com/content/5/1/26 Open AccessRESEARCH ARTICLE BioMed Central © 2010 Trafton et al; licensee BioMed Central Ltd

Peleg, Mor

356

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network (OSTI)

ASHRAE, CIBSE and USGBC are developing a standardized, consistent set of protocols to facilitate the comparison of the measured performance of buildings, especially those claimed to be green, sustainable, and/or high performance. Such protocols are needed because claims of high performance cannot be credible without such standardized protocols being applied consistently in the U.S. as well as internationally. The protocols will identify what is to be measured, how it is to be measured (instrumentation and spatial resolution), and how often it is to be measured. They will address both the use and reporting of the measured data, as well as appropriate benchmarks for each of the following characteristics: Energy Use (site, and source), Indoor Environmental Quality (IEQ)-Thermal Comfort, IEQ-Indoor Air Quality, IEQ-Lighting/ Daylighting Quality, IEQ-Acoustics and Water Use. The primary users of the protocols document will be building owners and facility managers, rating and labeling system developers, government officials, as well as architects and design engineers. To date, a scoping document has been developed, an extensive literature review has been performed (available on ASHRAE’s web site), and a committee formed to write the protocols, which are intended for publication in January 2009.

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

2008-10-01T23:59:59.000Z

358

Implementation Standing Technical Committee Presentation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation Standing Technical Committee (I-STC) Meeting Deane Evans (NJIT) and Stacy Hunt (Confluence), co-chairs March 1, 2012 What is the I-STC? * Focused on identifying and documenting key barriers and opportunities in implementation of Building America (BA) research results How Does the I-STC Work? * Fosters discussion and prioritization of key research activities * Documents these for DOE/NREL planning purposes 2012 Focus * Clarify key priorities and ensure proper prioritization * Research and track activities that address these priorities inside and outside of BA * Try to knock some of these priorities off the list by documenting existing solutions * Identify critical tasks for 2013 and beyond

359

IMPLEMENTATION OF INTEGRATED BUSINESS INFORMATION SYSTEMS WITHIN...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTATION OF INTEGRATED BUSINESS INFORMATION SYSTEMS WITHIN THE DEPARTMENT OF ENERGY, DOEIG-0466 IMPLEMENTATION OF INTEGRATED BUSINESS INFORMATION SYSTEMS WITHIN THE...

360

Solar Schools Assessment and Implementation Project: Financing...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Schools Assessment and Implementation Project: Financing Options on Solar Installations on K-12 Schools Solar Schools Assessment and Implementation Project: Financing Options...

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Blackout 2003: Blackout Final Implementation Report | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Blackout Final Implementation Report Blackout 2003: Blackout Final Implementation Report Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and...

362

Federal Energy Management Program: Plans, Implementation, and...  

NLE Websites -- All DOE Office Websites (Extended Search)

Plans, Implementation, and Results to someone by E-mail Share Federal Energy Management Program: Plans, Implementation, and Results on Facebook Tweet about Federal Energy...

363

Development and implementation of energy efficiency standards...  

NLE Websites -- All DOE Office Websites (Extended Search)

Development and implementation of energy efficiency standards and labeling programs in China: Progress and challenges Title Development and implementation of energy efficiency...

364

IMPROVED COMPUTATIONAL NEUTRONICS METHODS AND VALIDATION PROTOCOLS FOR THE ADVANCED TEST REACTOR  

SciTech Connect

The Idaho National Laboratory (INL) is in the process of modernizing the various reactor physics modeling and simulation tools used to support operation and safety assurance of the Advanced Test Reactor (ATR). Key accomplishments so far have encompassed both computational as well as experimental work. A new suite of stochastic and deterministic transport theory based reactor physics codes and their supporting nuclear data libraries (HELIOS, KENO6/SCALE, NEWT/SCALE, ATTILA, and an extended implementation of MCNP5) has been installed at the INL. Corresponding models of the ATR and ATRC are now operational with all five codes, demonstrating the basic feasibility of the new code packages for their intended purpose. Of particular importance, a set of as-run core depletion HELIOS calculations for all ATR cycles since August 2009 was successfully completed during 2011. This demonstration supported a decision late in the year to proceed with the phased incorporation of the HELIOS methodology into the ATR fuel cycle management process beginning in 2012. On the experimental side of the project, new hardware was fabricated, measurement protocols were finalized, and the first four of six planned physics code validation experiments based on neutron activation spectrometry were conducted at the ATRC facility. Data analysis for the first three experiments, focused on characterization of the neutron spectrum in one of the ATR flux traps, has been completed. The six experiments will ultimately form the basis for a flexible, easily-repeatable ATR physics code validation protocol that is consistent with applicable ASTM standards.

David W. Nigg; Joseph W. Nielsen; Benjamin M. Chase; Ronnie K. Murray; Kevin A. Steuhm

2012-04-01T23:59:59.000Z

365

Improved computational neutronics methods and validation protocols for the advanced test reactor  

SciTech Connect

The Idaho National Laboratory (INL) is in the process of updating the various reactor physics modeling and simulation tools used to support operation and safety assurance of the Advanced Test Reactor (ATR). Key accomplishments so far have encompassed both computational as well as experimental work. A new suite of stochastic and deterministic transport theory based reactor physics codes and their supporting nuclear data libraries (HELIOS, KENO6/SCALE, NEWT/SCALE, ATTILA, and an extended implementation of MCNP5) has been installed at the INL. Corresponding models of the ATR and ATRC are now operational with all five codes, demonstrating the basic feasibility of the new code packages for their intended purposes. On the experimental side of the project, new hardware was fabricated, measurement protocols were finalized, and the first four of six planned physics code validation experiments based on neutron activation spectrometry have been conducted at the ATRC facility. Data analysis for the first three experiments, focused on characterization of the neutron spectrum in one of the ATR flux traps, has been completed. The six experiments will ultimately form the basis for flexible and repeatable ATR physics code validation protocols that are consistent with applicable national standards. (authors)

Nigg, D. W.; Nielsen, J. W.; Chase, B. M.; Murray, R. K.; Steuhm, K. A.; Unruh, T. [Idaho National Laboratory, 2525 Fremont Street, Idaho Falls, ID 83415-3870 (United States)

2012-07-01T23:59:59.000Z

366

Dynamic Vnodes - design and implementation  

Science Conference Proceedings (OSTI)

Dynamic vnodes make the UNIX kernel responsive to a varying demand for vnodes, without a need to rebuild the kernel. It also optimizes the usage of memory by deallocating excess vnodes. This paper describes the design and implementation of dynamic vnodes ...

Aju John

1995-01-01T23:59:59.000Z

367

SCIENCE AND IMPLEMENTATION PLAN Introduction  

E-Print Network (OSTI)

SCIENCE AND IMPLEMENTATION PLAN Introduction The cross-cutting review of science and research undertaken by the Government in 2000 identified e-Science as one of three priority research areas, allocating the new industries of the future. The Science Budget defines e-Science as 'science increasingly done

Brierley, Andrew

368

Predictive Maintenance Program Implementation Experience  

Science Conference Proceedings (OSTI)

Predictive maintenance (PDM) is a process of collecting data, assessing machinery condition, and deciding when to perform maintenance. PDM saves money and improves machinery reliability as compared to preventive or corrective maintenance. This report describes the implementation of PDM programs at Commonwealth Edison's (ComEd's) fossil power plants.

1998-12-29T23:59:59.000Z

369

implementing bioenergy applied research & development  

E-Print Network (OSTI)

1 A Northern Centre for Renewable Energy implementing bioenergy applied research & development plant measures to become carbon neutral and operate on renewable energy. UNBC is uniquely positioned for Climate Solutions, and UNBC. The Green University Centre will be a model of energy efficiency

Northern British Columbia, University of

370

A MIPS R2000 implementation  

Science Conference Proceedings (OSTI)

Thirty-four undergraduates implemented a MIPS R2000 processor for an introductory CMOS VLSI design course. This included designing a microarchitecture in Verilog, developing custom PLA generation and ad-hoc random testing tools, creating a standard cell ... Keywords: MIPS, RISC

Nathaniel Pinckney; Thomas Barr; Michael Dayringer; Matthew McKnett; Nan Jiang; Carl Nygaard; David Money Harris; Joel Stanley; Braden Phillips

2008-06-01T23:59:59.000Z

371

Implementation Report: Energy Conservation Standards Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Implementation Report: Implementation Report: Energy Conservation Standards Activities Submitted Pursuant to Section 141 of the Energy Policy Act of 2005 U.S. Department of Energy August 2006 Table of Contents List of Acronyms .............................................................................................................. 3 1 Introduction .............................................................................................................. 4 2 Multi-Year Schedule and Implementation Update............................................. 6 2.1 Multi-Year Schedule........................................................................................... 6 2.2 Implementation Update ......................................................................................

372

Implementation Report: Energy Conservation Standards Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation Report: Implementation Report: Energy Conservation Standards Activities Submitted Pursuant to Section 141 of the Energy Policy Act of 2005 U.S. Department of Energy August 2006 Table of Contents List of Acronyms .............................................................................................................. 3 1 Introduction .............................................................................................................. 4 2 Multi-Year Schedule and Implementation Update............................................. 6 2.1 Multi-Year Schedule........................................................................................... 6 2.2 Implementation Update ......................................................................................

373

BGP-S: a protocol for terrestrial and satellite network integration in network layer  

Science Conference Proceedings (OSTI)

To accomplish network layer integration of terrestrial and satellite IP networks, special exterior gateway protocols are needed. In this work, a new exterior gateway protocol called Border Gateway Protocol-Satellite version (BGP-S) is introduced that ... Keywords: BGP-4, IP-based routing, exterior gateway protocol, satellite networks

Eylem Ekici; Chao Chen

2004-09-01T23:59:59.000Z

374

Performance optimization of the go-back-N ARQ protocols over broadcast channels  

Science Conference Proceedings (OSTI)

Keywords: broadcast channels, go-back-N ARQ, performance optimization, point-to-multipoint communication, protocols

Jonathan L. Wang; John A. Silvester

1991-09-01T23:59:59.000Z

375

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

376

LANL PDMLink Product Structure Implementation  

Science Conference Proceedings (OSTI)

Over the past 2 and a half years LANL has done both functionality exploration as well as production implementations of PDMLink Product Structure to control the configuration of many of the LANL Design Agency Products. Based on this experience LANL has been recommending for over a year that future product structure implementation in PDMLink do not use the two digit suffix in the number field of enterprise parts (or WTParts). The suffix will be part of one of the attributes for Part Number. Per the TBP's the two digit suffix represents a change in form, fit, or function in a part or a change in the production agency or a number of other conditions. It also denotes backward compatibility with earlier suffixed parts (see TBP 402 section 3.1).

Scully, Christopher J. [Los Alamos National Laboratory

2012-08-29T23:59:59.000Z

377

Quantum computers: Definition and implementations  

Science Conference Proceedings (OSTI)

The DiVincenzo criteria for implementing a quantum computer have been seminal in focusing both experimental and theoretical research in quantum-information processing. These criteria were formulated specifically for the circuit model of quantum computing. However, several new models for quantum computing (paradigms) have been proposed that do not seem to fit the criteria well. Therefore, the question is what are the general criteria for implementing quantum computers. To this end, a formal operational definition of a quantum computer is introduced. It is then shown that, according to this definition, a device is a quantum computer if it obeys the following criteria: Any quantum computer must consist of a quantum memory, with an additional structure that (1) facilitates a controlled quantum evolution of the quantum memory; (2) includes a method for information theoretic cooling of the memory; and (3) provides a readout mechanism for subsets of the quantum memory. The criteria are met when the device is scalable and operates fault tolerantly. We discuss various existing quantum computing paradigms and how they fit within this framework. Finally, we present a decision tree for selecting an avenue toward building a quantum computer. This is intended to help experimentalists determine the most natural paradigm given a particular physical implementation.

Perez-Delgado, Carlos A.; Kok, Pieter [Department of Physics and Astronomy, University of Sheffield, Hicks Building, Hounsfield Road, Sheffield, S3 7RH (United Kingdom)

2011-01-15T23:59:59.000Z

378

Transportation Protocols Working Group First Conference Call March 1, 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

379

Protocol, Required Reading - June 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

380

Protocol, Development and Maintenance of Criteria and Review Approach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

382

Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations  

SciTech Connect

In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

1996-12-31T23:59:59.000Z

383

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

384

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

385

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

386

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

387

Implementing enterprise resource planning systems: organizational performance and the duration of the implementation  

Science Conference Proceedings (OSTI)

This paper examines the impact of the duration of ERP implementation on firm performance both during and after implementation. Organizations choose either an accelerated implementation approach or a traditional (longer) implementation approach. The former ... Keywords: Enterprise resource planning, Firm performance, IT implementation

Mark Anderson; Rajiv D. Banker; Nirup M. Menon; Jorge A. Romero

2011-09-01T23:59:59.000Z

388

Microsoft Word - Protocol for HSS Site Leads.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

389

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

390

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

391

Hello again: Stabilization of the Hello protocol in OSPF  

Science Conference Proceedings (OSTI)

The Hello protocol in OSPF allows each router in a network to check whether it can exchange messages with neighboring routers in its network. This check is carried out by making each router periodically send hello messages to every neighboring router ...

Jorge A. Cobb; Mohamed G. Gouda; Deepinder Sidhu

2005-01-01T23:59:59.000Z

392

Laboratory Protocol to Demonstrate Equivalency for Plant Wastewater Cotreatment  

Science Conference Proceedings (OSTI)

Adding chemical metal-cleaning wastes to ash ponds can be an inexpensive, effective method for removing contaminant metals from both wastes and ponds.This proposed laboratory protocol defines steps for determining the usefulness of ash pond comixing on a case-by-case basis and for demonstrating the equivalency of comixing with dedicated waste treatment, as required by EPA.

1987-08-26T23:59:59.000Z

393

Minimalist object oriented service discovery protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper presents a new Service Discovery Protocol (SDP) suitable for Wireless Sensor Networks (WSN). The restrictions that are imposed by ultra low-cost sensor and actuators devices (basic components of a WSN) are taken into account to reach a minimal ...

D. Villa; F. J. Villanueva; F. Moya; F. Rincón; J. Barba; J. C. López

2007-05-01T23:59:59.000Z

394

Modelling protocols for multiagent interaction by F-logic  

Science Conference Proceedings (OSTI)

This paper proposes a method to represent agent Unified Modelling Language (AUML) in logic form using F-logic that provides deductive capability and uniform knowledge integration base. The AUML is used to differentiate relevant interaction more precisely ... Keywords: AUML, F-logic, interaction protocols, message route, multiagent system

Hong Feng Lai

2007-12-01T23:59:59.000Z

395

Synapse: a scalable protocol for interconnecting heterogeneous overlay networks  

Science Conference Proceedings (OSTI)

This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those intra-overlay networks as a unique inter-overlay network. Scalability in ... Keywords: information retrieval, overlay networks, peer-to-peer

Luigi Liquori; Cédric Tedeschi; Laurent Vanni; Francesco Bongiovanni; Vincenzo Ciancaglini; Bojan Marinkovi?

2010-05-01T23:59:59.000Z

396

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network (OSTI)

Biomolecular free energy profiles by a shootingÃ?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

397

Man-in-the-middle in tunnelled authentication protocols  

Science Conference Proceedings (OSTI)

John Ioannidis: I have to interrupt here and be even more offensive than usual. But you are using the worst rackets in industry as a justification for what you're doing. There are all sorts of people just generating garbage protocols, a couple ...

N. Asokan

2003-04-01T23:59:59.000Z

398

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

399

Protocols for processes: programming in the large for open systems  

Science Conference Proceedings (OSTI)

The modeling and enactment of business processes is being recognized as key to modern information managment. The expansion of Web services has increased the attention given to processes, because processes are how services are composed and put to good ... Keywords: business processes, interaction protocols, open systems

Munindar P. Singh; Amit K. Chopra; Nirmit Desai; Ashok U. Mallya

2004-12-01T23:59:59.000Z

400

An efficient synchronisation protocol for wireless sensor network  

Science Conference Proceedings (OSTI)

Time synchronisation is a critical topic in wireless sensor networks for its wide applications, such as data fusion, TDMA scheduling and cooperated sleeping, etc. In this paper, we present an Accurate Time Synchronisation (ATS) protocol based on ... Keywords: WSNs, drift, linear least squares, offset, time synchronisation, wireless networks, wireless sensor networks

Liusheng Huang; Hongli Xu; Yingyu Wan; Junmin Wu; Hong Li

2007-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Moving routing protocols to the user space in MANET middleware  

Science Conference Proceedings (OSTI)

Mobile Ad Hoc Network (MANET) middleware must be aware of the underlying multi-hop topology to self-adapt and to improve its communication efficiency. For this reason, many approaches rely on specific cross-layer communications to interact with the network ... Keywords: Group communication, Middleware, Mobile Ad Hoc Networks, Routing protocols

Pedro García López; Raúl Gracia Tinedo; Josep M. Banús Alsina

2010-09-01T23:59:59.000Z

402

Packet Drop Avoidance for High-speed network transmission protocol  

SciTech Connect

As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

Jin, Guojun

2004-05-01T23:59:59.000Z

403

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

404

A lightweight idempotent messaging protocol for faulty networks  

Science Conference Proceedings (OSTI)

As parallel machines scale to one million nodes and beyond, it becomes increasingly difficult to build a reliable network that is able to guarantee packet delivery. Eventually large systems will need to employ fault-tolerant messaging protocols that ... Keywords: block-structured traces, idempotence, source-reliable messaging

Jeremy Brown; J. P. Grossman; Tom Knight

2002-08-01T23:59:59.000Z

405

A faster distributed protocol for constructing a minimum spanning tree  

Science Conference Proceedings (OSTI)

This paper studies the problem of constructing a minimum-weight spanning tree (MST) in a distributed network. This is one of the most important problems in the area of distributed computing. There is a long line of gradually improving protocols ...

Michael Elkin

2004-01-01T23:59:59.000Z

406

Cross-platform protocol development for sensor networks: lessons learned  

Science Conference Proceedings (OSTI)

Protocols for sensor networks are commonly coupled to the specific operating system (OS), for instance TinyOS, involving some drawbacks. First, programmers must learn OS architecture, programming guidelines, sometimes a new programming language, etc. ... Keywords: cross-platform, embedded systems, sensor networks

Marcin Brzozowski; Hendrik Salomon; Krzysztof Piotrowski; Peter Langendoerfer

2011-05-01T23:59:59.000Z

407

Parallel and concurrent security of the HB and HB+ protocols  

Science Conference Proceedings (OSTI)

Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB+ - whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency ...

Jonathan Katz; Ji Sun Shin

2006-05-01T23:59:59.000Z

408

Private Session Initiation Protocol (SIP) Extensions for Media Authorization  

Science Conference Proceedings (OSTI)

This document describes the need for Quality of Service (QoS) and media authorization and defines a Session Initiation Protocol (SIP) extension that can be used to integrate QoS admission control with call signaling and help guard against denial of ...

W. Marshall

2003-01-01T23:59:59.000Z

409

A survey on secure multipath routing protocols in WSNs  

Science Conference Proceedings (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

410

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...  

NLE Websites -- All DOE Office Websites (Extended Search)

vulnerability is caused due to an error within the idle timeout implementation when handling inspect based TFTP connections and can be exploited to exhaust the connection...

411

GPFS HPSS Integration: Implementation Experience  

SciTech Connect

In 2005 NERSC and IBM Global Services Federal began work to develop an integrated HSM solution using the GPFS file system and the HPSS hierarchical storage system. It was foreseen that this solution would play a key role in data management at NERSC, and fill a market niche for IBM. As with many large and complex software projects, there were a number of unforeseen difficulties encountered during implementation. As the effort progressed, it became apparent that DMAPI alone could not be used to tie two distributed, high performance systems together without serious impact on performance. This document discusses the evolution of the development effort, from one which attempted to synchronize the GPFS and HPSS name spaces relying solely on GPFS?s implementation of the DMAPI specification, to one with a more traditional HSM functionality that had no synchronized namespace in HPSS, and finally to an effort, still underway, which will provide traditional HSM functionality, but requires features from the GPFS Information Lifecycle Management (ILM) to fully achieve this goal in a way which is scalable and meets the needs of sites with aggressive performance requirements. The last approach makes concessions to portability by using file system features such as ILM and snapshotting in order to achieve a scalable design.

Hazen, Damian; Hick, Jason

2008-08-12T23:59:59.000Z

412

Implementation of global energy sustainability  

SciTech Connect

The term energy sustainability emerged from the UN Conference on Environment and Development in Rio 1992, when Agenda 21 was formulated and the Global Energy Charter proclaimed. Emission reductions, total energy costing, improved energy efficiency, and sustainable energy systems are the four fundamental principles of the charter. These principles can be implemented in the proposed financial, legal, technical, and education framework. Much has been done in many countries toward the implementation of the Global Energy Charter, but progress has not been fast enough to ease the disastrous effects of the too many ill-conceived energy systems on the environment, climate, and health. Global warming is accelerating, and pollution is worsening, especially in developing countries with their hunger for energy to meet the needs of economic development. Asian cities are now beating all pollution records, and greenhouse gases are visibly changing the climate with rising sea levels, retracting glaciers, and record weather disasters. This article presents why and how energy investments and research money have to be rechanneled into sustainable energy, rather than into the business-as-usual of depleting, unsustainable energy concepts exceeding one trillion dollars per year. This largest of all investment sectors needs much more attention.

Grob, G.R. [CMDC, Zurich (Switzerland)

1998-02-01T23:59:59.000Z

413

Implementing the chemical weapons convention  

SciTech Connect

In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty implementing issues, showing how various States Parties have enacted measures that are responsive to CWC obligations. It is intended to highlight the issues that States Parties must address and to identify trends among States Parties that might be useful to States that have not yet made crucial decisions as to how to resolve key matters. At various points in the text, country names are listed in parenthesis to identify pieces of national legislation that demonstrate the point in the text. It should not be inferred that nations not listed have not addressed the point or have taken a different position. In some cases, a nation's position is explained in somewhat more depth to give specific detail to an assertion in the text. Attached to this paper is a chart which illustrates how States Parties in the Central European region as well as the United States respond to the issues raised. Obviously, in preparing such a chart, many subtle provisions in national legislation must be simplified. The point of the chart is to portray, on a few pages, the major trends of legislation.

Kellman, B.; Tanzman, E. A.

1999-12-07T23:59:59.000Z

414

NERSC Strategic Implementation Plan 2002-2006  

E-Print Network (OSTI)

LBNL/PUB-5465 Vol. 2 Rev. 2 NERSC Strategic ImplementationNo. DE-AC03-76SF00098. NERSC Strategic Implementation Plan2002–2006 Abstract NERSC, the National Energy Research

2002-01-01T23:59:59.000Z

415

Keynote: Implementing New Technology in Metallurgical Processes  

Science Conference Proceedings (OSTI)

Presentation Title, Keynote: Implementing New Technology in Metallurgical Processes: Building ... DRI-based Continuous Steelmaking: From Theory to Practice.

416

Implementation of an Effective Energy Management Program ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, 2011 TMS Annual Meeting & Exhibition. Symposium , Cast Shop for Aluminum Production. Presentation Title, Implementation of an ...

417

Earthquake Research and Implementation Activities at DOE  

Science Conference Proceedings (OSTI)

... the last decade. ? Major projects continued (Hanford, Savannah River ... Page 9. DOE Research and Implementation Activities New Hanford PSHA ...

2010-11-17T23:59:59.000Z

418

XACML profile and implementation for authorization interoperability between OSG and EGEE  

SciTech Connect

The Open Science Grid (OSG) and the Enabling Grids for E-sciencE (EGEE) have a common security model, based on Public Key Infrastructure. Grid resources grant access to users because of their membership in a Virtual Organization (VO), rather than on personal identity. Users push VO membership information to resources in the form of identity attributes, thus declaring that resources will be consumed on behalf of a specific group inside the organizational structure of the VO. Resources contact an access policies repository, centralized at each site, to grant the appropriate privileges for that VO group. Before the work in this paper, despite the commonality of the model, OSG and EGEE used different protocols for the communication between resources and the policy repositories. Hence, middleware developed for one Grid could not naturally be deployed on the other Grid, since the authorization module of the middleware would have to be enhanced to support the other Grid's communication protocol. In addition, maintenance and support for different authorization call-out protocols represents a duplication of effort for our relatively small community. To address these issues, OSG and EGEE initiated a joint project on authorization interoperability. The project defined a common communication protocol and attribute identity profile for authorization call-out and provided implementation and integration with major Grid middleware. The activity had resonance with middleware development communities, such as the Globus Toolkit and Condor, who decided to join the collaboration and contribute requirements and software. In this paper, we discuss the main elements of the profile, its implementation, and deployment in EGEE and OSG. We focus in particular on the operations of the authorization infrastructures of both Grids.

Garzoglio, G.; Alderman, I.; Altunay, M.; Ananthakrishnan, R.; Bester, J.; Chadwick, K.; Ciaschini, V.; Demchenko, Y.; Ferraro, A.; Forti, A.; Groep, D.; /Fermilab /Wisconsin U., Madison /Argonne /INFN, CNAF /Amsterdam U. /NIKHEF, Amsterdam /Brookhaven /SWITCH, Zurich /Bergen Coll. Higher Educ.

2009-05-01T23:59:59.000Z

419

Implementing the Climate Change Policy Revolution in  

E-Print Network (OSTI)

Implementing the Climate Change Policy Revolution in British Columbia (BC) The Tansley Lecture Johnson-Shoyama Graduate School of Public Policy #12;Implementing the Climate Change Policy Revolution Johnson-Shoyama Graduate School of Public Policy Tansley Lecture 2010 #12;#12;Implementing the Climate

Peak, Derek

420

IMPLEMENTATION_PLAN_FINAL.cdr  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Environmental Justice Five-Year Implementation Plan ENERGY U.S. DEPARTMENT OF Table of Contents Forward . . . . . . . . . . . . . . . . . . . . . . . 1 Introduction . . . . . . . . . . . . . . . . . . . 2 Vision Statement. . . . . . . . . . . . . . . . 5 Environmental Justice Core Principles. . . . . . . . . . . . . . . . . . 5 Goal 1 . . . . . . . . . . . . . . . . . . . . . . . 6 Goal 2 . . . . . . . . . . . . . . . . . . . . . . . . 7 Goal 3 . . . . . . . . . . . . . . . . . . . . . . 10 Goal 4 . . . . . . . . . . . . . . . . . . . . . . . 11 Summary and Conclusion . . . . . . . . 12 Forward The Department of Energy (DOE) sets an ambitious Departmental agenda that will guide our environmental justice activities for the next five years. It sets forth an aggressive agenda, and is required to do so if we are to meet the environmental justice demands that are spelled out in Presidential Executive Order 12898 and the Department's . This is our initial attempt to prepare a plan of this nature. It will support Departmental environmental

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Implementation of Boiler Best Practices  

E-Print Network (OSTI)

Boilers are an essential part of any industrial plant, and their efficient, economical operation can significantly affect the reliability and profitability of the entire plant. Best Practices for Boilers include tools to determine where a plant or corporation is with respect to boiler treatment, what needs to be done to make the plant (corporation) the "best of the best," and how to get there. When implemented, Best Practices provide a method to measure and track progress, and represent a benchmark for continuous improvement. Best Practices combine our global collective experience from the areas of research, consulting, sales and marketing, and involve not only recommendations and specifications, but also the rationale behind them for the application of the chosen treatment, monitoring, and instrumentation. Best practices provide energy savings, profitability improvement, reduction in total cost of operations, project management, optimized treatment choices, enhanced safety, system assessment processes and facilitated system improvements.

Blake, N. R.

2000-04-01T23:59:59.000Z

422

Energy efficient sensor network implementations  

Science Conference Proceedings (OSTI)

In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. We analyze the following modes of operation; event detection, sleep(wake-up), data acquisition, data processing modes using low power, high performance embedded technology such as specialized embedded DSP processors and a low power FPGAs at the sensing node. We use compute intensive sensor node applications: an acoustic vehicle classifier (frequency domain analysis) and a video license plate identification application (learning algorithm) as a case study. We report performance and total energy usage for our system implementations and discuss the system architecture design trade offs.

Frigo, Janette R [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Kulathumani, Vinod [WEST VIRGINIA UNIV.; Rosten, Ed [CAMBRIDGE UNIV.; Wolinski, Christophe [IRISA; Wagner, Charles [IRISA; Charot, Francois [IRISA

2009-01-01T23:59:59.000Z

423

A Distributed k-Anonymity Protocol for Location Privacy,” Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

Abstract—To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the person’s location such that there are at least k ? 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybody’s location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A user’s location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybody’s location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the user’s area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research. I.

Ge Zhong; Urs Hengartner

2008-01-01T23:59:59.000Z

424

Implementation of Endomorphisms of the CAR Algebra  

E-Print Network (OSTI)

The implementation of non-surjective Bogoliubov transformations in Fock states over CAR algebras is investigated. Such a transformation is implementable by a Hilbert space of isometries if and only if the well-known Shale-Stinespring condition is met. In this case, the dimension of the implementing Hilbert space equals the square root of the Watatani index of the associated inclusion of CAR algebras, and both are determined by the Fredholm index of the corresponding one-particle operator. Explicit expressions for the implementing operators are obtained, and the connected components of the semigroup of implementable transformations are described.

Carsten Binnenhei

1997-01-10T23:59:59.000Z

425

14MIB*ft* * * Kyoto Japan  

E-Print Network (OSTI)

Outline 1 Kinetic chemotaxis model 2 Goals and first results 3 Work in progress and future applications direction randomly, biased by chemical signal #12;Analysis on kinetic chemotaxis models using a functionalAnalysis on kinetic chemotaxis models using a functional analytic approach Analysis on kinetic

Sparks, Donald L.

426

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

-up materials and spill kits will be available at the dedicated fueling area. Tanks will not be "topped off than sediment, to storm water runoff: · Vehicle fluids, including oil, grease, petroleum and coolants will be cleaned off-site when possible. Residue from grinding or removal operations will be picked #12;Storm Water

Takada, Shoji

427

Summary of the Kyoto Report - Part I  

U.S. Energy Information Administration (EIA)

... goods and services rises, and consumption and employment decline. Hence the various cases affect the national economy to varying degrees.

428

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

-intensive or faster fiber carbonization processes, such as microwave or plasma processing. In addition to improved: Hydrogen production system based on centralized biomass gasification technology producing hydrogen

Takada, Shoji

429

Institute of Advanced Energy Kyoto University  

E-Print Network (OSTI)

to the chuck). Since ICP tools do not use microwave sources or magnets for collimating the plasma, they offerADVANCED PLASMA-ETCHING PROCESSES FOR DIELECTRIC MATERIALS IN VLSI TECHNOLOGY By JUAN JUAN WANG ....................................................................................... 22 2.4 Further Disscussion for Plasma Etching

Takada, Shoji

430

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

431

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

432

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols  

E-Print Network (OSTI)

We summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. We consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors. Processes are finite state automata that communicate via selective broadcast messages. Reception of a broadcast is restricted to single-hop neighbors. For this model we consider a decision problem that can be expressed as the verification of the existence of an initial topology in which the execution of the protocol can lead to a configuration with at least one node in a certain state. The decision problem is parametric both on the size and on the form of the communication topology of the initial configurations. We draw a complete picture of the decidability and complexity boundaries of this problem according to various assumptions on the possible topologies.

Delzanno, Giorgio; Zavattaro, Gianluigi; 10.4204/EPTCS.60.4

2011-01-01T23:59:59.000Z

433

SEEC- Regional Energy Baselines and Measurement and Verification Protocols  

E-Print Network (OSTI)

The Southern Energy Efficiency Center (SEEC) was established to substantially increase the deployment of high-performance “beyond-code” buildings across the southern region of the U.S, funded by the U.S. Department of Energy (DOE) Building Technologies Program and is administered by the National Energy Technology Laboratory. During its first 18-month phase, to address efficiency goals of states, utilities, and various energy-efficiency programs; project efforts include defining the baseline energy patterns within the project region and the measurement and verification (M&V) protocols for use in determining the efficiency improvements SEEC, state and USDOE efforts with respect to that baseline. This work is defined under the SEEC Subtask 3.1 Define Regional Baselines and Measurement & Verification Protocols. This report presents preliminary deliverables of this subtask developed and documented by the Energy Systems Laboratory (ESL) for use by the SEEC member state region.

Kim, H.; Haberl, J. S.; Verdict, M.

2009-03-01T23:59:59.000Z

434

An adaptive synchronization protocol for parallel discrete event simulation  

SciTech Connect

Simulation, especially discrete event simulation (DES), is used in a variety of disciplines where numerical methods are difficult or impossible to apply. One problem with this method is that a sufficiently detailed simulation may take hours or days to execute, and multiple runs may be needed in order to generate the desired results. Parallel discrete event simulation (PDES) has been explored for many years as a method to decrease the time taken to execute a simulation. Many protocols have been developed which work well for particular types of simulations, but perform poorly when used for other types of simulations. Often it is difficult to know a priori whether a particular protocol is appropriate for a given problem. In this work, an adaptive synchronization method (ASM) is developed which works well on an entire spectrum of problems. The ASM determines, using an artificial neural network (ANN), the likelihood that a particular event is safe to process.

Bisset, K.R.

1998-12-01T23:59:59.000Z

435

Licklider Transmission Protocol- Security Extensions Status of This Memo  

E-Print Network (OSTI)

This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. IESG Note This RFC is not a candidate for any level of Internet Standard. It represents the consensus of the Delay Tolerant Networking (DTN) Research Group of the Internet Research Task Force (IRTF). It may be considered for standardization by the IETF in the future, but the IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. See RFC 3932 for more information.

S. Farrell; M. Ramadas; S. Burleigh

2008-01-01T23:59:59.000Z

436

To reach consensus using uninorm aggregation operator: A gossip-based protocol  

Science Conference Proceedings (OSTI)

Gossip-based protocols for group communication have attractive scalability and reliability properties. This paper presents a gossip-based protocol that enables agents to reach a consensus based on a specific uninorm aggregation operator. We theoretically ...

Zhixing Huang; Qiaoli Huang

2012-04-01T23:59:59.000Z

437

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

438

Design and Development of a Multi-Hop Routing Protocol for Distributed Sensing Applications  

E-Print Network (OSTI)

for various applications such as habitat monitoring, agriculture, nuclear reactor control, security, etc that draws on current protocol theories. The protocol uses a hybrid network structure to achieve scalability

Faloutsos, Christos

439

Advanced MAC protocol with energy-efficiency for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper proposes E2-MAC, a contention-based energy-efficient Medium Access Control (MAC) Protocol for wireless sensor networks. Energy efficiency is primary goal in wireless sensor networks. Existing MAC protocols for sensor networks attempt ...

Jae-Hyun Kim; Ho-Nyeon Kim; Seog-Gyu Kim; Seung-Jun Choi; Jai-Yong Lee

2005-01-01T23:59:59.000Z

440

Automated Formal Verification of the DHCP Failover Protocol Using Timeout Order Abstraction  

E-Print Network (OSTI)

In this paper, we present automated formal verification of the DHCP Failover protocol. We conduct bounded model-checking for the protocol using Timeout Order Abstraction (TO-Abstraction), a technique to abstract a given ...

Umeno, Shinya

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Guidelines for Designing Effective Energy Information Feedback Pilots: Research Protocols  

Science Conference Proceedings (OSTI)

Enhanced and timely information regarding consumers electricity use and costs, known as feedback, may significantly influence their behavior across a broad spectrum of usage and acquisition decisions. Such information feedback has become increasingly important in light of widespread investments in Smart Grid technologies. This report identifies protocols for three phases of energy information feedback pilotsresearch design, analysis, and reportingalong with three example applications. When used as the co...

2010-04-23T23:59:59.000Z

442

Standard Language Protocols for Photovoltaic and Storage Grid Integration  

Science Conference Proceedings (OSTI)

In mid-2009, a collaborative industry project was formed to address communication integration of distributed photovoltaic and storage systems. The project was designed to engage stakeholders from inverter manufacturers, system integrators, communication system providers, and utilities. These stakeholders have been working together to identify a set of common functions that can be supported by advanced grid-tied inverters. Standardized communication protocols are being developed to exercise these function...

2010-05-14T23:59:59.000Z

443

A control protocol of finite dimensional quantum systems  

E-Print Network (OSTI)

An exact and analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be drive to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycles are connected with the probability amplitudes of target states via triangular functions and can be determined analytically.

Jianju Tang; H. C. Fu

2012-12-11T23:59:59.000Z

444

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks  

E-Print Network (OSTI)

A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDMA). In this protocol, the received power levels of simultaneously transmitting users are controlled by a minimum-power allocation algorithm such that the heterogeneous bit error rates (BERs) of multimedia traffic are guaranteed. With minimumpower allocation, a multimedia wideband CDMA generalized processor sharing (GPS) scheduling scheme is proposed. It provides fair queueing to multimedia traffic with different QoS constraints. It also takes into account the limited number of code channels for each user and the variable system capacity due to interference experienced by users in a CDMA network. The admission of real-time connections is determined by a new effective bandwidth connection admission control (CAC) algorithm in which the minimum-power allocation is also considered. Simulation results show that the new MAC protocol guarantees QoS requirements of both real-time and non-real-time traffic in an FDD wideband CDMA network.

Xudong Wang

2003-01-01T23:59:59.000Z

445

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

446

Test and Evaluation Protocols for ANSI/IEEE N42 Standards  

Science Conference Proceedings (OSTI)

... The test and evaluation protocols provide data sheets for data collection of test results obtained when testing radiation detection instruments ...

2012-06-27T23:59:59.000Z

447

Disabling equational theories in unification for cryptographic protocol analysis through tagging  

E-Print Network (OSTI)

In this paper, we show a new tagging scheme for cryptographic protocol messages. Under this tagging, equational theories of operators such as exclusive-or, binary addition etc. are effectively disabled, when terms are unified. We believe that this result has a significant impact on protocol analysis and security, since unification is at the heart of symbolic protocol analysis. Hence, disabling equational theories in unification implies disabling them altogether in protocol analysis for most operators and theories.

Malladi, Sreekanth

2010-01-01T23:59:59.000Z

448

Trials BioMed Central Study protocol The Leeds Evaluation of Efficacy of Detoxification Study (LEEDS)  

E-Print Network (OSTI)

prisons project pilot study: protocol for a randomised controlled trial comparing dihydrocodeine and buprenorphine for opiate detoxification

Laura Sheard; Clive E Adams; Hany El-sayeh

2007-01-01T23:59:59.000Z

449

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures  

DOE Green Energy (OSTI)

This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

Burgess, R.; Blake, C.; Tracy, C. E.

2008-09-01T23:59:59.000Z

450

Implementing Lego Agents Using Jason  

E-Print Network (OSTI)

Since many of the currently available multi-agent frameworks are generally mostly intended for research, it can be difficult to built multi-agent systems using physical robots. In this report I describe a way to combine the multi-agent framework Jason, an extended version of the agent-oriented programming language AgentSpeak, with Lego robots to address this problem. By extending parts of the Jason reasoning cycle I show how Lego robots are able to complete tasks such as following lines on a floor and communicating to be able to avoid obstacles with minimal amount of coding. The final implementation is a functional extension that is able to built multi-agent systems using Lego agents, however there are some issues that have not been addressed. If the agents are highly dependent on percepts from their sensors, they are required to move quite slowly, because there currently is a high delay in the reasoning cycle, when it is combined with a robot. Overall the system is quite robust and can be used to make simple...

Jensen, Andreas Schmidt

2010-01-01T23:59:59.000Z

451

Environmental Implementation Plan - EIP introduction  

SciTech Connect

Due to the commitment and participation of more than 100 professionals from site environmental coordinators, customer improvements and total quality are being incorporated into the Environmental Implementation Plan (EIP). The EIP is now a living document that communicates an overview of site environmental programs and the facility plans that are designed to protect the environment and meet changing regulatory requirements. Continuous improvement of environmental programs is enhanced through planned quarterly self-assessments during the {open_quotes}Reflections{close_quotes} process. Through the sharing of noteworthy practices, lessons learned, and ideas for improvement, the EIP provides a framework for environmental professionals to promote cost effective solutions and program improvements through teamwork and communication. These efforts were initiated by the Central Environmental Committee Executive Committee (CECEC) and developed and coordinated by the EIP subcommittee. The EIP revision process is the baseline for a continuous improvement cycle. Although the EIP is a Westinghouse Savannah River Company (WSRC) document, the environmental-planning process involves and will benefit all site contractors. Together, we are committed to a {open_quotes}Partnership in Environmental Excellence.{close_quotes}

Peterson, G.L.

1993-10-06T23:59:59.000Z

452

A formal model of rational exchange and its application to the analysis of Syverson's protocol  

Science Conference Proceedings (OSTI)

We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network ...

Levente Buttyán; Jean-Pierre Hubaux; Srdjan ?apkun

2004-05-01T23:59:59.000Z

453

A Methodology for SIP and SOAP Integration Using Application-Specific Protocol Conversion  

Science Conference Proceedings (OSTI)

In recent years, the ubiquitous demands for cross-protocol application access are driving the need for deeper integration between SIP and SOAP. In this article we present a novel methodology for integrating these two protocols. Through an analysis of ... Keywords: Protocol conversion, SIP, SOAP, design concepts, middleware, specialized application languages

Goran Delac; Ivan Budiselic; Ivan Zuzak; Ivan Skuliber; Tomislav Stefanec

2012-11-01T23:59:59.000Z

454

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

455

Performance analysis of session initiation protocol based call set-up over satellite-UMTS network  

Science Conference Proceedings (OSTI)

Session Initiation Protocol (SIP) has been selected as the official end-to-end signalling protocol for establishing multimedia sessions in the IP-based Universal Mobile Telecommunication Systems (UMTS) network. Since a satellite component has been identified ... Keywords: Radio link control acknowledged mode, Satellite UMTS, Session initiation protocol, Session set-up

Victor Y. H. Kueh; Rahim Tafazolli; Barry G. Evans

2005-07-01T23:59:59.000Z

456

CONFab: component based optimization of WSN protocol stacks using deployment feedback  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterized by a large number of non-standardized protocols and varying application requirements. This creates need for a systematic approach to rapidly design and optimize deployment specific protocol stacks. We employ ... Keywords: components-based design, deployment feedback, knowledge base, ontology, protocol stack composition

Junaid Ansari; Elena Meshkova; Wasif Masood; Arham Muslim; Janne Riihijärvi; Petri Mähönen

2012-10-01T23:59:59.000Z

457

Supporting bursty traffic in wireless sensor networks through a distributed advertisement-based TDMA protocol (ATMA)  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks (WSNs) are battery powered and oftentimes deployed in remote and hostile locations. Energy conservation is, therefore, one of the primary goals of MAC protocols designed for these networks. Contention-based protocols ... Keywords: Bursty traffic, Data advertisements, Hybrid, MAC protocol, TDMA, WSN

Surjya Ray; Ilker Demirkol; Wendi Heinzelman

2013-05-01T23:59:59.000Z

458

Cryptanalysis of two group key management protocols for secure multicast  

Science Conference Proceedings (OSTI)

Many emerging network applications are based upon group communication models and are implemented as either one-to-many or many-to-many multicast. As a result, providing multicast confidentiality is a critical networking issue and multicast security has ...

Wen Tao Zhu

2005-12-01T23:59:59.000Z

459

Stakeholder Engagement and Outreach: State Implementation Plans  

Wind Powering America (EERE)

State Implementation Plans State Implementation Plans State Implementation Plans are a policy vehicle that allow states and municipalities to receive emission reduction credit for wind power purchases. Under guidance issued by the U.S. Environmental Protection Agency in August 2004, States and municipalities can receive emission reduction credit in their State Implementation Plans for wind power purchases that reduce air emissions and help achieve attainment of the National Ambient Air Quality Standard for ozone. The National Renewable Energy Laboratory has developed model State Implementation Plan documentation to assist states in achieving this objective. For more information on State Implementation Plans, please see the following publications. Improving Regional Air Quality with Wind Power: Presentation

460

BUILDING TECHNOLOGIES PROGRAM Iowa Compliance Implementation  

NLE Websites -- All DOE Office Websites (Extended Search)

Iowa Iowa Compliance Implementation and Evaluation (CIE) Guide COMPLIANCE IMPLEMENTATION AND EVALUATION (CIE) GUIDE 2 This Guide is designed to assist state and local code jurisdictions in achieving statewide compliance with the 2009 International Energy Conservation Code (IECC) for residential buildings and ANSI/ASHRAE/IESNA Standard 90.1-2007 for commercial buildings. COMPLIANCE IMPLEMENTATION AND EVALUATION (CIE) GUIDE 3 Iowa WHAT'S INSIDE CIE Guide Overview-Flow Diagram ........................................................................................................................... 5 PART 1: Guide Overview .................................................................................................................................................

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Wireless System Considerations When Implementing NERC Critical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing NERC Critical Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Energy asset owners are facing a monumental challenge as they address compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards (CIP-002 through CIP-009). The increased use of wireless technologies and their introduction into control center networks and field devices compound this challenge, as ambiguity exists regarding the applicability of the CIP requirements to wireless networking technologies. Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards More Documents & Publications

462

CIM implementation in developed and developing countries.  

E-Print Network (OSTI)

??Implementing integrated advanced technologies is an effective approach towards solving most problems in today’s competitive global market Computer Integrated Manufacturing (CIM) technologies are presented as… (more)

Saeed, Khaled A

2005-01-01T23:59:59.000Z

463

Building Energy Transparency: A Framework for Implementing.....  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Transparency: A Framework for Implementing... Energy Rating & Disclosure Policy Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and...

464

new technology implementation in metallurgical processes  

Science Conference Proceedings (OSTI)

Incremental Scale Up of Isasmelt™ - The Key to Its Success · Keynote: Implementing New Technology in Metallurgical Processes: Building Plants that Work.

465

AEDG Implementation Recommendations: Interior Lighting Good Design...  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Regulations Resource Center AEDG Implementation Recommendations: Interior Lighting Good Design Practice The Advanced Energy Design Guide (AEDG) for Small Office...

466

AEDG Implementation Recommendations: Walls | Building Energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

467

AEDG Implementation Recommendations: Roofs | Building Energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

468

AEDG Implementation Recommendations: Zones | Building Energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

469

AEDG Implementation Recommendations: Moisture and Air Infiltration...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer Contacts Web Site Policies U.S....

470

AEDG Implementation Recommendations: Noise Control | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

471

AEDG Implementation Recommendations: Exterior Lighting | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

472

AEDG Implementation Recommendations: Daylighting Good Design...  

NLE Websites -- All DOE Office Websites (Extended Search)

90.1-1999 Document type: AEDG Implementation Recommendations Target Audience: ArchitectDesigner Builder Contractor Engineer State: All States Contacts Web Site Policies...

473

Hazardous Waste Management Implementation Inspection Criteria...  

NLE Websites -- All DOE Office Websites (Extended Search)

and practices used by field orgailizatioils in implementing Integrated Safety Management and to provide clear, concise, and independent evaluations of perfomlance in...

474

NERSC Strategic Implementation Plan 2002-2006  

E-Print Network (OSTI)

Strategic Implementation Plan 2002–2006 Abstract NERSC, the National Energy Research Scientific Computing Center, is DOE’Strategic Proposal approved by DOE in November 2001. The plan

2002-01-01T23:59:59.000Z

475

Successful biomass (wood pellets ) implementation in  

E-Print Network (OSTI)

Successful biomass (wood pellets ) implementation in Estonia Biomass Utilisation of Local in Estonia in 1995 - 2002 Regional Energy Centres in Estonia http://www.managenergy.net/conference/biomass

476

Renewable Energy Institutional Arrangements for Implementation...  

Open Energy Info (EERE)

Organization: World Bank Sector: Energy Focus Area: Solar Topics: Implementation, Market analysis Resource Type: Guidemanual Website: web.worldbank.orgWBSITEEXTERNAL...

477

Specific Administrative Controls Implementation Inspection Criteria...  

NLE Websites -- All DOE Office Websites (Extended Search)

approval and implementation of the SAC. Changes to SAC requirements, documents, and instrumentation and controls and support equipment are designed, reviewed, approved,...

478

End Point Implementation Examples | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Examples End Point Implementation Examples More Documents & Publications Post-Deactivation Surveillance and Maintenance Planning Project Management Plan Examples 1 - 80...

479

The NETL Smart Grid Implementation Strategy (SGIS)  

NLE Websites -- All DOE Office Websites (Extended Search)

SmartGrid.gov Smart Grid Clearinghouse Reference Shelf Subscribe to RSS Feed Contact Us The NETL Smart Grid Implementation Strategy (SGIS) Accelerating the transition to a smart...

480

cMsg - A general purpose, publish-subscribe, interprocess communication implementation and framework  

SciTech Connect

cMsg is software used to send and receive messages in the Jefferson Lab online and runcontrol systems. It was created to replace the several IPC software packages in use with a single API. cMsg is asynchronous in nature, running a callback for each message received. However, it also includes synchronous routines for convenience. On the framework level, cMsg is a thin API layer in Java, C, or C++ that can be used to wrap most message-based interprocess communication protocols. The top layer of cMsg uses this same API and multiplexes user calls to one of many such wrapped protocols (or domains) based on a URL-like string which we call a Uniform Domain Locator or UDL. One such domain is a complete implementation of a publish-subscribe messaging system using network communications and written in Java (user APIs in C and C++ too). This domain is built in a way which allows it to be used as a proxy server to other domains (protocols). Performance is excellent allowing the system not only to be used for messaging but also as a data distribution system.

Carl Timmer; David Abbott; Vardan Gyurjyan; William Heyes; Edward Jastrzembski; Elliott Wolin

2007-09-06T23:59:59.000Z

Note: This page contains sample records for the topic "implementation kyoto protocol" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals  

SciTech Connect

Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (the so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single-photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any externally driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single-photon sources, however, the distance covered by a passive transmitter might be longer than that of an active configuration.

Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo, Pontevedra (Spain); Ma Xiongfeng; Luetkenhaus, Norbert [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, Waterloo, Ontario N2L 3G1 (Canada); Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario M5S 3G4 (Canada)

2010-11-15T23:59:59.000Z

482

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

483

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

484

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

Science Conference Proceedings (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

485

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

486

Formal hardware specification languages for protocol compliance verification  

Science Conference Proceedings (OSTI)

The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project. One of the central tools in any verification project is the modeling language, ... Keywords: Esterel, Heterogeneous Hardware Logic, Hierarchical Annotated Action Diagrams, Java, Lava, Live Sequence Charts, Message Sequence Charts, Objective VHDL, OpenVera, Property Specification Language, SpecC, Specification and Description Language, Statecharts, SystemC, SystemVerilog, The Unified Modeling Language, e, hardware monitors, timing diagrams

Annette Bunker; Ganesh Gopalakrishnan; Sally A. Mckee

2004-01-01T23:59:59.000Z

487

Entanglement Sharing Protocol via Quantum Error Correcting Codes  

E-Print Network (OSTI)

We introduce a new multiparty cryptographic protocol, which we call `entanglement sharing schemes', wherein a dealer retains half of a maximally-entangled bipartite state and encodes the other half into a multipartite state that is distributed among multiple players. In a close analogue to quantum secret sharing, some subsets of players can recover maximal entanglement with the dealer whereas other subsets can recover no entanglement (though they may retain classical correlations with the dealer). We find a lower bound on the share size for such schemes and construct two non-trivial examples based on Shor's $[[9,1,3

Ran Hee Choi; Ben Fortescue; Gilad Gour; Barry C. Sanders

2012-12-18T23:59:59.000Z

488

Implementation Report: Energy Conservation Standards Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation Report: Implementation Report: Energy Conservation Standards Activities Submitted Pursuant to: Section 141 of the Energy Policy Act of 2005 & Section 305 of the Energy Independence and Security Act of 2007 U.S. Department of Energy August 2009 U.S. Department of Energy 2 Table of Contents List of Acronyms ...................................................................................................................................... 3 Introduction .............................................................................................................................................. 4

489

Implementation Report: Energy Conservation Standards Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Implementation Report: Implementation Report: Energy Conservation Standards Activities Submitted Pursuant to: Section 141 of the Energy Policy Act of 2005 & Section 305 of the Energy Independence and Security Act of 2007 U.S. Department of Energy August 2009 U.S. Department of Energy 2 Table of Contents List of Acronyms ...................................................................................................................................... 3 Introduction .............................................................................................................................................. 4

490

A Catalog of Available X.500 Implementations  

Science Conference Proceedings (OSTI)

The goal of this document is to provide information regarding the availability and capability of implementations of X.500. Comments and critiques of this document, and new or updated descriptions of X.500 implementations are welcome. Send them to the Directory ...

R. Lang; R. Wright

1992-01-01T23:59:59.000Z

491

Multistable Circuits for Analog Memories Implementation  

Science Conference Proceedings (OSTI)

In this work two multistable circuits suitable for analog memories implementation will be presented. These circuits have been used to implement completely asynchronous analog memories, one type based on a flash converter and thus having a linear complexity ... Keywords: analog memories, asynchronous converters, successive approximations

Giorgio Biagetti; Massimo Conti; Simone Orcioni

2004-04-01T23:59:59.000Z

492

A general implementation framework for tabled CLP  

Science Conference Proceedings (OSTI)

This paper describes a framework to combine tabling evaluation and constraint logic programming (TCLP). While this combination has been studied previously from a theoretical point of view and some implementations exist, they either suffer from a lack ... Keywords: constraint logic programming, implementation, performance, tabling

Pablo Chico de Guzmán; Manuel Carro; Manuel V. Hermenegildo; Peter Stuckey

2012-05-01T23:59:59.000Z

493

Wind Program: Program Plans, Implementation, and Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Program Wind Program HOME ABOUT RESEARCH & DEVELOPMENT DEPLOYMENT FINANCIAL OPPORTUNITIES INFORMATION RESOURCES NEWS EVENTS EERE » Wind Program » About Key Activities Plans, Implementation, & Results Budget Contacts Plans, Implementation, and Results Here you'll find an overview of the Wind Program and links to its program planning, implementation, and results documents. This list summarizes the program's wind power research, development, and demonstration activities. Read more about: Overview Learn more about this EERE Office. Plans Discover the plans, budgets, and analyses that set the direction of office priorities and activities. Implementation Find out how the office controls, implements, and adjusts its plans and manages its activities. Results Learn about the technological, commercial, and other outputs and outcomes

494

Maintenance implementation plan for fuel supply shutdown  

Science Conference Proceedings (OSTI)

This Maintenance Implementation Plan is written to satisfy the requirements of DOE Order 4330.4B, ``MAINTENANCE MANAGEMENT PROGRAM``, that specifies the general policy and objectives for the establishment of DOE controlled maintenance programs. These Programs provide for the management and performance of cost-effective maintenance and repair of Department of Energy (DOE) property, which includes facilities. A review of DOE Order 4330.4B, particularly Chapter II the nuclear portion, against existing WHC site programs and policies has provided assurance that most requirements of this order have already been implemented by existing WHC programs. Applicable requirements and guidelines of 4330.4B that are deficient or not implemented are presently being developed and implemented through WHC site policies and programs. Where no program is presently identified or being developed for 4330.4B requirements, responsibility for implementation has been assigned within this plan.

Stephenson, R.L.

1995-06-01T23:59:59.000Z

495

Implementing Safeguards-by-Design  

Science Conference Proceedings (OSTI)

Executive Summary Excerpt Safeguards-by-Design (SBD) is an approach to the design and construction of nuclear facilities whereby safeguards are designed-in from the very beginning. It is a systematic and structured approach for fully integrating international and national safeguards (MC&A), physical security, and other proliferation barriers into the design and construction process for nuclear facilities. SBD is primarily a project management or project coordination challenge, and this report focuses on that aspect of SBD. The present report continues the work begun in 2008 and focuses specifically on the design process, or project management and coordination - the planning, definition, organization, coordination, scheduling and interaction of activities of the safeguards experts and stakeholders as they participate in the design and construction of a nuclear facility. It delineates the steps in a nuclear facility design and construction project, in order to provide the project context within which the safeguards design activities take place, describes the involvement of safeguards experts in the design process, the nature of their analyses, interactions and decisions, as well as describing the documents created and how they are used. Designing and constructing a nuclear facility is an extremely complex undertaking. The stakeholders in an actual project are many – owner, operator, State regulators, nuclear facility primary contractor, subcontractors (e.g. instrument suppliers), architect engineers, project management team, safeguards, safety and security experts, in addition to the IAEA and its team. The purpose of the present report is to provide a common basis for discussions amongst stakeholders to collaboratively develop a SBD approach that will be both practically useful and mutually beneficial. The principal conclusions from the present study are: • In the short term, the successful implementation of SBD is principally a project management problem. • Life-cycle cost analysis can be a useful tool in safeguards design. • An important obstacle to straight forward application of life-cycle cost analysis is that there is no single organization responsible for the entire life-cycle cost of the facility. • The Safeguards Effectiveness Report (SGER) is proposed as a focus for the safeguards design activities, and is intended to be a living document that contains increasing safeguards relevant scope and content as the facility design emerges. Further work is required in a number of areas. The authors note that other studies supported by NGSI are addressing the development of requirements and performance criteria, as well as contributing to the design toolkit through the development of technology, methodology, and safeguards guidelines for designers. With respect to further development of the SBD design process, the authors recommend: • In the short term, conduct a workshop with interested industry representatives, to ensure that their perspectives and needs are factored into further development. • In the short term, provide NGSI SBD project documents to IAEA, and support them in the conduct of an ‘SBD Workshop II.” • In the medium term, continue to support the SBD demonstration work started with the Next Generation Nuclear Plant project. • In the longer term, conduct further studies to examine the integration of SBD into projects with concurrent consideration of physical security and safety.

Trond Bjornard; Robert Bean; Phillip Casey Durst; John Hockert; James Morgan

2010-02-01T23:59:59.000Z

496

REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).  

Science Conference Proceedings (OSTI)

Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

2010-01-01T23:59:59.000Z

497

The implementation research institute: training mental health implementation researchers in the United States  

E-Print Network (OSTI)

contribution to IRI training; administrative support frommethodological, and training challenges. Adm Policy Mentresearch institute: training mental health implementation

2013-01-01T23:59:59.000Z

498

The self-describing data sets file protocol and Toolkit  

SciTech Connect

The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user`s preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI.

Borland, M.; Emery, L.

1995-12-31T23:59:59.000Z

499

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

500

Studying the implementation of public programs  

DOE Green Energy (OSTI)

This report describes and critically assesses approaches that have been employed to study the implementation of public programs. Implementation is defined as the process by which new policies and/or practices are installed in organizations. The report was produced because of the increased interest among researchers and policy makers alike in the linkages between policy and outcome. The study of implementation has barely begun, and it was recognized that methodological issues of a particularly complex nature arise because of certain unique characteristics of the implementation processes: (1) they involve a series of decisions that occur over a long period of time, with no clear beginning or end points; (2) their outcomes have direct or indirect implications that are too complex for single-factor theories; (3) they involve a large number of participants; and (4) they involve situations that are rather unique in terms of agency context, historical moment in time, and other key elements. The approach employed in the report was to examine the methods that have been used in a number of exemplary studies of implementation. These studies are commonly cited in publications and informally in research circles. Descriptive material from each study was used to address three questions: (1) How is evidence collected in studies of implementation; (2) How is evidence analyzed; (3) What are the reasons for believing the conclusions from such studies. The report concludes with recomendations for the conduct of future studies of implementation.

Yin, R.K.

1980-02-01T23:59:59.000Z