Sample records for implementation kyoto protocol

  1. The Kyoto Protocol and developing countries

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

    Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

  2. Russia's role in the Kyoto Protocol

    E-Print Network [OSTI]

    Bernard, Alain.

    As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

  3. Kyoto Protocol | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, search GEOTHERMALTexas:Kuju Kanko HotelKwitherbee's blogdoKyoto

  4. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06T23:59:59.000Z

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

  5. The Cost of Kyoto Protocol Targets: The Case of Japan

    E-Print Network [OSTI]

    Paltsev, Sergey.

    This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

  6. A game of climate chicken : can EPA regulate greenhouse gases before the U.S. Senate ratifies the Kyoto Protocol?

    E-Print Network [OSTI]

    Bugnion, Véronique.; Reiner, David M.

    EPA's legal authority to regulate greenhouse gas emissions under the Clean Air Act is reviewed. While EPA clearly does not have the authority to implement the precise terms of the Kyoto Protocol, arguments could be put ...

  7. Multi-Gas Assessment of the Kyoto Protocol John Reilly,*

    E-Print Network [OSTI]

    Multi-Gas Assessment of the Kyoto Protocol John Reilly,* Ronald G. Prinn,* Jochen Harnisch,* Jean in the protocol appear to be an adequate representation of trace gas climatic effects. The principal reason for the success of this simplified GWP approach in our calculations is that the mix of gas emissions resulting

  8. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01T23:59:59.000Z

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  9. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry S.

    A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight Larry Karp University of California, Berkeley Jinhua Zhao Iowa Sate University February 23, 2007 Abstract A reform be designed. We propose a reform to the Kyoto Proto- col that allows signatories to avoid achieving the target

  10. The effects on developing countries of the Kyoto Protocol and CO? emissions trading

    E-Print Network [OSTI]

    Ellerman, A. Denny.; Jacoby, Henry D.; Decaux, Annelène.

    This paper examines the effect of the Kyoto Protocol on developing economies using marginal abatement curves generated by MIT's Emissions Prediction and Policy Assessment model (EPPA). In particular, the paper addresses ...

  11. Impacts of the Kyoto protocol on U.S. energy markets and economic activity

    SciTech Connect (OSTI)

    NONE

    1998-10-01T23:59:59.000Z

    The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

  12. Environmental Science & Policy 5 (2002) 195206 The evolution of a climate regime: Kyoto to

    E-Print Network [OSTI]

    emissions trading. We analyze the costs of implementation and the environmental effectiveness of the Bonn; Kyoto Protocol; Marrakech accords; Emissions trading; Non-CO2 gases 1. Introduction In November 2000

  13. The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny Ellerman, Henry D. Jacoby and Annelne Decaux*

    E-Print Network [OSTI]

    The Effects on Developing Countries of the Kyoto Protocol and CO2 Emissions Trading A. Denny by the scope of CO2 emissions trading, by various limitations that Annex I countries might place on emissions.1 Trade in Goods with No Emissions Trading

  14. Energy Policy 31 (2003) 459481 The costs of the Kyoto Protocol in the European Union

    E-Print Network [OSTI]

    ``flexible mechanisms'' (emission trading, clean development mechanism, and Joint Implementation) in order emissions trading within the European Union'' that proposes to introduce in 2005 an EU trading system be implemented at national level: e.g., emissions trading systems are in the process of being established

  15. Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    E-Print Network [OSTI]

    Sayonnha Mandal; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar; Farnaz Zamani; Yuhua Chen; Subhash Kak; Pramode K. Verma; Robert C Huck; James Sluss

    2012-08-30T23:59:59.000Z

    The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.

  16. Energy Aware Implementation of an Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Brown, Timothy X.

    Energy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B in Telecommunications Department of InterDisciplinary Telecommunications 2003 #12;This thesis entitled: Energy Aware mentioned discipline. #12;iii Scriptor, Shweta Bhandare (M.S., Telecommunications) Energy Aware

  17. additional protocol ratification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gergely 9 An Economic Assessment of the Kyoto Protocol using the Global Trade and Environment Model CiteSeer Summary: Ratification of the Kyoto Protocol will have major...

  18. Japanese nuclear power and the Kyoto agreement

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Reilly, John M.; Ellerman, A. Denny.

    We find that, on an economic basis, nuclear power could make a substantial contribution for meeting the emissions target Japan agreed to in the Kyoto Protocol. It is unlikely however that the contribution would be as large ...

  19. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11T23:59:59.000Z

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  20. Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    , ljilja}@cs.sfu.ca Abstract This paper describes OPNET implementation of the Mobile Application Part (MAP) protocol within the General Packet Radio Service (GPRS) model. MAP represents an application layer protocol residing on top of the Signaling System 7 (SS7) protocol stack. In GPRS networks, MAP protocol supports

  1. INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX

    E-Print Network [OSTI]

    Smith, Spencer

    INSPECTING THE SOURCE CODE THAT IMPLEMENTS THE PPP PROTOCOL IN LINUX By SRDJAN RUSOVAN, B Code that Implements the PPP Protocol in Linux AUTHOR: Srdjan Rusovan, B.Sc. (University of Belgrade: viii, 145 #12;iii ABSTRACT The Point-to-Point Protocol (PPP) is a widely accepted standard used

  2. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14T23:59:59.000Z

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  3. IMPLEMENTING GREENHOUSE GAS TRADING IN EUROPE: LESSONS FROM ECONOMIC LI-

    E-Print Network [OSTI]

    Boyer, Edmond

    trading, climate change policy, policy-making and implementation 4 #12;Introduction Following the Bonn to the European Climate Change Programme (European Commission, 2001b), there is a gap in the range of 6.6% and 8 the Kyoto Protocol. The Protocol will now enter into force if they are joined by Russia. Compliance

  4. The evolution of a climate regime: Kyoto to Marrakech

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.; Jacoby, Henry D.; Reilly, John M.; Reiner, David M.

    At meetings in Bonn and Marrakech in 2001, the Conference of the Parties to the Framework Convention on Climate Change broke through an impasse on the detailed provisions needed to allow the Kyoto Protocol to enter into ...

  5. Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle

    E-Print Network [OSTI]

    Mascolo, Cecilia

    Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi to a clean slate networking approach in the Haggle platform. The remainder of this paper is organised

  6. An implementation of the Gong-Harn Die-Hellman key agreement protocol

    E-Print Network [OSTI]

    Gong, Guang

    An implementation of the Gong-Harn DiÆe-Hellman key agreement protocol Studienarbeit vorgelegt am and used systems, new approaches with better characteris- tics are still being developed. The Gong-Harn (GH; 1 INTRODUCTION 1 1 Introduction In 1998 and 1999, Gong and Harn proposed a new public

  7. Introducing Kyoto University Tradition, Innovation

    E-Print Network [OSTI]

    Takada, Shoji

    in the historical city of Kyoto in 1897, Kyoto University is the second oldest research university in Japan. Today and Development Kyoto University's Mission Statement declares its intention to sustain and develop its historical, and a unique balance is achieved between tradition and innovation. While preserving its rich cultural heritage

  8. REMARKS BY PRESIDENTIAL ECONOMIC ADVISER ANDREI ILLARIONOV AT A PRESS CONFERENCE ON RESULTS OF THE CLIMATE CHANGE AND KYOTO

    E-Print Network [OSTI]

    Fischlin, Andreas

    OF THE CLIMATE CHANGE AND KYOTO PROTOCOL SEMINAR IN MOSCOW The Federal News Service - Official Kremlin Int'l News, and if there is a rise, it has nothing to do with climate change. If there is an insignificant increase have repeatedly asked our foreign partners who advocate the Kyoto Protocol and who insist that Russia

  9. Kyoto Protocol: Enforcement Prohibitions (West Virginia)

    Broader source: Energy.gov [DOE]

    The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the...

  10. Kyoto Protocol Act of 1998 (Illinois)

    Broader source: Energy.gov [DOE]

    Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse...

  11. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect (OSTI)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19T23:59:59.000Z

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP staff and investigate specific ways to improve implementation. Another meeting in July 2011 focused on preparations for outreach to industry and universities. In this paper PNRI describes current implementation of the AP in the Philippines, and both DOE/INSEP and PNRI provide their perspectives on their cooperation to enhance that implementation.

  12. Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman and Annelne Decaux

    E-Print Network [OSTI]

    Analysis of Post-Kyoto CO2 Emissions Trading Using Marginal Abatement Curves A. Denny Ellerman the advantages of emissions trading. In this paper, the authors derive MACs from EPPA, the MIT Joint Program the benefits of emissions trading in achieving the emission reduction targets implied by the Kyoto Protocol

  13. Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-06-12T23:59:59.000Z

    This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, dated 6-27-13, cancels DOE M 142.2-1. Certified 12-3-14.

  14. Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-06-12T23:59:59.000Z

    This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, 6-27-13

  15. Implementation and evaluation of modified dynamic conformal arc (MDCA) technique for lung SBRT patients following RTOG protocols

    SciTech Connect (OSTI)

    Shi, Chengyu, E-mail: shicy1974@gmail.com [St. Vincent's Medical Center, Bridgeport, CT (United States); Tazi, Adam; Fang, Deborah Xiangdong; Iannuzzi, Christopher [St. Vincent's Medical Center, Bridgeport, CT (United States)

    2013-10-01T23:59:59.000Z

    To implement modified dynamic conformal arc (MDCA) technique and Radiation Therapy Oncology Group (RTOG) protocols in our clinic for stereotactic body radiation therapy (SBRT) treatment of patients with Stage I/II non–small cell lung cancer. Five patients with non–small cell lung cancer have been treated with SBRT. All the patients were immobilized using CIVCO Body Pro-Lok system and scanned using GE 4-slice computed tomography. The MDCA technique that was previously published was adopted as our planning technique, and RTOG protocols for the lung SBRT were followed. The patients were treated on Novalis Tx system with cone-beam computed tomography imaging guidance. All the patient plans passed the RTOG criteria. The conformal index ranges from 0.99 to 1.12 for the planning target volume, and the biological equivalent dose for the planning target volume is overall 100 Gy. Critical structures (lung, spinal cord, brachial plexus, skin, and chest wall) also meet RTOG protocols or published data. A 6-month follow-up of one of the patients shows good local disease control. We have successfully implemented the MDCA technique into our clinic for the lung SBRT program. It shows that the MDCA is useful and efficient for the lung SBRT planning, with the plan quality meeting the RTOG protocols.

  16. GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols

    E-Print Network [OSTI]

    Pu, Shi

    2013-11-25T23:59:59.000Z

    resources to handle the encryption-decryption operations. In this dissertation, we study optimal utilization of computing resources on the graphic processor unit (GPU) architecture for privacy-preserving protocols based on secure function evaluation (SFE...

  17. Implementing XNS Protocols for 4.2bsd James O'Toole

    E-Print Network [OSTI]

    Gifford, David K.

    interface code, which were eliminated by * *replacing inline code with protocol specific subroutine stream, and the XNS stream le* *vel is neither. We generalized the socket code to satisfy, and are the primary means of intermachine communication in use in the department today. The* * Xerox PARC Universal

  18. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science Asian and African Area Studies Informatics Biostudies Global Environmental Studies. The main campus is located in the historic city of Kyoto, a center of traditional Japanese culture. Since

  19. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 137 103 - - 19 27 Asian and African Area Studies - - - 55 - - 29 20 Informatics a long history and enduring traditions. The main campus is located in the historic city of Kyoto

  20. KYOTO UNIVERSITY ADMISSIONS GUIDE for INTERNATIONAL APPLICANTS

    E-Print Network [OSTI]

    Takada, Shoji

    Energy Science - - 117 98 - - 16 22 Asian and African Area Studies - - - 21 - - 36 13 Informatics - - 182 city of Kyoto, a center of traditional Japanese culture. Since its founding, the University has been

  1. Copyright 2009 IEICE EMC'09/Kyoto

    E-Print Network [OSTI]

    Koledintseva, Marina Y.

    809 Copyright © 2009 IEICE EMC'09/Kyoto Modelling of Absorbing Material Containing Magnetic Platelets Marina Y. Koledintseva#1 , James L. Drewniak#2 , Yongxue He*3 , and Bill Matlin*4 # EMC Laboratory

  2. fter 8 days of fractious negotiating, delegates at the 1997 climate conference in Kyoto, Japan, were running out of

    E-Print Network [OSTI]

    Toohey, Darin W.

    expectations, the delegates bor- rowed heavily from past treaties, including a US­Soviet nuclear-arms agreement-night session, the negotiators finally hammered out the climate agreement known as the Kyoto Protocol and other greenhouse gases. But even before the ink was dry on the agreement, it was clear

  3. Who benefits from the US withdrawal of the Kyoto protocol?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    gases. This convention, called the United Nations Framework Convention on Climate Change (UNFCCC and that Japan and Russia benefited from the United States withdrawal (in term of a priori decisional power). Key-made) interference with the climate system". The UNFCCC is the governing body for international negotiations

  4. he Kyoto Protocol is a symbolically important expression of governments'

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    with stratospheric ozone depletion, acid rain from sulphur emissions and nuclear weapons. Drawing on these plausible in carbon dioxide by allowing countries to buy and sell their agreed allowances of emissions

  5. Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

    E-Print Network [OSTI]

    Armand Niederberger; Valerio Scarani; Nicolas Gisin

    2005-04-15T23:59:59.000Z

    In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.

  6. Fostering the Next Generation Kyoto University launched the John Mung Program* (Kyoto University Young Scholars

    E-Print Network [OSTI]

    Takada, Shoji

    generation, now Opening the door to the next generation with nanocarbon materials. NANO-MAT Graphene.iae.kyoto-u.ac.jp/molecule/index.html Structures of graphene nanoribbons (GNRs). *The program is named after the Japanese sailor, Nakahama Manjir

  7. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    ............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

  8. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Interpretation .................................... 20 Transportation in Kyoto City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University "kokoka" Kyoto International

  9. Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan

    E-Print Network [OSTI]

    Dettweiler, Michael

    Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan Foto mit freundlicher Genehmigung des Primate Research Institute, Kyoto University, Japan Samstag . . , H FAN

  10. News Letter Institute of Advanced Energy, Kyoto University

    E-Print Network [OSTI]

    Takada, Shoji

    . Abstract definition of energy consists of two parts: Energy = Exergy +Anergy Exergy is a part of energyNews Letter Institute of Advanced Energy, Kyoto University ISSN 1342-3193 IAE-NL-2014 No.54 http -- 2,709 2013 2013 Institute of Advanced Energy, Kyoto University #12; 25 25 11 20

  11. Multicast multilayer videoconferencing: enhancement of a multilayer codec and implementation of the receiver driven layered multicast protocol

    E-Print Network [OSTI]

    Gholmieh, Ralph Akram

    1997-01-01T23:59:59.000Z

    videoconferencing implementations send video and audio in a monolithic stream with an adaptive rate. In one-to-many sessions, the available end-to-end bandwidth between the source and a receiver might sharply differ from one end-user to another. It is clear that one...

  12. Kyoto University has launched a Japan-Thailand collaborative research

    E-Print Network [OSTI]

    Takada, Shoji

    and efficient utilization of low-rank coals as well as increased use of biomass will help to reduce CO2 emission Japanese researchers from Kyoto University, Akita University, the Central Research Institute for Electric

  13. Carbon emissions and the Kyoto commitment in the European Union

    E-Print Network [OSTI]

    Viguier, Laurent L.; Babiker, Mustafa H.M.; Reilly, John M.

    We estimate reference CO? emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO? emissions ...

  14. http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html

    E-Print Network [OSTI]

    2011 P6 http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html web #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html () ( #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html X MeV X Astro-H 2013 TeV10m) #12;http://www-cr.scphys.kyoto-u.ac.jp/gakubu/P6.html 2010 ASTRO-H CCD X (2) () (2) (2

  15. KYOTO UNIVERSITYKYOTO UNIVERSITY Handbook for International ResearchersHandbook for International Researchers

    E-Print Network [OSTI]

    Takada, Shoji

    ............................................. 16 Electricity Gas Water Trash Collection Opening an Account Cell Phones Recycle Flea Market Other City Driver's License Bicycles Road Restrictions 6. Education Education ............... 26 The International Center, Kyoto University Kyoto International Community House

  16. Workshop on job and worker flows 15-16 November 2012, Kyoto

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Workshop on job and worker flows 15-16 November 2012, Kyoto WORKER FLOWS AND ESTABLISHMENT WAGE attributable to the authors. hal-00833872,version1-13Jun2013 Author manuscript, published in "Workshop on job and worker flows, Kyoto : Japan (2012)" #12;Workshop on job and worker flows, 15-16 November 2012, Kyoto

  17. Ris-R-1405(EN) Energy Technologies for Post Kyoto

    E-Print Network [OSTI]

    Risø-R-1405(EN) Energy Technologies for Post Kyoto Targets in the Medium Term Proceedings Risø and trends in energy technologies which may become main contributors to the energy scene in 15 to 20 years Session 7 Session 1: Global or Regional Scenarios and Technology Prospects 15 Session 2: Energy

  18. Implementation of optimum solar electricity generating system

    SciTech Connect (OSTI)

    Singh, Balbir Singh Mahinder, E-mail: balbir@petronas.com.my; Karim, Samsul Ariffin A., E-mail: samsul-ariffin@petronas.com.my [Department of Fundamental and Applied Sciences, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia); Sivapalan, Subarna, E-mail: subarna-sivapalan@petronas.com.my [Department of Management and Humanities, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia); Najib, Nurul Syafiqah Mohd; Menon, Pradeep [Department of Electrical and Electronics Engineering, Universiti Teknologi PETRONAS, 31750 Bandar Seri Iskandar, Perak (Malaysia)

    2014-10-24T23:59:59.000Z

    Under the 10{sup th} Malaysian Plan, the government is expecting the renewable energy to contribute approximately 5.5% to the total electricity generation by the year 2015, which amounts to 98MW. One of the initiatives to ensure that the target is achievable was to establish the Sustainable Energy Development Authority of Malaysia. SEDA is given the authority to administer and manage the implementation of the feed-in tariff (FiT) mechanism which is mandated under the Renewable Energy Act 2011. The move to establish SEDA is commendable and the FiT seems to be attractive but there is a need to create awareness on the implementation of the solar electricity generating system (SEGS). In Malaysia, harnessing technologies related to solar energy resources have great potential for implementation. However, the main issue that plagues the implementation of SEGS is the intermittent nature of this source of energy. The availability of sunlight is during the day time, and there is a need for electrical energy storage system, so that there is electricity available during the night time as well. The meteorological condition such as clouds, haze and pollution affects the SEGS as well. The PV based SEGS is seems to be promising electricity generating system that can contribute towards achieving the 5.5% target and will be able to minimize the negative effects of utilizing fossil fuels for electricity generation on the environment. Malaysia is committed to Kyoto Protocol, which emphasizes on fighting global warming by achieving stabilization of greenhouse gas concentrations in the atmosphere at a level that would prevent dangerous anthropogenic interference with the climate system. In this paper, the technical aspects of the implementation of optimum SEGS is discussed, especially pertaining to the positioning of the PV panels.

  19. Non-Kyoto Radiative Forcing in Long-Run Greenhouse Gas Emissions and Climate Change Scenarios

    SciTech Connect (OSTI)

    Rose, Steven K.; Richels, Richard G.; Smith, Steven J.; Riahi, Keywan; Stefler, Jessica; Van Vuuren, Detlef

    2014-04-27T23:59:59.000Z

    Climate policies designed to achieve climate change objectives must consider radiative forcing from the Kyoto greenhouse gas, as well as other forcing constituents, such as aerosols and tropospheric ozone. Net positive forcing leads to global average temperature increases. Modeling of non-Kyoto forcing is a relatively new component of climate management scenarios. Five of the nineteen models in the EMF-27 Study model both Kyoto and non-Kyoto forcing. This paper describes and assesses current non-Kyoto radiative forcing modeling within these integrated assessment models. The study finds negative forcing from aerosols masking significant positive forcing in reference non-climate policy projections. There are however large differences across models in projected non-Kyoto emissions and forcing, with differences stemming from differences in relationships between Kyoto and non-Kyoto emissions and fundamental differences in modeling structure and assumptions. Air pollution and non-Kyoto forcing decline in the climate policy scenarios. However, non-Kyoto forcing appears to be influencing mitigation results, including allowable carbon dioxide emissions, and further evaluation is merited. Overall, there is substantial uncertainty related to non-Kyoto forcing that must be considered.

  20. Implementing CDM projects Guidebook to Host Country Legal Issues

    E-Print Network [OSTI]

    University of Denmark, or Baker & McKenzie. This report is intended as a public resource for stakeholders undertaking activities that reduce greenhouse gas emissions, whether under the Kyoto Protocol's Clean Development Mechanism or other market-based instruments for carbon trading. While this guidebook provides

  1. acids extraction protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  2. aureus decolonisation protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  3. addfam study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  4. antineoplastic combined chemotherapy protocols: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  5. afinos study protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  6. agrobacterium-mediated transformation protocol: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  7. antineoplastic protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  8. Toward a Post-Kyoto Climate Change Architecture: A Political Analysis

    E-Print Network [OSTI]

    Raustiala, Kal; Keohane, Robert O.

    2009-01-01T23:59:59.000Z

    FOR INTERNATIONAL GHG EMISSIONS TRADING (2000), http://al. , International Emissions Trading Rules as a Compliancethe Economic Benefits of Emissions Trading Under the Kyoto

  9. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    2 8 During the mid-year G8 summit in 2009, the majorsee supra note 26. (last 29. James Kirkup, G8 summit: Chinaand India Reject G8 Calls for Climate Targets, TELEGRAPH,

  10. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    installing 1,000 MW of coal power generation each week andof electricity generation is fueled by coal. Id. 121. Id.with coal-fired electric power generation 8 accounting for

  11. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    electricity demand and utilize predominately fossil-fuelsworld demand for energy will grow by 60% and fossil fuelfossil fuels, not renewable power exponential increase in demand."

  12. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    Progress on Post-2012 Emissions Trading Scheme, 39 ENV'T R!European Union's emissions trading scheme, which providesTHE EUROPEAN UNION'S EMISSIONS TRADING SCHEME AND TilE KYoT-

  13. A Proposal to Reform the Kyoto Protocol: the Role of Escape Clauses and Foresight

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2007-01-01T23:59:59.000Z

    size of its associated IEA, rather than by the identities ofM j+1 are the same type of IEA, and were they are differentM 1 ). Consequently, at any IEA M j , j < k, a group of M k

  14. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    a model for successfully shifting to a renewable power baserenewable power alternatives. The successful demonstrated modelrenewable energy power projects. Fortunately, the proven model

  15. Cubing the Kyoto Protocol: Post-Copenhagen Regulatory Reforms to Reset the Global Thermostat

    E-Print Network [OSTI]

    Ferrey, Steven

    2010-01-01T23:59:59.000Z

    Global Boom in Coal Power-and Emissions, CHISm- "IAN ScI.those emissions-particularly with coal-fired electric power

  16. Protocols and quantum circuits for implementing entanglement concentration in cat state, GHZ-like state and 9 families of 4-qubit entangled states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2014-03-27T23:59:59.000Z

    Three entanglement concentration protocols (ECPs) are proposed. The first ECP and a modified version of that are shown to be useful for the creation of maximally entangled cat and GHZ-like states from their non-maximally entangled counterparts. The last two ECPs are designed for the creation of maximally entangled $(n+1)$-qubit state $\\frac{1}{\\sqrt{2}}\\left(|\\Psi_{0}\\rangle|0\\rangle+|\\Psi_{1}\\rangle|1\\rangle\\right)$ from the partially entangled $(n+1)$-qubit normalized state $\\alpha|\\Psi_{0}\\rangle|0\\rangle+\\beta|\\Psi_{1}\\rangle|1\\rangle$, where $\\langle\\Psi_{1}|\\Psi_{0}\\rangle=0$ and $|\\alpha|\

  17. Kyoto University Libraries Reference Guide Ver.1.1 2012.11.1 Information Services Division of Main Library

    E-Print Network [OSTI]

    Takada, Shoji

    Library New Arrival Alert (Serials Alert) 4 You can select the material types and holding libraries. 5 1Kyoto University Libraries Reference Guide 1 Ver.1.1 2012.11.1 Information Services Division of Main Library Kyoto University MyKULINE is... A web library that be customized for every Kyoto

  18. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  19. Greetings from Kyoto-U SPRING 2009 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    high energy physics paper of all time as of 2006. The university's GCOE program (see Special Feature of administration: while it belongs to Kyoto University, its administration policies are decided by a steering

  20. Adaptive best effort protocols for video delivery

    E-Print Network [OSTI]

    Madhwaraj, Ashwin Raj

    1998-01-01T23:59:59.000Z

    This thesis describes the design and implementation of ics. transport level protocols running on top of the IP layer to transmit video data over packet switched networks. These protocols address the issues of meeting real-time deadlines of the video...

  1. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  2. addition-cambridge trial protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  3. anesthesia gas-guided protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    extensions, while the more complex of these protocols are expensive to implement on SCADA host systems, and are difficult (if not impossible) to implement on older and slower...

  4. adult wistar kyoto: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

  5. association isaga kyoto: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

  6. applications kyoto japan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    targets for Japan, Canada, and Russia, and provision of access to unrestricted emissions trading. We analyze the costs of implementation and the environmental effectiveness of...

  7. http://www.ms.u-tokyo.ac.jp/~yasuyuki/rims2011.htm April 1, 2011 March 31, 2012 RIMS, Kyoto University, Japan

    E-Print Network [OSTI]

    Kawahigashi, Yasuyuki

    University, Japan M. Izumi (Kyoto University),Y. Kawahigashi (University of Tokyo), H. Matui (Chiba) Organized by: September 5 - 9, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: N. Brown, M. Dadarlat and Mathematical Physics December 7 - 16, 2011 (RIMS, Kyoto University, Japan) Invited Speakers: J. Cuntz, D

  8. Adaptive RTT-driven Transport-layer Flow and Error Control Protocol for QoS Guaranteed Image Transmission over Multi-hop Underwater Wireless Networks: Design, Implementation, and Analysis

    E-Print Network [OSTI]

    Li, Jiahao

    2013-12-09T23:59:59.000Z

    With the rapid advances in data transmission over various advanced underwater acoustic networks, it is important to develop the efficient protocol to obtain a high data-rate with Quality of Service (QoS) guarantee requirements for acoustic wireless...

  9. China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT

    E-Print Network [OSTI]

    Columbia University

    China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700

  10. IFSA, Kyoto, Japan, September 2001 1 Dry Chamber Wall Thermo-Mechanical Behavior

    E-Print Network [OSTI]

    Raffray, A. René

    assessment of dry chamber wall [6] based on ion and photon spectra from new direct-drive target from NRL [3 for an Example Case Without a Protective Chamber Gas #12;IFSA, Kyoto, Japan, September 2001 8 Photon and Ion Time of Temporal Distribution for Photons and Ions Based on Direct Drive Spectrum and 6.5 m Chamber without

  11. Greetings from Kyoto-U AUTUMN 2007 C O N T E N T S

    E-Print Network [OSTI]

    Takada, Shoji

    and Kihachiro Okura, who were leading businessmen in Japan of the time, and was Japan's largest textile factory, incorporating the latest European technology. At the time, as the relocation of the capital to Tokyo had caused Kyoto to begin losing its vitality, advanced industrial technologies were being introduced to the city

  12. University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University

    E-Print Network [OSTI]

    Takada, Shoji

    1 / 3 University Research Administrator (URA) position availability Yoshida-South campus, Kyoto University 24 10 1 1 October 2012 Job title University Research Administrator (URA) Number 1 One network. Please note that the candidate is expected to mainly use English in the workplace, carrying out

  13. Kyoto University Libraries Reference Guide 1. Compare the reference style of books and journals

    E-Print Network [OSTI]

    Takada, Shoji

    Kyoto University Libraries Reference Guide 1. Compare the reference style of books and journals Ex Publisher Year of Publications Pages Ex.3) The basic style of journal articles Fidel, Raya; Green, Maurice -Distinguishing kinds of documents- Ver.1.1, 2008.03.26, Yumi Sugimoto (Eng.Arch.Library), Ver.2.0, 2014

  14. Kyoto University Library Reference Guide What is an E-Journal?

    E-Print Network [OSTI]

    Takada, Shoji

    read the newest article as soon as it is made available. You can read them at a laboratory or a Media Center PC even without going to the library. There are many links to related articles, cited articles, especially international academic journals held at Kyoto University. We hold with a lot of e-journals about

  15. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  16. Role of Bioenergy in the Kyoto Protocol, in the EU-ETS and in future Climate Agreements

    E-Print Network [OSTI]

    of bioenergy use through: Internal emission reductions within the Greenhouse Gas capped sectors Offsetting/CDM CDM project pipeline: > 1000 projects of which: Registered projects: 334 Expected CERs (from RISOE Distribution of projects Bioenergy #12;The EU-ETS and biomass (1) In January 2005 the European

  17. A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features

    E-Print Network [OSTI]

    Sandeep Mishra; Chitra Shukla; Anirban Pathak; R. Srikanth; Anu Venugopalan

    2014-09-06T23:59:59.000Z

    Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.

  18. THE RIMINI PROTOCOL Oil Depletion Protocol

    E-Print Network [OSTI]

    Keeling, Stephen L.

    Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict During the Second Half of the Age of Oil As proposed at the 2003 Pio Manzu Conference

  19. Application Protocol Reference Architecture Application Protocol Reference Architecture

    E-Print Network [OSTI]

    van Sinderen, Marten

    Application Protocol Reference Architecture 165 Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference architecture consists of the set of possible architectures for application protocols

  20. Webinar: Hydrogen Refueling Protocols

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled, Hydrogen Refueling Protocols, originally presented on February 22, 2013.

  1. Kyoto & Kyoto University Kyoto: A Heartland

    E-Print Network [OSTI]

    Takada, Shoji

    . It was also where the first hydroelectric power plant and tram system were developed, and the location

  2. Device-independent entanglement-based Bennett 1992 protocol

    E-Print Network [OSTI]

    Marco Lucamarini; Giuseppe Vallone; Ilaria Gianani; Giovanni Di Giuseppe; Paolo Mataloni

    2012-10-05T23:59:59.000Z

    In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.

  3. Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou NewKorea Parts andKunshan HenghuiKyoto: Think

  4. APS Protocol for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material...

  5. Implementation Applications

    E-Print Network [OSTI]

    Kazhdan, Michael

    ;Outline Theory Implementation Applications Background Intuition Definition Delaunay Triangulation Shape-Dimensional Shapes #12;Outline Theory Implementation Applications Background Intuition Definition Delaunay;Outline Theory Implementation Applications Background Intuition Definition Delaunay Triangulation Shape

  6. Light storage protocols in Tm:YAG

    E-Print Network [OSTI]

    T. Chanelière; R. Lauro; J. Ruggiero; J. -L. Le Gouët

    2009-11-17T23:59:59.000Z

    We present two quantum memory protocols for solids: A stopped light approach based on spectral hole burning and the storage in an atomic frequency comb. These procedures are well adapted to the rare-earth ion doped crystals. We carefully clarify the critical steps of both. On one side, we show that the slowing-down due to hole-burning is sufficient to produce a complete mapping of field into the atomic system. On the other side, we explain the storage and retrieval mechanism of the Atomic Frequency Comb protocol. This two important stages are implemented experimentally in Tm$^{3+}$- doped yttrium-aluminum-garnet crystal.

  7. Remote implementations of partially unknown quantum operations of multiqubits

    E-Print Network [OSTI]

    An Min Wang

    2006-10-13T23:59:59.000Z

    We propose and prove the protocol of remote implementations of partially unknown quantum operations of multiqubits belonging to the restricted sets. Moreover, we obtain the general and explicit forms of restricted sets and present evidence of their uniqueness and optimization. In addition, our protocol has universal recovery operations that can enhance the power of remote implementations of quantum operations.

  8. Kyoto Workshop

    Broader source: Energy.gov (indexed) [DOE]

    and the inert gas environment are programmed and precisely controlled * Custom tooling insert made of graphite to hold the devices and substrate in place as shown *...

  9. AN INTERACTIVE SPIRES PLOT PROTOCOL

    E-Print Network [OSTI]

    Cerny, Barbara

    2013-01-01T23:59:59.000Z

    LBL-11068 AN INTERACTIVE SPIRES PLOT PROTOCOL Barbara Cerny,11068 PLOT PROTOCOL AN INTERACTIVE by Barbara Cerny, Geraldit gives immediate interactive plots that can be displayed

  10. The Kyoto University Research Administration office (KURA) was established to perform a function that is still not widely known

    E-Print Network [OSTI]

    Takada, Shoji

    -Program for World-Leading Innovative R&D on Science and Technology" called "FIRST Program" is one of them. The total that is still not widely known in Japan. After the establishment of KURA, Kyoto University has been engaged and Technology (MEXT) to further reinforce such initiatives. To achieve top-level research activities and high

  11. Proceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto, Japan

    E-Print Network [OSTI]

    pressure drop and reduced heat transfer to the reaction zone. KEY WORDS: Solar energy, Carbon emission combustion as the process heat for calcination. Shimizu et al. performed a thermodynamic analysis on a pairProceedings of the 15th International Heat Transfer Conference, IHTC-15 August 10-15, 2014, Kyoto

  12. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  13. Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, and Myungchul Kim

    E-Print Network [OSTI]

    Lee, Ben

    Automatic Test Case Generation Using Multi-protocol Test Method Soo-in Lee, Yongbum Park, mckim}@icu.ac.kr Abstract - A method for testing multi-protocol implementation under test (IUT) with a single test suite has been proposed in the literature. It tests a multi-protocol IUT in an integrated way

  14. White Paper: A Survey of 3D Sync IR Protocols

    E-Print Network [OSTI]

    )..............................................................................................12 Sony Protocol (Standalone emitter

  15. Hydrogen Refueling Protocols Webinar (Text Version) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Protocols Webinar (Text Version) Hydrogen Refueling Protocols Webinar (Text Version) Below is the text version of the webinar titled "Hydrogen Refueling Protocols,"...

  16. A Protocol for Disaster Data Evacuation Tilmann Rabl, Florian Stegmaier, Mario Dller, and The Tong Vang

    E-Print Network [OSTI]

    Hammerton, James

    send proto- col (DFSP), a new bulk data transfer protocol. It employs striping to dynamic intermediate is im- portant. Therefore, an enhanced version, the Dynamic Fast Send Protocol (DFSP), has been implemented which over- comes the identified weaknesses. DFSP comprises a novel Copyright is held

  17. Design and Implementation of Physical Layer Network Coding Protocols

    E-Print Network [OSTI]

    Maduike, Dumezie K.

    2010-10-12T23:59:59.000Z

    There has recently been growing interest in using physical layer network coding techniques to facilitate information transfer in wireless relay networks. The physical layer network coding technique takes advantage of the additive nature of wireless...

  18. Implementing the Locator/ID Separation Protocol: Design and Experience

    E-Print Network [OSTI]

    Bonaventure, Olivier

    incrementally deployable, hence, falling in the category of dirty-slate approaches. OpenLISP is not a merely approach is of- ten described as the dirty slate approach (in opposition to the clean slate revolutionary

  19. A Self-Healing Load Balancing Protocol and Implementation

    E-Print Network [OSTI]

    Vetter, Thomas

    everywhere in networking; there are network services where we can relax the level of certainty number of interconnected packet queues, scheduled by deterministic algorithms [19]. In CNPs we can molecular type, that are interconnected by reaction rules. The rules may compete for the same type, akin

  20. Nevada State Protocol Agreement for Implementing the National Historic

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall, Pennsylvania: EnergyEnergyPPCR) JumpAirWork (Water

  1. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2007-02-16T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

  2. Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

    E-Print Network [OSTI]

    Canetti, Ran

    2006-06-20T23:59:59.000Z

    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

  3. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  4. A Program Logic for Verifying Secure Routing Protocols

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    protocol implementations; and thus, both verifica- tion and empirical evaluation of secure routing based on SANDLog specification and ran the code in simulation. 1 Introduction In recent years, we have, evaluated primarily experimentally, and their security properties shown via informal reasoning. Existing

  5. Internet Control Message Protocol The Context

    E-Print Network [OSTI]

    1 1 Internet Control Message Protocol ICMP 2 The Context IP-Related Protocol: ICMP TCP/IP Protocol Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) is used by routers is a separate protocol that sits above IP and uses IP to transport messages In practice, ICMP is an integral

  6. Is international emissions trading always beneficial?

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.

    Economic efficiency is a major argument for the inclusion of an international emission permit trading system under the Kyoto Protocol. Using a partial equilibrium framework, energy system models have shown that implementing ...

  7. Climate Change Taxes and Energy Efficiency in Japan

    E-Print Network [OSTI]

    Kasahara, Satoru.

    In 2003 Japan proposed a Climate Change Tax to reduce its CO2 emissions to the level required by the Kyoto Protocol. If implemented, the tax would be levied on fossil fuel use and the revenue distributed to several sectors ...

  8. Supplementarity : an invitation to monopsony?

    E-Print Network [OSTI]

    Ellerman, A. Denny.; Sue Wing, Ian.

    Article 17 of the Kyoto Protocol allows Annex B parties to meet their commitments by trading greenhouse gas emissions reductions "supplemental" to domestic emissions control. We demonstrate that implementing supplementarity ...

  9. The safety valve and climate policy

    E-Print Network [OSTI]

    Jacoby, Henry D.; Ellerman, A. Denny.

    In discussions of a cap-and-trade system for implementation of Kyoto Protocol-type quantity targets, a "safety valve" was proposed where, by government sales of emissions permits at a fixed price, the marginal cost of the ...

  10. Protocols for Authorized Release of Concrete

    SciTech Connect (OSTI)

    Smith, Agatha Marie; Meservey, Richard Harlan; Chen, S.Y.; Powell, James Edward; PArker, F.

    2000-06-01T23:59:59.000Z

    Much of the clean or slightly contaminated concrete from Decontamination and Decommissioning (D&D) activities could be re-used. Currently, there is no standardized approach, or protocol, for managing the disposition of such materials. Namely, all potential disposition options for concrete, including authorized release for re-use, are generally not fully evaluated in D&D projects, so large quantities have been unduly disposed of as low-level radioactive waste. As a result, costs of D&D have become prohibitively high, hindering expedient cleanup of surplus facilities. The ability to evaluate and implement the option of authorized release of concrete from demolition would result in significant cost savings, while maintaining protection of environmental health and safety, across the Department of Energy (DOE) complex. The Idaho National Engineering and Environmental Laboratory (INEEL), Argonne National Laboratory East (ANL-E), and Vanderbilt University have teamed to develop a protocol for the authorized release of concrete, based on the existing DOE guidance of Order 5400.5, that applies across the DOE complex. The protocol will provide a streamlined method for assessing risks and costs, and reaching optimal disposal options, including re-use of the concrete within the DOE system.

  11. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25T23:59:59.000Z

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  12. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  13. Mensuration protocol National Forest Inventory

    E-Print Network [OSTI]

    NFI: Mensuration protocol for the National Forest Inventory June 2010 E. D. Mackie, R. W. Matthews and A. Brewer1 FR Biometrics Division 1 IFOS, Forestry Commission #12;National Forest Inventory (NFI or square boundary. In the case of a section 2 #12;National Forest Inventory (NFI): Mensuration Protocol

  14. Analyzing the Dynamics of Chemical Networking Protocols

    E-Print Network [OSTI]

    Vetter, Thomas

    from several well-established fields, such as model linearization proposed in Metabolic Control congestion control protocol and highlight formerly unknown protocol features. Keywords: dynamic analysis;1 Introduction Predicting and controlling the dynamics of communication protocols are difficult but important

  15. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  16. Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses

    E-Print Network [OSTI]

    Marcos Curty; Norbert Lütkenhaus

    2005-02-20T23:59:59.000Z

    Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

  17. Modular approaches to statistical optimization: software development and implementation

    E-Print Network [OSTI]

    Meyer, Barry Dean

    1990-01-01T23:59:59.000Z

    LIBRARY FOR DEVELOPING IPC APPLICATIONS 44 A B r, D E F Introduction Design Goals IPC Library Implementation . . Client Authorization Approach to Protocol Implementation . Conclusion 44 44 45 48 49 50 VII APPLICATIONS L SING THE IPC I... covers systems developed to da, te. B. Overview of Circuit Optimization Systems Several approaches to integrated circuit design and optimiza. tion using an interactive environment have been developed iil]. The ICD i2j system implemented an interactive...

  18. Robust multipartite multilevel quantum protocols

    SciTech Connect (OSTI)

    Nihira, Hideomi; Stroud, C.R. Jr. [The Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

    2005-08-15T23:59:59.000Z

    We present a quantum protocol utilizing a tripartite three-level state. The state used in this scheme contains entanglement even after one system is traced out and as a result can be used for both a secret-sharing protocol among the three parties and a quantum-key-distribution protocol between any two parties. We show how to utilize this residual entanglement for quantum-key-distribution purposes, and explore a possible realization of the scheme using entanglement of orbital-angular-momentum states of photons.

  19. Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    Brown, Timothy X.

    1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc- demand minimum energy routing protocol and suggests mechanisms for their implementation. We highlight of an 'energy aware' link cache for storing this information. We also compare the performance of an on-demand

  20. Remote implementation of partially unknown operations and its entanglement costs

    E-Print Network [OSTI]

    Shu-Hui Luo; An-Min Wang

    2013-01-24T23:59:59.000Z

    We present the generalized version of Wang's protocol[A.M.Wang, Phys.Rev.A 74,032317 (2006)] for the remote implementation(sometimes referred to as quantum remote control) of partially unknown quantum operations. The protocol only requires no more than half of the entanglements used in Bidirectional Quantum State Teleportation. We also propose a protocol for another form of quantum remote control. It can remotely implement a unitary operation which is a combination of the projective representations of a group. Moreover, we prove that the Schmidt rank of the entanglements cannot not be less than the number of controlled parameters of the operations, which for the first time gives a lower bound on entanglement costs in remote implementation of quantum operations.

  1. PSiL?LC: an architecture for logical link control protocol processing 

    E-Print Network [OSTI]

    Mak, Albert Ho Kee

    1992-01-01T23:59:59.000Z

    in relation to the MAC frame SAP & Link Station association Message transfer in a Connect in operation The PSi architecture The PSi LLC architecture LLC sub-layer implemented using Connection Processors Data path in PSi LLC, Simplified PSi LLC... in the protocol stack communicate by passing messages via specific Service Access Points (SAPs). Communications between two neighboring layers are transparent to the two layers above and below [2]. The aim of the OSI protocol is to provide an open environment...

  2. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    SciTech Connect (OSTI)

    Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

    2012-06-18T23:59:59.000Z

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  3. Beyond the Goldenberg-Vaidman protocol: Secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states

    E-Print Network [OSTI]

    Chitra Shukla; Anirban Pathak; R. Srikanth

    2012-10-09T23:59:59.000Z

    It is shown that maximally efficient protocols for secure direct quantum communications can be constructed using any arbitrary orthogonal basis. This establishes that no set of quantum states (e.g. GHZ states, W states, Brown states or Cluster states) has an advantage over the others, barring the relative difficulty in physical implementation. The work provides a wide choice of states for experimental realization of direct secure quantum communication protocols. We have also shown that this protocol can be generalized to a completely orthogonal state based protocol of Goldenberg-Vaidman (GV) type. The security of these protocols essentially arises from duality and monogamy of entanglement. This stands in contrast to protocols that employ non-orthogonal states, like Bennett-Brassard 1984 (BB84), where the security essentially comes from non-commutativity in the observable algebra.

  4. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  5. Library Protocol Safety and Security

    E-Print Network [OSTI]

    Oxford, University of

    Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

  6. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  7. Experimental study on the thorium-loaded accelerator-driven system at the Kyoto Univ. critical assembly

    SciTech Connect (OSTI)

    Pyeon, C. H.; Yagi, T.; Lim, J. Y.; Misawa, T. [Nuclear Science Engineering Div., Research Reactor Inst., Kyoto Univ., Asashiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

    2012-07-01T23:59:59.000Z

    The experimental study on the thorium-loaded accelerator-driven system (ADS) is conducted in the Kyoto Univ. Critical Assembly (KUCA). The experiments are carried out in both the critical and subcritical states for attaining the reaction rates of the thorium capture and fission reactions. In the critical system, the thorium plate irradiation experiment is carried out for the thorium capture and fission reactions. From the results of the measurements, the thorium fission reactions are obtained apparently in the critical system, and the C/E values of reaction rates show the accuracy of relative difference of about 30%. In the ADS experiments with 14 MeV neutrons and 100 MeV protons, the subcritical experiments are carried out in the thorium-loaded cores to obtain the capture reaction rates through the measurements of {sup 115}In(n, {gamma}){sup 116m}In reactions. The results of the experiments reveal the difference between the reaction rate distributions for the change in not only the neutron spectrum but also the external neutron source. The comparison between the measured and calculated reaction rate distributions demonstrates a discrepancy of the accuracy of reaction rate analyses of thorium capture reactions through the thorium-loaded ADS experiments with 14 MeV neutrons. Hereafter, kinetic experiments are planned to be carried out to deduce the delayed neutron decay constants and subcriticality using the pulsed neutron method. (authors)

  8. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells Accelerated Stress Test Protocols for PEM...

  9. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells DOE Cell Component Accelerated Stress Test Protocols for PEM Fuel Cells This document describes test protocols...

  10. Terrestrial Carbon Observations: Protocols for Vegetation Sampling

    E-Print Network [OSTI]

    GTOS GTOS 55 Terrestrial Carbon Observations: Protocols for Vegetation Sampling and Data Submission Shashi Verma #12;(intentionally blank) #12;Terrestrial Carbon Observations: Protocols for Vegetation Forestry University, Bejing 100083, China 5 University of Wisconsin, Milwaukee, WI 6 Microsoft Research

  11. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  12. Protocols for conducting Environmental Management Assessments of DOE organizations

    SciTech Connect (OSTI)

    Not Available

    1993-08-01T23:59:59.000Z

    To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

  13. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  14. Statistical Estimation of Quantum Tomography Protocols Quality

    E-Print Network [OSTI]

    Yu. I. Bogdanov; G. Brida; M. Genovese; S. P. Kulik; E. V. Moreva; A. P. Shurupov

    2010-02-18T23:59:59.000Z

    A novel operational method for estimating the efficiency of quantum state tomography protocols is suggested. It is based on a-priori estimation of the quality of an arbitrary protocol by means of universal asymptotic fidelity distribution and condition number, which takes minimal value for better protocol. We prove the adequacy of the method both with numerical modeling and through the experimental realization of several practically important protocols of quantum state tomography.

  15. Automated Eye-Movement Protocol Analysis

    E-Print Network [OSTI]

    Salvucci, Dario D.

    Automated Eye-Movement Protocol Analysis Dario D. Salvucci and John R. Anderson Carnegie Mellon analysis of eye-movement protocols. Although eye movements have be- come increasingly popular as a tool an ap- proach to automating eye-movement protocol analysis by means of tracing--re- lating observed eye

  16. Performances de protocoles transactionnels en environnement mobile

    E-Print Network [OSTI]

    Serrano Alvarado, Patricia

    indices de performance quantitatifs, et étudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile revisited to propose adapted transaction models and proper- ties. Proposed algorithms and protocols try

  17. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01T23:59:59.000Z

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  18. Plans, Implementation, and Results

    Broader source: Energy.gov [DOE]

    About the Weatherization and Intergovernmental Programs Office (WIPO) including information on plans, implementations, and results.

  19. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

    2000-09-19T23:59:59.000Z

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  20. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01T23:59:59.000Z

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  1. Object Dependent Properties of Mirrors for PV Applications Studied Under Accelerated Weathering Protocols

    E-Print Network [OSTI]

    Rollins, Andrew M.

    University, Cleveland, OH, 44106, USA Abstract--Lifetime and degradation science (L&DS) has been implemented-surface aluminum mirrors for photovoltaic applications and to apprise PV de- velopers of their implications. Using weathering protocols that induce degradation through heat, humidity, ultraviolet light and exposure

  2. Rate and Loss Control for Video Transmission over UMTS using Real-Time Protocols

    E-Print Network [OSTI]

    Bouras, Christos

    Rate and Loss Control for Video Transmission over UMTS using Real-Time Protocols Antonios G focus on the design and implementation of a rate and loss control mechanism for monitoring the UMTS]. In addition, when two different applications are running together, the network should guarantee

  3. Precursor Systems Analysis of Automated Highway Systems Activity Area J--Entry/Exit Implementation

    E-Print Network [OSTI]

    Varaiya, Pravin

    Precursor Systems Analysis of Automated Highway Systems Activity Area J--Entry/Exit Implementation This is the final report of a study of the following issues in the implementation of entry and exit in an Automated dedicated ramps; ffl Communication protocols for coordinating entry and exit maneuvers, and lateral

  4. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01T23:59:59.000Z

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  5. Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP)

    E-Print Network [OSTI]

    Kamboj, Pariza

    2010-01-01T23:59:59.000Z

    Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces th...

  6. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National Idling ReductionOffice Protocols

  7. Local implementations of non-local quantum gates in linear entangled channel

    E-Print Network [OSTI]

    Debashis Saha; Sanket Nandan; Prasanta K. Panigrahi

    2014-08-03T23:59:59.000Z

    In this paper, we demonstrate n-party controlled unitary gate implementations locally on arbitrary remote state through linear entangled channel where control parties share entanglement with the adjacent control parties and only one of them shares entanglement with the target party. In such a network, we describe the protocol of simultaneous implementation of controlled-Hermitian gate starting from three party scenario. We also explicate the implementation of three party controlled-Unitary gate, a generalized form of To?oli gate and subsequently generalize the protocol for n-party using minimal cost.

  8. ORISE: Policy Implementation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Implementation The Oak Ridge Institute for Science and Education (ORISE) assists the U.S. Department of Energy (DOE) Office of Science in the implementation of its program...

  9. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  10. Waimairi Clinic Policies, Procedures and Protocols

    E-Print Network [OSTI]

    Hickman, Mark

    Waimairi Clinic Policies, Procedures and Protocols July 2010 College of Education #12;Table The Facilities............................................................................2 Booking a Clinic room ............................................................................................... 3 Access to Clinics.......................................................................3

  11. Estimating Pedestrian Accident Exposure: Protocol Report

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01T23:59:59.000Z

    A Method of Measuring Exposure to Pedestrian Accident Risk.Accident Analysis and Prevention, Vol. 14, 1982, pp 397-405.Estimating Pedestrian Accident Exposure: Protocol Report,

  12. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    SciTech Connect (OSTI)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01T23:59:59.000Z

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  13. Kyoto University International Center

    E-Print Network [OSTI]

    Takada, Shoji

    Chemistry Faculty of Agriculture Bachelor of Agriculture Bioresource Science, Applied Life Sciences, Agricultural and Environmental Engineering, Forest and Biomaterials Science, Food and Environmental Economics and Astronautics, Nuclear Engineering,

  14. Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and

    E-Print Network [OSTI]

    Appendix E: Study Protocol Protocol for Biosampling Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) plus a Comparison Population in Sierra Vista, Arizona The protocol Assessment of Case Children with Leukemia (Acute Lymphocytic and Acute Myelocytic Leukemias) and a Reference

  15. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  16. The Bitcoin Backbone Protocol: Analysis and Applications

    E-Print Network [OSTI]

    The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay.leonardos@gmail.com November 16, 2014 Abstract Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone

  17. Protocol Number: (IBC office use only)

    E-Print Network [OSTI]

    Asaithambi, Asai

    Protocol Number: (IBC office use only) 1 UNF Registration of Biosafety Level 2 (BSL-2) A-2 Form", describe the methods of inactivation. #12;Protocol Number: (IBC office use only) 2 10. Describe the mechanism for decontaminating lab waste prior to disposal. Yes No If "Yes", describe the methods

  18. Safe Operating Procedure SAFETY PROTOCOL: Rb-86

    E-Print Network [OSTI]

    Farritor, Shane

    of hazardous and/or radioactive wastes are to be followed. Rb- 86 waste should be segregated from all otherSafe Operating Procedure (2/10) SAFETY PROTOCOL: Rb-86 this safety protocol or submit an alternative and equivalent procedure that you develop to meet your unique

  19. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  20. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect (OSTI)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15T23:59:59.000Z

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  1. NOAA Fisheries Protocols For Sea Scallop Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Sea Scallop Dredge Surveys January 7, 2004 Prepared by: Members..................................................................................................................................... 5 NOAA Fisheries Sea Scallop Dredge Survey Protocols............................................................................................................................. 10 Changes to Regional Scallop Dredge Protocols

  2. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  3. Blackout Final Implementation Report

    Office of Environmental Management (EM)

    Task Force: Final Report on Implementation of Recommendations G R23. Strengthen reactive power and voltage control practices in all NERC regions. . . . . . . . . . . . . . 34 R24....

  4. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007...

  5. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative:...

  6. access control protocols: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  7. access control protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficiency and measurement update cycle in Supervisory control and data acquisition (SCADA) systems when these systems using token passing bus protocol as a mac protocol in...

  8. applicable protocol fails: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for...

  9. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  10. N-Terminal Enrichment: Developing a Protocol to Detect Specific...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments....

  11. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Webinar slides from the U.S. Department of Energy...

  12. Environmental protection Implementation Plan

    SciTech Connect (OSTI)

    R. C. Holland

    1999-12-01T23:59:59.000Z

    This ``Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ``Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities.

  13. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  14. Measurement and Verification, Best Practices in Design and Implementation

    E-Print Network [OSTI]

    Martin, T.; Khatami, H.

    2013-01-01T23:59:59.000Z

    . Measurement?and? Verification,?Best?Practices? in?Design?and? Implementation Tom?Martin? CMVP,?LEED?AP Homay?Khatami? CEM,?LEED?AP PMP,?CMC? 1. Definition?of?Measurement?and?Verification?(M&V) 2. Applications?of?M&V 3. Specific.... Analyze?? Reporting M&V,?Best?Practices?in?Design?and?Implementation ?Measurement?and?Verification?is?the?process? of?using?measurements?to?reliably?determine? actual?savings? International?Performance?Measurement?and? Verification?Protocol?? Vol I...

  15. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

  16. Implementation of MP{_}Lite for the VI Architecture

    SciTech Connect (OSTI)

    Weiyi Chen

    2002-12-31T23:59:59.000Z

    MP{_}Lite is a light weight message-passing library designed to deliver the maximum performance to applications in a portable and user friendly manner. The Virtual Interface (VI) architecture is a user-level communication protocol that bypasses the operating system to provide much better performance than traditional network architectures. By combining the high efficiency of MP{_}Lite and high performance of the VI architecture, they are able to implement a high performance message-passing library that has much lower latency and better throughput. The design and implementation of MP{_}Lite for M-VIA, which is a modular implementation of the VI architecture on Linux, is discussed in this thesis. By using the eager protocol for sending short messages, MP{_}Lite M-VIA has much lower latency on both Fast Ethernet and Gigabit Ethernet. The handshake protocol and RDMA mechanism provides double the throughput that MPICH can deliver for long messages. MP{_}Lite M-VIA also has the ability to channel-bonding multiple network interface cards to increase the potential bandwidth between nodes. Using multiple Fast Ethernet cards can double or even triple the maximum throughput without increasing the cost of a PC cluster greatly.

  17. Evaluation of flexible and rigid (class solution) radiation therapy conformal prostate planning protocols

    SciTech Connect (OSTI)

    Coburn, Natalie, E-mail: natalie.coburn@swahs.health.nsw.gov.au [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Beldham-Collins, Rachael [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Radiation Oncology Network, Westmead Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Westling, Jelene; Trovato, Jenny [Radiation Oncology Network, Nepean Cancer Care Centre, University of Sydney, Sydney, New South Wales (Australia); Gebski, Val [National Health and Medical Research Council Clinical Trials Centre, University of Sydney, Sydney, New South Wales (Australia)

    2012-04-01T23:59:59.000Z

    Protocols commonly implemented in radiotherapy work areas may be classified as being either rigid (class solution) or flexible. Because formal evaluation of these protocol types has not occurred within the literature, we evaluated the efficiency of a rigid compared with flexible prostate planning protocol by assessing a series of completed 3D conformal prostate plans. Twenty prostate cancer patients with an average age of 70 years (range, 52-77) and sizes comprising 8 small, 10 medium, and 2 large were planned on the Phillips Pinnacle treatment planning system 6 times by radiation therapists with <2 years, 2-5 years, and >5 years of experience using a rigid and flexible protocol. Plans were critiqued using critical organ doses, confirmation numbers, and conformity index. Plans were then classified as being acceptable or not. Plans produced with the flexible protocol were 53% less likely to require modification (OR 0.47, 95% CI: 0.26, 0.84, p = 0.01). Planners with >5 years of experience were 78% more likely to produce plans requiring modification (OR 1.78, 95% CI: 1.12, 2.83, P = 0.02). Plans according to the flexible protocol took longer (112 min) compared with the time taken using a rigid protocol (68 min) (p < 0.001). The results suggest that further studies are needed; however, we propose that all radiation therapy planners should start with the same limitations, and if an acceptable plan is not reached, then flexibility should be given to improve the plan to meet the desired results.

  18. IT Licentiate theses Ad Hoc Routing Protocol

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University

  19. Membrane and MEA Accelerated Stress Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and MEA Accelerated Stress Test Protocols Presented at High Temperature Membrane Working Group Meeting Washington, DC May 14, 2007 T.G. Benjamin Argonne National Laboratory 2 0 10...

  20. A Metaobject Protocol for C++ Shigeru Chiba

    E-Print Network [OSTI]

    Chiba, Shigeru

    A Metaobject Protocol for C++ Shigeru Chiba Xerox PARC & University of Tokyo chiba@parc of the paper, we rst discuss what we want our 1 We use the term library to mean a collection of reusable code

  1. A novel DHT Routing Protocol for MANETs

    E-Print Network [OSTI]

    Chellamani, Deepak

    2010-04-30T23:59:59.000Z

    The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...

  2. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01T23:59:59.000Z

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  3. The security of Ping-Pong protocol

    E-Print Network [OSTI]

    Jian-Chuan Tan; An Min Wang

    2008-08-28T23:59:59.000Z

    Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

  4. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2001 SECURE SOCKETS LAYER (SSL) v layered on top of TCP v SSL versions 1.0, 2.0, 3.0, 3.1 v Netscape protocol v later refitted as IETF standard TLS (Transport Layer Security) v TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  5. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 3© Ravi Sandhu 2000

  6. Internet Security Protocols Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu 2© Ravi Sandhu 2000-2004 SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport Layer Security) TLS 1.0 very close to SSL 3.1 #12;3© Ravi Sandhu

  7. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01T23:59:59.000Z

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  8. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  9. October 2008 Implementation Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    original implementation budget (i.e., budget at start of rate period) LED Light-emitting diode Low-income Low income household eligibility is defined in the Federal...

  10. EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?

    E-Print Network [OSTI]

    Nakano, Koji

    Energy­Efficient Initialization Protocols for Ad­hoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energy­ efficient randomized initialization protocols for ad­hoc radio this protocol to de­ sign an energy­efficient initialization protocol that terminates, with high probability

  11. EPICS Version 4 - Implementing Complex Data Types

    SciTech Connect (OSTI)

    Marty Kraimer,; John dalesio

    2012-11-27T23:59:59.000Z

    Through phase 1 and phase 2 SBIR grants, s fully functional I/O Controller and communication protocol for version 4 of EPICS is completed. This new software architecture provides a flexible and extendible architecture. Version 4 is implemented fully in Java. The performance metrics look promising. The final portion of phase 2 is to optimize the communication mechanisms. Subsequent work on different aspects of this are required to provide a viable solutions in various areas. Version 3 of EPICS is able to provide a platform for implementing channel based control, because the channel and attributes for time stamping, alarm, display and control were narrow, well defined, and complete. To extend EPICS functionality beyond this, it is necessary to define attributes needed for archive data, array, image data, and directory services. The proper handling of several array types enables the development of middle layer servers such as orbit and bump control in accelerators. Phase 1 should produce a well defined, reviewed, and agreed upon definition of the metadata required for these services. A Phase 2 grant would provide tools that implemented archiving, general array, imaging, and directory applications.

  12. Presentation 2.8: Program for the conversion of Russian municipal boilers with 20MW maximum capacity to biofuel due to funds from the emissions reduction units sell, under the Kyoto Protocol

    E-Print Network [OSTI]

    -55% to 80-85%, · Increased dependability of heat supply, · solving the problem of settlement heat supply

  13. Continued on page 2 IMPLEMENTING THE HEALTH

    E-Print Network [OSTI]

    The System Development Life Cycle, September 2004 Securing Voice Over Internet Protocol (IP) Networks

  14. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01T23:59:59.000Z

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  15. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01T23:59:59.000Z

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  16. Environmental protection implementation plan

    SciTech Connect (OSTI)

    Holland, R.C.

    1998-03-01T23:59:59.000Z

    This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable.

  17. Environmental Protection Implementation Plan

    SciTech Connect (OSTI)

    Brekke, D.D.

    1995-11-01T23:59:59.000Z

    This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California`s commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. This report focuses on the following: notification of environmental occurrences; general planning and reporting; special programs and plans; environmental monitoring program; and quality assurance and data verification.

  18. IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov

    E-Print Network [OSTI]

    IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov:{yongs,vleung,beznosov}@ece.ubc.ca Keywords: Communication security, Mobile security, Multiple channels, SSL Abstract: Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. In contrast to SSL

  19. Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work-in-Progress/Application Paper track.

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work an adaptation controller for SSL (Secure Socket Layer), called Adaptive SSL. 1 Introduction Applications adaptation of the Secure Socket Layer (SSL) protocol [3]. Adaptive SSL (ASSL) aims to provide appropriate se

  20. Edgar Nett Mobile Computer Communication SS'14 20 How to implement redundancy?

    E-Print Network [OSTI]

    Edgar Nett Mobile Computer Communication SS'14 20 How to implement redundancy? Static vs. Dynamic overhead also in time è Acknowledgment scheme is crucial #12;Edgar Nett Mobile Computer Communication SS'14 needed ! #12;Edgar Nett Mobile Computer Communication SS'14 22 Operation of the protocol Poll

  1. Transition Implementation Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-24T23:59:59.000Z

    This Guide was prepared to aid in the development, planning, and implementation of requirements and activities during the transition phase at Department of Energy (DOE) facilities that have been declared or are forecast to become excess to any future mission requirements.

  2. Plans, Implementation, and Results

    Broader source: Energy.gov [DOE]

    The Bioenergy Technologies Office carries out technology research, development, and deployment through an ongoing process of planning and analysis, implementation, and review. This Web page includes links to documents that support and document the program management process, and the results and public benefits that derive from it.

  3. UNSATURATED SOIL MECHANICS IMPLEMENTATION

    E-Print Network [OSTI]

    Minnesota, University of

    UNSATURATED SOIL MECHANICS IMPLEMENTATION DURING PAVEMENT CONSTRUCTION QUALITY ASSURANCE Mn !! Performance Based Construction QA !! Unsaturated Soil Mechanics !! What We've Learned !! Next Steps #12.6-6.0 5 - 7 19 0.8 5 7 - 9 24 1.1 4 9 - 11 28 1.2 4 #12;Unsaturated Soil Mechanics #12;Fundamentals

  4. Adiabatically implementing quantum gates

    SciTech Connect (OSTI)

    Sun, Jie; Lu, Songfeng, E-mail: lusongfeng@hotmail.com; Liu, Fang [School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2014-06-14T23:59:59.000Z

    We show that, through the approach of quantum adiabatic evolution, all of the usual quantum gates can be implemented efficiently, yielding running time of order O(1). This may be considered as a useful alternative to the standard quantum computing approach, which involves quantum gates transforming quantum states during the computing process.

  5. Protocol to the 2001 Co-Operation Agreement between the European Organization For Nuclear Research (CERN) and the Ministry of Science, Technology and Development of the Republic of Serbia

    E-Print Network [OSTI]

    2001-01-01T23:59:59.000Z

    On 8 June 2001, on the basis of the mandate given by Council in 1989 to the Director-General to enter into Co-operation Agreements following a defined text model, CERN and the Government of the Republic of Serbia have entered into a Co-operation Agreement on the further development of scientific and technical co-operation in high-energy physics. As usual, the concrete implementation of the Co-operation Agreement is foreseen to take place through the conclusion of Protocols. Agreement has now been reached on the text of a Protocol concerning the Serbian participation in the CMS Collaboration. Annex I to the Protocol, which defines the technical specification of the Serbian contribution, is still under preparation. Although the Protocol contains no concrete financial commitment by CERN, pending a decision by the Committee of Council on procedures for agreements and protocols, the Management proposes that the Finance Committee takes note of the text of the Protocol.

  6. Small Business Administration Recovery Act Implementation | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small...

  7. Supplementary Protocol Here we provide details on the implementation of five analyses in Thunder, explaining

    E-Print Network [OSTI]

    Cai, Long

    , explaining for each the goal of the analysis, how it can be run from the Python shell (e.g. in iPython

  8. An ObjectOriented Implementation of the Xpress Transfer Protocol 1

    E-Print Network [OSTI]

    Strayer, William Timothy

    , and CRADA No. 1136 between Sandia National Laboratories and AT&T Bell Labs. #12; This paper discusses

  9. An Object-Oriented Implementation of the Xpress Transfer Protocol1

    E-Print Network [OSTI]

    Strayer, William Timothy

    , and CRADA No. 1 136 between Sandia National Laboratories and AT&T Bell Labs. #12;This paper discusses

  10. Web Applications and Security Web protocol overview

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  11. Security proofs of cryptographic protocols Eva Jencusova

    E-Print Network [OSTI]

    with FinePrint pdfFactory trial version http://www.fineprint.com #12;2 2 Database and logic abduction method is independent on used crypto-system in analyzing protocol. Our model DLA (=database and logic abduction that there exists knowledge to lead to an attack we use the logic abduction (top-down reasoning) to describe

  12. Optimal Decentralized Protocols for Electric Vehicle Charging

    E-Print Network [OSTI]

    Low, Steven H.

    into the electric power grid. EV charging increases the electricity demand, and potentially amplifies the peak1 Optimal Decentralized Protocols for Electric Vehicle Charging Lingwen Gan Ufuk Topcu Steven Low Abstract--We propose decentralized algorithms for optimally scheduling electric vehicle (EV) charging

  13. Transposon extraction protocol Maitreya Dunham November 2006

    E-Print Network [OSTI]

    Dunham, Maitreya

    Transposon extraction protocol Maitreya Dunham November 2006 modification of the Qiagen HSE precipitate. Mix equal amounts of DNA from each digest if multiple digests. Extraction In a screw-cap tube (Qiagen), and water to bring to 30 µl total. Heat for 15 minutes at 95C with a 100C block on top (blocks

  14. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  15. ANJE5.40. VAX VMS IBM NJE Protocol Emulator

    SciTech Connect (OSTI)

    Raffenetti, R.C.; Osudar, J. [Argonne National Lab., IL (United States)

    1990-06-01T23:59:59.000Z

    The Argonne NJE (Network Job Entry) communications software allows VAX/VMS systems to participate in a standard IBM peer-to-peer network and communicate with IBM computers with the VM/RSCS, MVS/JES2, MVS/JES3, or VSE/POWER operating systems or with CDC computers having the NJEF product by emulating the NJE protocol. The emulator has limited routing capability and forwards received files and messages to other nodes connected to it via DECnet. DECnet client nodes implementing the NJE system receive full NJE user services via the routing node including access to BITnet. All member nodes of VAX clusters involved in the NJE domain receive full NJE services as well. The emulator`s capabilities include immediate transfer of commands and messages and queued transfer of standard print and punch files. Jobs can be sent from VMS for execution at any node with batch services. The emulator receives files into user designated subdirectories. Two applications are distributed with ANJE. One is an RFC822-conforming interface that enables users of the VMS Mail Utility and either VM/SP NOTE or the IBM PROFS mail to exchange electronic mail. VMS Mail Utility users can also exchange electronic mail with users of BITnet. The other application is an emulator for the IBM Bulk Data Transfer product and IBM NETDATA protocol that enables transmission and reception of arbitrary sequential files with or without character translation. Data conversion subroutines are provided to aid users in converting their data from the binary format of one machine to that of the other.

  16. Information for the Commercialisation of Renewables in ASEAN (ICRA)

    E-Print Network [OSTI]

    .2 CDM Policy 14 5. EU Emissions Trading Scheme 17 6. European Carbon Credits Demand 19 7. Policy) Emissions Trading (ET), ii) Joint Implementation (JI), and iii) Clean Development Mechanism (CDM). The Clean the launching of the EU Emissions Trading Scheme (EU ETS). The EU ETS is independent from the Kyoto Protocol

  17. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol-profit organizations. To inform processes of policy development and implementation, climate change research needs #12;The MIT Joint Program on the Science and Policy of Global Change is an organization for research

  18. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Jacobs, Kurt

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, ...

  19. NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys

    E-Print Network [OSTI]

    NOAA Fisheries Protocols For Hydro-dynamic Dredge Surveys: Surf Clams and Ocean Quahogs December 19..................................................................................................................................... 1 NOAA Fisheries Hydro-dynamic Clam Dredge Survey Protocols........................................................................... 5 Clam Dredge Construction and Repair

  20. Airblue: A System for Cross-Layer Wireless Protocol Development

    E-Print Network [OSTI]

    Ng, Man Cheuk

    Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using ...

  1. Protocols for the Equitable Assessment of Marine Energy Converters 

    E-Print Network [OSTI]

    Ingram, David; Smith, George; Bittencourt-Ferreira, Claudio; Smith, Helen

    This book contains the suite of protocols for the equitable evaluation of marine energy converters (based on either tidal or wave energy) produced by the EquiMar consortium led by the University of Edinburgh. These protocols ...

  2. Implementing MSE 2000: Procedures

    E-Print Network [OSTI]

    Brown, M.; Adams, J.

    experts, technical writers, and subject matter experts, who will not continue on the MSE team. These experts fill a need when the management system is initiated that is completed during the implementation phase. Select MSE Team After... represent the most effective and efficient practice. By including technical writers and subject matter experts on the team, procedure/instruction writing will be hastened and enhanced. SYSTEM APPRAISAL During the system appraisal phase, the MSE 2000...

  3. Implementation of Sustainability at

    E-Print Network [OSTI]

    Johansen, Tom Henning

    0 Assessing Implementation of Sustainability at UiO Grønt UiO S u s t a i n a b i l i t y i n R e sustainability commitment among universities and proposed Best Green University Practices in 2010. It presents the current status of UiO Environmental Sustainability. #12;1 If you cannot measure it, you cannot manage it

  4. Coherent feedback that beats all measurement-based feedback protocols

    E-Print Network [OSTI]

    Kurt Jacobs; Xiaoting Wang; Howard M. Wiseman

    2014-07-21T23:59:59.000Z

    We show that when the speed of control is bounded, there is a widely applicable minimal-time control problem for which a coherent feedback protocol is optimal, and is faster than all measurement-based feedback protocols, where the latter are defined in a strict sense. The superiority of the coherent protocol is due to the fact that it can exploit a geodesic path in Hilbert space, a path that measurement-based protocols cannot follow.

  5. Performance Test Protocol for Evaluating Inverters Used in Grid...

    Office of Scientific and Technical Information (OSTI)

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems. Re-direct Destination: Abstract not provided....

  6. COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1

    E-Print Network [OSTI]

    Sergot, Marek

    COMPUTER SUPPORT FOR PROTOCOL-BASED TREATMENT OF CANCER1 PETER HAMMOND2 AND MAREK SERGOT3 July 1994 Cancer treatment is often carried out within protocol-based clinical trials. An oncology clinic may take of many protocols, the life-threatening nature of cancer and the toxicity of treatment side

  7. Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens,

    E-Print Network [OSTI]

    to infinity. We call such protocols asymp- totic and the fraction of distilled Bell states per initial copy#12;#12;Asymptotic adaptive bipartite entanglement distillation protocol Erik Hostens, Jeroen: July 13, 2006) We present a new asymptotic bipartite entanglement distillation protocol

  8. Wireless Sensor Networks: The Protocol Stack Iowa State University

    E-Print Network [OSTI]

    McCalley, James D.

    Wireless Sensor Networks: The Protocol Stack Mat Wymore Iowa State University Wind Energy Science Protocol Stack March 26, 2014 1 / 15 #12;One-Slide Refresher Wireless Sensor Networks (WSNs) Could be used;Wireless access point network Layers Application Google Chrome Transport Transmission Control Protocol (TCP

  9. Using CSP for protocol analysis: the Needham-Schroeder

    E-Print Network [OSTI]

    Doran, Simon J.

    Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

  10. PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS

    E-Print Network [OSTI]

    1/6 PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS Yi Qian 1 , Kejie Lu 2 on a priority based secure MAC protocol for vehicular networks and present detailed security and performance and simulations that the MAC protocol can achieve both security and QoS requirements for vehicular network safety

  11. 08/05/2011. Current Standard Operating Protocols (SOP), NCBS MS-Facility Proteomics Tryptic Digest Protocols

    E-Print Network [OSTI]

    Udgaonkar, Jayant B.

    Digest Protocols Protocol: 1 Ingel Digestion Protocol with Incubation Overnight Reference: In-gel digestion for mass spectrometric characterization of proteins and proteomes. Shevchenko et al. Nature in vacuum centrifuge. 8. Samples are now ready for digestion. Alternatively, they can be stored at -20o C

  12. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  13. ORISE: Policy Implementation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparencyDOENurse Triage Lines SupportPolicy Implementation The Oak

  14. Implementing Bayesian Statistics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School footballHydrogenIT |HotImpact ofVisiting Us /Implementing

  15. Implementing HB 3672

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School footballHydrogenIT |HotImpact ofVisiting Us /ImplementingOregon

  16. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01T23:59:59.000Z

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source

    SciTech Connect (OSTI)

    Zhang Shengli [Key Laboratory of Quantum Information, University of Science and Technology of China (CAS), Hefei 230026 (China); Electronic Technology Institute, Information Engineering University, Zhengzhou, Henan 450004 (China); Zou Xubo; Li Ke; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China (CAS), Hefei 230026 (China); Jin Chenhui [Electronic Technology Institute, Information Engineering University, Zhengzhou, Henan 450004 (China)

    2007-10-15T23:59:59.000Z

    For the Bennett-Brassard 1984 (BB84) quantum key distribution, longer distance and higher key generating rate is shown with a heralded single-photon source (HSPS) [Phys. Rev. A. 73, 032331 (2006)]. In this paper, the performance of the Scarani-Acin-Ribordy-Gisim (SARG) protocol utilizing the HSPS sources is considered and the numerical simulation turns out that still a significant improvement in secret key generating rate can also be observed. It is shown that the security distance for HSPS+SARG is 120 km. However, compared with the HSPS+BB84 protocols, the HSPS+SARG protocol has a lower secret key rate and a shorter distance. Thus we show the HSPS+BB84 implementation is a preferable protocol for long distance transmittance.

  18. GPFS HPSS Integration: Implementation Experience

    E-Print Network [OSTI]

    Hazen, Damian

    2008-01-01T23:59:59.000Z

    1996). Data Management API: the standard and implementationManagement (XDSM) API. Technical Standard. Open Group CAE

  19. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  20. Guidebook for Six Sigma Implementation

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    Guidebook for Six Sigma Implementation with Real Time Applications Editorial Committee Chairman: Dr & QUALITY COUNCIL OF INDIA A unique book on Six sigma implementation strategy with Real time case studies Now available !!! Now available !!! #12;Guidebook for Six Sigma Implementation with Real Time

  1. Soft-Decision-and-Forward Protocol for Cooperative Communication Networks Based on Alamouti Code

    E-Print Network [OSTI]

    No, Jong-Seon

    protocol called soft-decision-and- forward (SDF) is introduced. SDF protocol exploits the soft decision with low decoding complexity are proposed. From simulations, it can be seen that SDF protocol outperforms protocol called soft-decision- and-forward (SDF) is introduced. Unlike AF and DF protocols, SDF protocol

  2. Oblivious Handshakes and Sharing of Secrets of Privacy-Preserving Matching and Authentication Protocols

    E-Print Network [OSTI]

    Duan, Pu

    2012-07-16T23:59:59.000Z

    ................... 17 3 The flowchart of the proposed PSI protocol ........................................................... 30 4 The flowchart of the proposed SH protocol ............................................................ 50 5 A secret handshake protocol...-preserving element matching protocols ................................ 13 5 Comparison between PSI protocols ........................................................................ 33 6 Comparison between SH protocols...

  3. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01T23:59:59.000Z

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  4. Environmental Implementation Plan

    SciTech Connect (OSTI)

    Not Available

    1993-03-15T23:59:59.000Z

    The purpose of the Environmental Implementation Plan (EIP) is to show the current and future (five years) environmental plans from individual site organizations and divisions, as well as site environmental programs and initiatives which are designed to protect the environment and meet or exceed changing environmental/regulatory requirements. Communicating with site organizations, departments, and committees is essential in making the site`s environmental-planning process work. The EIP gives the site the what, when, how, and why for environmental requirements. Through teamwork and proactive planning, a partnership for environmental excellence is formed to achieve the site vision for SRS to become the recognized model for Environmental Excellence in the Department of Energy`s Nuclear Weapons Complex.

  5. Environmental Implementation Plan

    SciTech Connect (OSTI)

    Not Available

    1993-03-15T23:59:59.000Z

    The purpose of the Environmental Implementation Plan (EIP) is to show the current and future (five years) environmental plans from individual site organizations and divisions, as well as site environmental programs and initiatives which are designed to protect the environment and meet or exceed changing environmental/regulatory requirements. Communicating with site organizations, departments, and committees is essential in making the site's environmental-planning process work. The EIP gives the site the what, when, how, and why for environmental requirements. Through teamwork and proactive planning, a partnership for environmental excellence is formed to achieve the site vision for SRS to become the recognized model for Environmental Excellence in the Department of Energy's Nuclear Weapons Complex.

  6. * Presented at the 1998 International Workshop on Aspect-Oriented Programming (Kyoto, Japan; April 20, 1998) held at the 20th International Conference on Software Engineering.

    E-Print Network [OSTI]

    Walker, Robert James

    design and implementation technique proposed by researchers at Xerox PARC. This project is assessing-oriented programming is a new software design and implementation technique proposed by re- searchers at Xerox PARC[2, develop and maintain certain kinds of application code while maintaining highly efficient code. To better

  7. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01T23:59:59.000Z

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  8. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  9. Privacy of encrypted Voice Over Internet Protocol

    E-Print Network [OSTI]

    Lella, Tuneesh Kumar

    2008-10-10T23:59:59.000Z

    of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the gen- eration of tra c whenever the sender detects a voice inactivity period. We use the simple Bayesian classi er and the complex HMM... (Hidden Markov Models) classi er to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be e...

  10. Environmental Implementation Plan

    SciTech Connect (OSTI)

    Not Available

    1994-02-01T23:59:59.000Z

    The Environmental Implementation Plan (EIP) is a dynamic long-range environmental-protection plan for SRS. The EIP communicates the current and future (five year) environmental plans from individual organizations and divisions as well as site environmental initiatives which are designed to protect the environment and meet or exceed compliance with changing environmental/ regulatory requirements. Communication with all site organizations is essential for making the site environmental planning process work. Demonstrating environmental excellence is a high priority embodied in DOE and WSRC policy. Because of your support and participation in the three EIP initiatives; Reflections, Sectional Revision, and Integrated Planning, improvements are being made to the EIP and SRS environmental protection programs. I appreciate the ``Partnership in Environmental Excellence`` formed by the environmental coordinators and professionals who work daily toward our goal of compliance and environmental excellence. I look forward to seeing continued success and improvement in our environmental protection programs through combined efforts of all site organizations to protect our employees, the public health, and the environment. Together, we will achieve our site vision for SRS to be the recognized model for Environmental Excellence in the DOE Nuclear Weapons Complex.

  11. Implementation of IPv6 ToS over ATM Network Ricky Ng, Danny Yip, and Ljiljana Trajkovic

    E-Print Network [OSTI]

    Trajkovic, Ljiljana

    1 Implementation of IPv6 ToS over ATM Network Ricky Ng, Danny Yip, and Ljiljana Trajkovic School requirements. The introduction of the Type of Service (ToS) field in Internet Protocol version 6 (IPv6), addresses this deficiency. The feasibility of mapping IPv6 ToS onto various Asynchronous Transfer Mode (ATM

  12. Fibred Coalgebraic Logic and Quantum Protocols

    E-Print Network [OSTI]

    Daniel Marsden

    2014-12-30T23:59:59.000Z

    Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  13. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  14. Operations and Maintenance Program Implementation

    Broader source: Energy.gov [DOE]

    Implementing an effective operations and maintenance (O&M) program requires patience and persistence. This is especially true since no universal plan fits all Federal agencies.

  15. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

    E-Print Network [OSTI]

    Carl A. Miller; Yaoyun Shi

    2015-04-10T23:59:59.000Z

    Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic quality output security, tolerating a constant level of implementation imprecision, requiring only a constant size quantum memory for the honest implementation, and allowing a large natural class of constructions. In conjunct with a recent work by Chung, Shi and Wu (QIP 2014), it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.

  16. Development of DOE complex wide authorized release protocols for radioactive scrap metals.

    SciTech Connect (OSTI)

    Chen, S. Y.

    1998-11-23T23:59:59.000Z

    Within the next few decades, several hundred thousand tons of metal are expected to be removed from nuclear facilities across the U.S. Department of Energy (DOE) complex as a result of decontamination and decommissioning (D&D) activities. These materials, together with large quantities of tools, equipment, and other items that are commonly recovered from site cleanup or D&D activities, constitute non-real properties that warrant consideration for reuse or recycle, as permitted and practiced under the current DOE policy. The provisions for supporting this policy are contained in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. The objective of this study is to develop readily usable computer-based release protocols to facilitate implementation of the Handbook in evaluating the scrap metals for reuse and recycle. The protocols provide DOE with an effective oversight tool for managing release activities.

  17. Office of Environment, Safety and Health Assessments Protocol...

    Energy Savers [EERE]

    the Development and Maintenance of Criteria Review and Approach Documents, March 2015 (Revision 1) - PROTOCOL - EA-30-01 Office of Environment, Safety and Health Assessments...

  18. APS Protocol for Reporting Construction Vibration Issues for...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that shown in the online version. Advanced Photon Source APS Protocol for Reporting Construction Vibration Issues for Beamlines Section where used: This procedure describes the...

  19. aided routing protocol: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    reduction in the number of routing messages. However, current position Yasinsac, Alec 2 Energy Efficient Location Aided Routing Protocol for Wireless MANETs CERN Preprints...

  20. The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport...

    Open Energy Info (EERE)

    calculation-toolsall-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions...

  1. Dynamic Protocol Tuning Algorithms for High Performance Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Dynamic Protocol Tuning Algorithms for High Performance Data Transfers Event Sponsor: Mathematics and Computing Science Seminar Start Date: Apr 3 2015 - 2:00pm BuildingRoom:...

  2. DOE Cell Component Accelerated Stress Test Protocols for PEM...

    Broader source: Energy.gov (indexed) [DOE]

    CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) March 2007 Fuel cells, especially for...

  3. Cell Component Accelerated Stress Test Protocols for PEM Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    USCAR FUEL CELL TECH TEAM CELL COMPONENT ACCELERATED STRESS TEST PROTOCOLS FOR PEM FUEL CELLS (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Revised May...

  4. Protective Force Protocols for ESS Supported Performance Tests...

    Broader source: Energy.gov (indexed) [DOE]

    security force-on-force performance tests and exercises. Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 More Documents & Publications...

  5. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  6. GGREENHOUSE JJUSTICE MOVING BEYOND KYOTO

    E-Print Network [OSTI]

    Delaware, University of

    for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy, YU-MI MUN, NOAH TOLY & YOUNG-DOO WANG Position Paper prepared for UNFCC COP-8 New Delhi, India 23 October - 01 November 2002 Center for Energy & Environmental Policy tel: 302.831.8405 · web: www

  7. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  8. An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model

    E-Print Network [OSTI]

    C. Erven; Nelly Huei Ying Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

    2014-05-18T23:59:59.000Z

    Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

  9. iTOUGH2 Universal Optimization Using the PEST Protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.

    2010-07-01T23:59:59.000Z

    iTOUGH2 (http://www-esd.lbl.gov/iTOUGH2) is a computer program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis [Finsterle, 2007a, b, c]. iTOUGH2 contains a number of local and global minimization algorithms for automatic calibration of a model against measured data, or for the solution of other, more general optimization problems (see, for example, Finsterle [2005]). A detailed residual and estimation uncertainty analysis is conducted to assess the inversion results. Moreover, iTOUGH2 can be used to perform a formal sensitivity analysis, or to conduct Monte Carlo simulations for the examination for prediction uncertainties. iTOUGH2's capabilities are continually enhanced. As the name implies, iTOUGH2 is developed for use in conjunction with the TOUGH2 forward simulator for nonisothermal multiphase flow in porous and fractured media [Pruess, 1991]. However, iTOUGH2 provides FORTRAN interfaces for the estimation of user-specified parameters (see subroutine USERPAR) based on user-specified observations (see subroutine USEROBS). These user interfaces can be invoked to add new parameter or observation types to the standard set provided in iTOUGH2. They can also be linked to non-TOUGH2 models, i.e., iTOUGH2 can be used as a universal optimization code, similar to other model-independent, nonlinear parameter estimation packages such as PEST [Doherty, 2008] or UCODE [Poeter and Hill, 1998]. However, to make iTOUGH2's optimization capabilities available for use with an external code, the user is required to write some FORTRAN code that provides the link between the iTOUGH2 parameter vector and the input parameters of the external code, and between the output variables of the external code and the iTOUGH2 observation vector. While allowing for maximum flexibility, the coding requirement of this approach limits its applicability to those users with FORTRAN coding knowledge. To make iTOUGH2 capabilities accessible to many application models, the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  10. Guiding Principles for Successfully Implementing Industrial Energy...

    Energy Savers [EERE]

    Assessment Recommendations Guiding Principles for Successfully Implementing Industrial Energy Assessment Recommendations This implementation guide provides key principles and...

  11. Efficiency First - Contractor Outreach: Design & Implementation...

    Energy Savers [EERE]

    Efficiency First - Contractor Outreach: Design & Implementation for Residential Retrofit Programs Efficiency First - Contractor Outreach: Design & Implementation for Residential...

  12. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    DRAFT FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of...

  13. Biofuel and Bioenergy implementation scenarios

    E-Print Network [OSTI]

    Biofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies #12;Biofuel and Bioenergy implementation scenarios Final report of VIEWLS WP5, modelling studies By André of this project are to provide structured and clear data on the availability and performance of biofuels

  14. Effective Implementation of "IPMVP Option C - Whole Building Measurement" Measurement and Verification Plans

    E-Print Network [OSTI]

    Porter, T.; Weaver, K.; Vaughn, K.

    2005-01-01T23:59:59.000Z

    was the energy service company (ESCO) chosen by HHSC to implement the ESPC. The M&V plan is based on the International Performance Measurement and Verification Protocol (IPMVP) Option C “Whole Building Measurement” and provides the methodology.../05-47 1 INTRODUCTION This document describes the Measurement and Verification (M&V) methodology for Phase One of the Texas Health and Human Services Commission (HHSC) energy savings performance contracting (ESPC) project. TAC-Tour Andover Controls...

  15. Modelling unbounded parallel sessions of security protocols in CSP

    E-Print Network [OSTI]

    Roscoe, Bill

    Modelling unbounded parallel sessions of security protocols in CSP E. Kleiner and A.W. Roscoe that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid of injective authentication. Essentially for historical reasons, that paper created a model with both

  16. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks #

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks # Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis­ semination protocol. Infuse takes two input parameters: (i) the choice

  17. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    E-Print Network [OSTI]

    Kulkarni, Sandeep

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks Sandeep S. Kulkarni Mahesh of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis- semination protocol. Infuse takes two input parameters: (i) the choice

  18. SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols

    E-Print Network [OSTI]

    Han, Richard Y.

    SHUSH: Reactive Transmit Power Control For Wireless MAC Protocols Anmol Sheth and Richard Han@cs.colorado.edu Abstract-- Asymmetric transmission ranges caused due to transmit power control have the undesirable effect access. In this paper we present a new reactive power controlled MAC protocol, SHUSH, which tackles

  19. A Power Control MAC Protocol for Ad Hoc Networks

    E-Print Network [OSTI]

    A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS

  20. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  1. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  2. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  3. Cross-layered Synchronization Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cross-layered Synchronization Protocol for Wireless Sensor Networks Thomas Beluch, Daniela. Advances in wireless sensor network performances and improvement of attainable bit rates allow research on such measurement systems using Wireless Sensor Networks (WSNs). However, current WSN synchronization protocols do

  4. Evaluating complex MAC protocols for sensor networks with APMC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Evaluating complex MAC protocols for sensor networks with APMC Micha¨el Cadilhac1 Thomas present an analysis of a MAC (Medium Access Control) protocol for wireless sensor net- works. The purpose insights about it performance. Keywords: Wireless sensor networks, approximate verification 1 Introduction

  5. Field and Lab Methods & Protocols University of Michigan

    E-Print Network [OSTI]

    Kling, George W.

    SAFETY AND ORDERING PROCEDURES 309 (VIII-4) HAZARDOUS MATERIALS AND WASTE 313 (VIII-5) PRINTERS 315 (VIIIField and Lab Methods & Protocols Kling Lab University of Michigan Updated: December 2012 In use from: May 2012 Protocol version: v2.9 Last update: 8 November 2013 1 #12;LAST UPDATE: 29 MAY 2013 1

  6. Adaptive Data Collection Protocol using Reinforcement Learning for VANETs

    E-Print Network [OSTI]

    Boyer, Edmond

    Adaptive Data Collection Protocol using Reinforcement Learning for VANETs Ahmed Soua, and Hossam. Here, an Adap- tive Data cOllection Protocol using rEinforcement Learning (ADOPEL) is proposed that drivers can be alerted in advance. Since each vehicle in a vehicular environment can detect a hazardous

  7. A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Nahrstedt, Klara

    ­hop wireless ad­hoc networks, designing energy­efficient rout­ ing protocols is critical since nodes are power be mobile, demanding the energy­efficient routing protocol to be fully distributed and adaptive­ spect to end­to­end energy­efficient routes. Finally, preliminary simulation results are presented

  8. Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols

    E-Print Network [OSTI]

    Wang, Yu

    28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network

  9. DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network

    E-Print Network [OSTI]

    Shenoy, Prashant

    DTK Security Protocol: A Kerberos Infrastructure for Data Sensing Network Xiaolong Li, Pengyu Zhang security protocol, is proposed in this paper to secure data sensing networks. With the use of symmetric to evaluate the performance of DTK, and their relationship is derived. Furthermore, simulation carried on real

  10. Improved protocols of secure quantum communication using W states

    E-Print Network [OSTI]

    Chitra Shukla; Anindita Banerjee; Anirban Pathak

    2012-04-20T23:59:59.000Z

    Recently, Hwang et al. [Eur. Phys. J. D. 61, 785 (2011)] and Yuan et al. [Int. J. Theo. Phys. 50, 2403 (2011)] have proposed two efficient protocols of secure quantum communication using 3-qubit and 4-qubit symmetric W state respectively. These two dense coding based protocols are generalized and their efficiencies are considerably improved. Simple bounds on the qubit efficiency of deterministic secure quantum communication (DSQC) and quantum secure direct communication (QSDC) protocols are obtained and it is shown that dense coding is not essential for designing of maximally efficient DSQC and QSDC protocols. This fact is used to design maximally efficient protocols of DSQC and QSDC using 3-qubit and 4-qubit W states.

  11. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  12. Real-Time IPMI Protocol Analyzer

    E-Print Network [OSTI]

    Kozak, T; Makowski, D

    2011-01-01T23:59:59.000Z

    The Advanced Telecommunications Computing Ar- chitecture (ATCA) is a modern platform, which gains popularity, not only in telecommunication, but also in others fields like High Energy Physics (HEP) experiments. Computing systems based on ATCA provide high performance and efficiency and are char- acterized by significant reliability, availability and serviceability. ATCA offers these features because of an integrated manage- ment system realized by the Intelligent Platform Management Interface (IPMI) implemented on dedicated Intelligent Platform Management Controller (IPMC). IPMC is required on each ATCA board to fulfill the ATCA standard and is responsible for many vital procedures performed to support proper operation of ATCA system. It covers, among others, activation and deactivations of modules, monitoring of actual parameters or controlling fans. The commercially available IPMI implementations are expensive and often not suited to demands of specific ATCA applications and available hardware. Thus, many r...

  13. Shortcomings of the Cartagena Protocol: Resolving the Liability Loophole at an International Level

    E-Print Network [OSTI]

    Kohm, Katherine E.

    2009-01-01T23:59:59.000Z

    Protocol both focus on the effects of transboundary shipping, hazardous wasteProtocol on Liability and Compensation for Damage Resulting from Transboundary Movements of Hazardous Wasteshazardous wastes and other wastes subject to the Convention. The Cartagena Protocol

  14. April 1, 2015 Implementation Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    original implementation budget (i.e., budget at start of rate period) LED Light-emitting diode Low-income Low income household eligibility is defined in the Federal...

  15. Operating Reserves: Billing Implementation Update

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    D M I N I S T R A T I O N 2 Overview Explain the billing delay in implementing new WECC OR standards Customer outreach New project schedule Review new OR billing...

  16. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final report: Revision 1

    SciTech Connect (OSTI)

    Gonzales, D.

    1993-12-01T23:59:59.000Z

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing site are summarized as follows: In accordance with EPA-promulgated land cleanup standards, in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 clean up protocol has been developed. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR Part 192 relative to supplemental standards.

  17. Implementation of modern communication standard on SGU

    E-Print Network [OSTI]

    standard protocol in the industry. The standards in question are the existing protocol, IEC 60870-5-104 and the future, IEC 61850, which covers the design of substations in the electricity supply. IEC 61850 will be conducted. In addition to the IEC 61850 standard, the project will examine safety hazards, such a system may

  18. RADCAL Operations Manual Radiation Calibration Laboratory Protocol

    SciTech Connect (OSTI)

    Bogard, J.S.

    1998-12-01T23:59:59.000Z

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

  19. A New Protocol of Continuous-Variable Entanglement Distillation

    E-Print Network [OSTI]

    Shi Jin; Xian-Min Jin; Joshua Nunn; Animesh Datta; Ian Walmsley

    2012-10-16T23:59:59.000Z

    We introduce a new protocol in continuous variable entanglement distillation that requires only linear temporal and constant physical or spatial resources.Compared with the existing protocols, our protocol uses atom-photon entanglement to substitute for atom-atom entanglement in existing protol, which will not only save the number of quantum memories, but also has the advantages in operation efficiency and temporal saving. The distillation can be realized by a fixed model of iterations, in which only three quantum memories and photon detectors are required.

  20. Parallel decomposition of the logical link control protocol

    E-Print Network [OSTI]

    Bajpai, Dhruv Haribanshnath

    1991-01-01T23:59:59.000Z

    INTRODUCTION II PROTOCOLS AND FINITE STATE MACHINES A. PROTOCOLS B. FINITE STATE MACHINES III LOGICAL LINK CONTROL PROTOCOL 1V LLC STATE TABLE DESCRIPTION A. LLC STATES V THE PS I ARCHITECTURE VI RESULTS A. LINK INITIALIZATION SUBMACHINES . . B... expressions that govern the transition are given below Bin I (A) SET ABME+ SET ABME (Ts=Vc=O, Vi=0) + SET ABME (Ts=Vc&, Vi =RIp). (B) DEACTIVATE LS. (G) ENTER LCL Busy + EXIT LCL Busy + LPDU Invalid + SEND XID + SET ADM+ Ti Expired+ Tl Expired+ TEST LINK...

  1. Protocol for secure quantum machine learning at a distant place

    E-Print Network [OSTI]

    Jeongho Bang; Seung-Woo Lee; Hyunseok Jeong

    2015-04-20T23:59:59.000Z

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A tradeoff between the inaccuracy and the learning time is also analyzed.

  2. Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams

    SciTech Connect (OSTI)

    McEwen, Malcolm, E-mail: malcolm.mcewen@nrc-cnrc.gc.ca [National Research Council, 1200 Montreal Road, Ottawa, Ontario (Canada)] [National Research Council, 1200 Montreal Road, Ottawa, Ontario (Canada); DeWerd, Larry [University of Wisconsin, 1111 Highland Avenue, Madison, Wisconsin 53705 (United States)] [University of Wisconsin, 1111 Highland Avenue, Madison, Wisconsin 53705 (United States); Ibbott, Geoffrey [Department of Radiation Physics, M D Anderson Cancer Center, 1515 Holcombe Boulevard, Houston, Texas 77030 (United States)] [Department of Radiation Physics, M D Anderson Cancer Center, 1515 Holcombe Boulevard, Houston, Texas 77030 (United States); Followill, David [IROC Houston QA Center, Radiological Physics Center, 8060 El Rio Street, Houston, Texas 77054 (United States)] [IROC Houston QA Center, Radiological Physics Center, 8060 El Rio Street, Houston, Texas 77054 (United States); Rogers, David W. O. [Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario (Canada)] [Carleton Laboratory for Radiotherapy Physics, Physics Department, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario (Canada); Seltzer, Stephen [National Institute of Standards and Technology, Gaithersburg, Maryland 20899 (United States)] [National Institute of Standards and Technology, Gaithersburg, Maryland 20899 (United States); Seuntjens, Jan [Medical Physics Unit, McGill University, 1650 Cedar Avenue, Montreal, Québec (Canada)] [Medical Physics Unit, McGill University, 1650 Cedar Avenue, Montreal, Québec (Canada)

    2014-04-15T23:59:59.000Z

    An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new k{sub Q} data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of N{sub D,w} coefficients is discussed. It is expected that the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration.

  3. Islip Housing Authority Energy Efficiency Turnover Protocols, Islip, New York (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-08-01T23:59:59.000Z

    More than 1 million HUD-supported public housing units provide rental housing for eligible low-income families across the country. A survey of over 100 PHAs across the country indicated that there is a high level of interest in developing low cost solutions that improve energy efficiency and can be seamlessly included in the refurbishment process. Further, PHAs, have incentives (both internal and external) to reduce utility bills. ARIES worked with two public housing authorities (PHAs) to develop packages of energy efficiency retrofit measures the PHAs can cost effectively implement with their own staffs in the normal course of housing operations at the time when units are refurbished between occupancies. The energy efficiency turnover protocols emphasized air infiltration reduction, duct sealing and measures that improve equipment efficiency. ARIES documented implementation in ten housing units. Reductions in average air leakage were 16-20% and duct leakage reductions averaged 38%. Total source energy consumption savings was estimated at 6-10% based on BEopt modeling with a simple payback of 1.7 to 2.2 years. Implementation challenges were encountered mainly related to required operational changes and budgetary constraints. Nevertheless, simple measures can feasibly be accomplished by PHA staff at low or no cost. At typical housing unit turnover rates, these measures could impact hundreds of thousands of unit per year nationally.

  4. Optimization Online - Quantum and classical coin-flipping protocols ...

    E-Print Network [OSTI]

    Ashwin Nayak

    2015-04-21T23:59:59.000Z

    Apr 21, 2015 ... In this analogy, classical systems correspond to linear programming ... Moreover, if the product of Alice and Bob's optimal cheating probabilities is 1/2, then exactly one party can perfectly control the outcome of the protocol.

  5. The Greenhouse Gas Protocol Initiative: Measurement and Estimation...

    Open Energy Info (EERE)

    in conjunction with other WRI tools (e.g., the GHG Protocol tools for stationary combustion and purchased electricity), or in conjunction with other non-WRI tools that a...

  6. Transaction Abort Rate Reduction with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    and Francesc D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universitat Polit`ecnica de Val Abort Rate Reduction with Prioritized Atomic Multicast Protocols Emili Miedes and Francesc D. Mu~noz-Esco

  7. Proposals for Non-PGM Catalyst Target and Test Protocols

    Broader source: Energy.gov (indexed) [DOE]

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark...

  8. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    crafted request to submit a user-controlled AJP protocol message to the Tomcat server. This can be exploited to spoof the name of the target user and the client IP address...

  9. User managed wireless protocol stacks Vijay T. Raisinghani

    E-Print Network [OSTI]

    Iyer, Sridhar

    User experience on mobile devices is bound by the device constraints of memory, processing power, battery life and variations in the wireless network. Cross layer feedback in the protocol stack is useful

  10. A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.

    E-Print Network [OSTI]

    Van Dyke, Aaron R. (Aaron Robert)

    2009-01-01T23:59:59.000Z

    A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

  11. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  12. Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''

    E-Print Network [OSTI]

    Schlick, Tamar

    Biomolecular free energy profiles by a shootingÕumbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

  13. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01T23:59:59.000Z

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  14. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  15. an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux

    E-Print Network [OSTI]

    Coupechoux, Marceau

    CROMA - an Enhanced Slotted MAC Protocol for MANETs Marceau Coupechoux Institut Eurecom and Alcatel: +33 1 69 63 43 60 marceau.coupechoux@alcatel.fr Bruno Baynat University Pierre et Marie Curie, Paris

  16. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01T23:59:59.000Z

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  17. Predictive Protocol Management with Contingency Planning for Wireless Sensor Networks

    E-Print Network [OSTI]

    Raja, Anita

    characteristics of the Radio-Frequency (RF) in which the network operates. I. INTRODUCTION Energy efficiency protocol model with contingency planning (PPM & CP). The premise behind the approach is that providing

  18. Distributed Protocols as Behaviours in Erlang Darren Demicoli

    E-Print Network [OSTI]

    Francalanza, Adrian

    Distributed Protocols as Behaviours in Erlang Darren Demicoli CS, ICT Univeristy of Malta ddem0003@um.edu.mt Adrian Francalanza CS, ICT Univeristy of Malta adrian.francalanza@um.edu.mt ABSTRACT We

  19. Phasing Renewable Energy Implementation | Department of Energy

    Office of Environmental Management (EM)

    Phasing Renewable Energy Implementation Phasing Renewable Energy Implementation If conventional or other renewable energy funding cannot be procured, or if an agency is working...

  20. Building America Expert Meeting: Retrofit Implementation - A...

    Energy Savers [EERE]

    Building America Expert Meeting: Retrofit Implementation - A Neighborhood at a Time Building America Expert Meeting: Retrofit Implementation - A Neighborhood at a Time This report...

  1. Federal Sector Renewable Energy Project Implementation: ""What...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Sector Renewable Energy Project Implementation: ""What's Working and Why Federal Sector Renewable Energy Project Implementation: ""What's Working and Why Presentation by...

  2. Renewable Energy Project Planning and Implementation | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Planning and Implementation Renewable Energy Project Planning and Implementation Federal renewable energy projects can be large or small and managed by a third-party or the agency....

  3. Solving iTOUGH2 simulation and optimization problems using the PEST protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.; Zhang, Y.

    2011-02-01T23:59:59.000Z

    The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstrate the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.

  4. Improved computational neutronics methods and validation protocols for the advanced test reactor

    SciTech Connect (OSTI)

    Nigg, D. W.; Nielsen, J. W.; Chase, B. M.; Murray, R. K.; Steuhm, K. A.; Unruh, T. [Idaho National Laboratory, 2525 Fremont Street, Idaho Falls, ID 83415-3870 (United States)

    2012-07-01T23:59:59.000Z

    The Idaho National Laboratory (INL) is in the process of updating the various reactor physics modeling and simulation tools used to support operation and safety assurance of the Advanced Test Reactor (ATR). Key accomplishments so far have encompassed both computational as well as experimental work. A new suite of stochastic and deterministic transport theory based reactor physics codes and their supporting nuclear data libraries (HELIOS, KENO6/SCALE, NEWT/SCALE, ATTILA, and an extended implementation of MCNP5) has been installed at the INL. Corresponding models of the ATR and ATRC are now operational with all five codes, demonstrating the basic feasibility of the new code packages for their intended purposes. On the experimental side of the project, new hardware was fabricated, measurement protocols were finalized, and the first four of six planned physics code validation experiments based on neutron activation spectrometry have been conducted at the ATRC facility. Data analysis for the first three experiments, focused on characterization of the neutron spectrum in one of the ATR flux traps, has been completed. The six experiments will ultimately form the basis for flexible and repeatable ATR physics code validation protocols that are consistent with applicable national standards. (authors)

  5. Modeling in dyadic protocols for training complex skills

    E-Print Network [OSTI]

    Jordan, Jeffrey Alan

    1991-01-01T23:59:59.000Z

    MODELING IN DYADIC PROTOCOLS FOR TRAINING COMPLEX SKILLS A Thesis by JEFFREY ALAN JORDAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE...) Charles FL Shea (Member) t n Worchel / e d of Department) / December 1991 ABSTRACT Modeling in Dyadic Protocols for Training Complex Skills. (December 1991) Jeffrey Alan Jordan, B. S. , Texas A&M University Chair of Advisory Committee: Dr. Wayne...

  6. Effective algorithms and protocols for wireless networking: a topological approach

    E-Print Network [OSTI]

    Zhang, Fenghui

    2008-10-10T23:59:59.000Z

    EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science EFFECTIVE ALGORITHMS AND PROTOCOLS FOR WIRELESS NETWORKING: A TOPOLOGICAL APPROACH A Dissertation by FENGHUI ZHANG Submitted to the Office of Graduate Studies of Texas A&M University...

  7. Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer

    E-Print Network [OSTI]

    Christoph Kurz; Michael Schug; Pascal Eich; Jan Huwer; Philipp Müller; Jürgen Eschner

    2014-10-10T23:59:59.000Z

    A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit, and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80/s successful state transfer events out of 18,000/s repetitions.

  8. New and Emerging Energy Efficient Wireless Protocols New and Emerging Energy Efficient Wireless

    E-Print Network [OSTI]

    Jain, Raj

    New and Emerging Energy Efficient Wireless Protocols 1 of 12 New and Emerging Energy Efficient energy efficient wireless protocols. The benefits of each protocol are given, and then the different ways of conserving energy are compared. Key Words- Energy efficient protocols, energy efficiency, energy aware, low

  9. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol and several new active

  10. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Abstract The SSL protocol is intended of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol and several new active

  11. Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: Different alternative approaches

    E-Print Network [OSTI]

    Anirban Pathak

    2014-11-24T23:59:59.000Z

    Recently, Hassanpour and Houshmand have proposed a protocol of controlled deterministic secure quantum communication (Quant. Info. Process, DOI 10.1007/s11128-014-0866-z (2014)). The authors compared the efficiency of their protocol with that of two other existing protocols and claimed that their protocol is efficient. Here, we have shown that the efficiency of Hassanpour Houshmand (HH) protocol is not high, and there exist several approaches through which more efficient protocols for the same task can be designed. To establish this point, we have proposed an efficient protocol of controlled deterministic secure quantum communication which is based on permutation of particles (PoP) technique and is considerably efficient compared to HH protocol. We have also generalized this protocol into its bidirectional counterpart. Interestingly, bipartite entanglement (Bell state) is sufficient for the realization of the proposed protocols, but HH protocol and other existing protocols require at least tripartite entanglement. Further, we have shown that it is possible to construct a large number of efficient protocols of unidirectional and bidirectional controlled deterministic secure quantum communication by using various alternative approaches and different quantum states. These alternative protocols can be realized by modifying the existing protocols of quantum secure direct communication and deterministic secure quantum communication. We have also shown that it is possible to design completely orthogonal-state-based protocols for unidirectional and bidirectional controlled deterministic secure quantum communication.

  12. Design and Performance Analysis of an Aeronautical Routing Protocol with Ground Station Updates

    E-Print Network [OSTI]

    Narra, Hemanth

    2011-08-31T23:59:59.000Z

    Aeronautical routing protocol (AeroRP) is a position-based routing protocol developed for highly dynamic airborne networks. It works in conjunction with the aeronautical network protocol (AeroNP). AeroRP is a multi-modal protocol that operates...

  13. IMPLEMENTATION CONSIDERATIONS IN SUPERVISORY CONTROL

    E-Print Network [OSTI]

    Malik, Petra

    the behaviour of asynchronous controllers and their environment. The environment (also called plant) is modeledIMPLEMENTATION CONSIDERATIONS IN SUPERVISORY CONTROL P. Dietrich Dept. of Computer Science Corporate Research, CT SE 4, 81730 Munich, Germany robi.malik@mchp.siemens.de W.M. Wonham System Control

  14. implementing bioenergy applied research & development

    E-Print Network [OSTI]

    Northern British Columbia, University of

    1 A Northern Centre for Renewable Energy implementing bioenergy applied research & development to develop local solutions to these challenges by integrating campus operations, education, and research will help the University meet its current and future energy needs, reduce or eliminate our greenhouse gas

  15. Cooperative Approaches for Implementation of

    E-Print Network [OSTI]

    Laughlin, Robert B.

    ;#12;Abstract Anaerobic digestion of dairy manure produces biogas that can be captured and used for fuel while returns from energy and byproduct sales. Keywords: Anaerobic digestion, biogas, cooperatives, carbonCooperative Approaches for Implementation of Dairy Manure Digesters Research Report 217 #12

  16. Implementing Nutrient Management Practices in

    E-Print Network [OSTI]

    Balser, Teri C.

    /Implementation Efforts Nutrient and Pest Management Program (NPM) Certified Crop Adviser (CCA) Training Local Nutrient Assurance Team #12;Nutrient & Pest Management (NPM) Program What we do · Promote agricultural management conservation staff. · Over 400 participants to date Presented by: UWEX, NPM, DATCP, NRCS Financial support

  17. Remote Implementation of Quantum Operations

    E-Print Network [OSTI]

    Susana F. Huelga; Martin B. Plenio; Guo-Yong Xiang; Jian Li}and Guang-Can Guo

    2005-09-08T23:59:59.000Z

    Shared entanglement allows, under certain conditions, the remote implementation of quantum operations. We revise and extend recent theoretical results on the remote control of quantum systems as well as experimental results on the remote manipulation of photonic qubits via linear optical elements.

  18. GUIDANCE ON IMPLEMENTING RADIONUCLIDE NESHAPS

    E-Print Network [OSTI]

    . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background and History of the Standards . . . . . . . . . 2 1.2 Implementing these Standards - Radionuclide Emissions Other than Radon from DOE Facilities . . . . . . . . . . . . . . . . 13 2.2.2 Subpart I - NRC Licensed and Non-DOE Federal Facilities . . . . . . . . . . . . . . . . . . 14 2.3 NESHAPS

  19. LOCH: Open Access Implementation Responsibility Matrix 

    E-Print Network [OSTI]

    Krzak, Anna

    2015-02-05T23:59:59.000Z

    Draft Responsibility Matrix for College of Medicine and Veterinary Medicine for REF Open Access requirements implementation.

  20. Resources on Implementing Energy Savings Performance Contracts

    Broader source: Energy.gov [DOE]

    Many resources are available to help Federal agencies implement energy savings performance contracts (ESPCs).

  1. Designing and Implementing Effective Performance Assurance Plans

    Broader source: Energy.gov [DOE]

    Presentation—given at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting— covers performance assurance planning and process, including performance-based contracts, and measurement and verification protocols.

  2. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1991-05-15T23:59:59.000Z

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  3. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)] [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01T23:59:59.000Z

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  4. Waste generator services implementation plan

    SciTech Connect (OSTI)

    Mousseau, J.; Magleby, M.; Litus, M.

    1998-04-01T23:59:59.000Z

    Recurring waste management noncompliance problems have spurred a fundamental site-wide process revision to characterize and disposition wastes at the Idaho National Engineering and Environmental Laboratory. The reengineered method, termed Waste Generator Services, will streamline the waste acceptance process and provide waste generators comprehensive waste management services through a single, accountable organization to manage and disposition wastes in a timely, cost-effective, and compliant manner. This report outlines the strategy for implementing Waste Generator Services across the INEEL. It documents the culmination of efforts worked by the LMITCO Environmental Management Compliance Reengineering project team since October 1997. These efforts have included defining problems associated with the INEEL waste management process; identifying commercial best management practices; completing a review of DOE Complex-wide waste management training requirements; and involving others through an Integrated Process Team approach to provide recommendations on process flow, funding/charging mechanisms, and WGS organization. The report defines the work that will be performed by Waste Generator Services, the organization and resources, the waste acceptance process flow, the funding approach, methods for measuring performance, and the implementation schedule and approach. Field deployment will occur first at the Idaho Chemical Processing Plant in June 1998. Beginning in Fiscal Year 1999, Waste Generator Services will be deployed at the other major INEEL facilities in a phased approach, with implementation completed by March 1999.

  5. Environmental compliance assessment protocol - federal aviation administration (ECAP-FAA). Final report

    SciTech Connect (OSTI)

    Mann, D.K.; Schell, D.J.

    1994-10-01T23:59:59.000Z

    In response to the growing number of environmental laws and regulations worldwide, the Federal Aviation Administration (FAA) has adopted an environmental compliance program that identifies compliance problems before they are cited as violations by the U.S. Environmental Protection Agency (USEPA). In 1992, the FAA developed a program to maintain compliance with all Federal, state, and local environmental regulations. The goal is to protect human health/safety and the environment. The Southern Region of the FAA, which includes eight states and the Caribbean, developed and implemented a specific environmental assessment and management program tailored to the type and size of their facilities and operations. The resulting system combines Federal environmental regulations, along with good management practices and risk management information, into a series of checklists that show (1) legal requirements and (2) which specific items or operations to review. In 1994, the program was implemented nationwide. The Environmental Compliance Assessment Protocol - Federal Aviation Administration (ECAP-FAA) incorporates existing checklists from USEPA and private industry. The system has been tested at several FAA facilities. The manual is updated continually to address new environmental compliance laws and regulations.

  6. Effective Project Management Office Processes and Technology Transfer: Implementation of an Avaya Voice Over Internet Protocol Telephony System in Mexico

    E-Print Network [OSTI]

    Perez, Mary Louise

    2012-08-31T23:59:59.000Z

    Internet (VoIP) started in 1995 by people in Israel using computers to communicate. With later software and hardware developments by entrepreneurs and manufacturers more computer users had access to VoIP technology. A traditional call could now... in business operations. The disadvantages of VoIP technology are: 1) The technology is not quite as reliable as traditional land service. It is dependent on electrical power and the data network to support the VoIP telephony. TDM land lines should...

  7. Design of a header processor for the PSi implementation of the logical link control protocol in LANs 

    E-Print Network [OSTI]

    Morales, Fernando Augusto

    1992-01-01T23:59:59.000Z

    connections carried by a single Physical layer. The combination of a MAC sublayer address and an LLC sublayer address (Service Access Point -SAP address) is unique to each Data Link Layer service access point in the Local Area Network [8]. A basic block.... The DSAP and SSAP fields are the destination and source service access point address fields respectively. The six DSAP address bits (D) and the User Defined address bit (U), form the address of the SAP for which the LLC-PDU is intendetL The U bit...

  8. Design of a header processor for the PSi implementation of the logical link control protocol in LANs

    E-Print Network [OSTI]

    Morales, Fernando Augusto

    1992-01-01T23:59:59.000Z

    . General Description. B. First Pipeline Stage Datapath C. First Pipeline Stage Microprogram. . . . . D. Second Pipeline Stage Datapath . . E. Second Pipeline Stage Micmprogram . . . . . . V SIMULATION OF THE HEADER PROCESSOR: DESCRIPIION AND RESULTS... of this parameter is four bytes, for the representation of a 32 bit address. 6. The reception status parameter which indicates the success or failure of the received frame. Its length is one byte and consists of the following elements: the FR GOOD value, the E...

  9. Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |of EnergySelectedofGeothermal Systems

  10. Shear Transformation Zones: State Determined or Protocol Dependent?

    E-Print Network [OSTI]

    Oleg Gendelman; Prabhat K. Jaiswal; Itamar Procaccia; Bhaskar Sen Gupta; Jacques Zylberg

    2014-08-18T23:59:59.000Z

    The concept of a Shear Transformation Zone (STZ) refers to a region in an amorphous solid that undergoes a plastic event when the material is put under an external mechanical load. An important question that had accompanied the development of the theory of plasticity in amorphous solids for many years now is whether an STZ is a {\\em region} existing in the material (which can be predicted by analyzing the unloaded material), or is it an {\\em event} that depends on the loading protocol (i.e., the event cannot be predicted without following the protocol itself). In this Letter we present strong evidence that the latter is the case. Infinitesimal changes of protocol result in macroscopically big jumps in the positions of plastic events, meaning that these can never be predicted from considering the unloaded material.

  11. Streaming multimedia over WMSNs: an online multipath routing protocol

    E-Print Network [OSTI]

    Medjiah, Samir; Asgari, Abolghasem Hamid

    2012-01-01T23:59:59.000Z

    Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.

  12. A practical approach to the interGroup protocols

    SciTech Connect (OSTI)

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12T23:59:59.000Z

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  13. Protocol development for evaluation of commercial catalytic cracking catalysts

    SciTech Connect (OSTI)

    Mitchell, M.M. Jr.; Moore, H.F. (Ashland Petroleum Co., KY (USA))

    1988-09-01T23:59:59.000Z

    A complete, new set of testing protocols has been developed for qualification of catalysts for Ashland's commercial catalytic cracking units. The objective of this test development is to identify new generations of improved cracking catalysts. Prior test protocols have classically utilized microactivity (MAT) testing of steamed virgin catalysts, while more advanced methods have utilized fixed fluid bed and/or circulating pilot units. Each of these techniques, however, have been limited by their correlation to commercial operations, weaknesses in metallation and preparation of pseudo-equilibrium catalysts, and mechanical constraints on the use of heavy, vacuum bottoms-containing feedstocks. These new protocols have been baselined, compared to commercial Ashland results on known catalytic cracking catalysts, and utilized to evaluate a range of potentially new catalyst samples.

  14. Implementation Regulations 3TU MSc Sustainable Energy Technology Delft, 2014-2015 THE IMPLEMENTATION REGULATIONS

    E-Print Network [OSTI]

    Implementation Regulations 3TU MSc Sustainable Energy Technology ­ Delft, 2014-2015 THE IMPLEMENTATION REGULATIONS 2014 - 2015 3TU MASTER'S DEGREE PROGRAMME Sustainable Energy Technology - Delft (SET) DELFT UNIVERSITY OF TECHNOLOGY #12;Implementation Regulations MSc Sustainable Energy Technology SET

  15. Phenomenological implementations of TMD evolution

    E-Print Network [OSTI]

    M. Boglione; J. O. Gonzalez Hernandez; S. Melis; A. Prokudin

    2014-12-22T23:59:59.000Z

    Although the theoretical set-up of TMD evolution appears to be well established, its phenomenological implementations still require special attention, particularly as far as the interplay between perturbative and non-perturbative contributions is concerned. These issues have been extensively studied in Drell-Yan processes, where they seem to be reasonably under control. Instead, applying the same prescriptions and methodologies to Semi-Inclusive Deep Inelastic (SIDIS) processes is, at present, far from obvious. Some of the controversies related to the applications of TMD Evolution to SIDIS processes will be discussed with practical examples, exploring different kinematical configurations of SIDIS experiments.

  16. NEPA Implementation | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 attheMohammed Khan - TechnologyJanuary 29,guidance on the implementation

  17. CASL - Implementing Integrated Steam Tables

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8 FY0 ByVisitsImplementing

  18. CASL - Implementing Integrated Steam Tables

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8 FY0 ByVisitsImplementingLift

  19. Implementation Standing Technical Committee Presentation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet),Energy PetroleumEnergy Lube-oilDatabase for Implementation

  20. Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    W. -Y. Hwang; K. Matsumoto; H. Imai; J. Kim; H. -W. Lee

    2002-10-31T23:59:59.000Z

    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.

  1. UCSD Implementing Procedures 12/Nondiscrimination in Employment

    E-Print Network [OSTI]

    Russell, Lynn

    UCSD Implementing Procedures (HR-S-1) 12/Nondiscrimination in Employment 12/Nondiscrimination in Employment B. UC PPSM 14/Affirmative Action C. UCSD Implementing Procedures) issues an annual statement reaffirming the systemwide Nondiscrimination in Employment Policy. All

  2. Preparing for Project Implementation Assigning Accountability...

    Broader source: Energy.gov (indexed) [DOE]

    Assigning Accountability for Each Project (April 14, 2010) More Documents & Publications Preparing for Project Implementation after an Energy Assessment...

  3. Implementation of global energy sustainability

    SciTech Connect (OSTI)

    Grob, G.R. [CMDC, Zurich (Switzerland)

    1998-02-01T23:59:59.000Z

    The term energy sustainability emerged from the UN Conference on Environment and Development in Rio 1992, when Agenda 21 was formulated and the Global Energy Charter proclaimed. Emission reductions, total energy costing, improved energy efficiency, and sustainable energy systems are the four fundamental principles of the charter. These principles can be implemented in the proposed financial, legal, technical, and education framework. Much has been done in many countries toward the implementation of the Global Energy Charter, but progress has not been fast enough to ease the disastrous effects of the too many ill-conceived energy systems on the environment, climate, and health. Global warming is accelerating, and pollution is worsening, especially in developing countries with their hunger for energy to meet the needs of economic development. Asian cities are now beating all pollution records, and greenhouse gases are visibly changing the climate with rising sea levels, retracting glaciers, and record weather disasters. This article presents why and how energy investments and research money have to be rechanneled into sustainable energy, rather than into the business-as-usual of depleting, unsustainable energy concepts exceeding one trillion dollars per year. This largest of all investment sectors needs much more attention.

  4. GPFS HPSS Integration: Implementation Experience

    SciTech Connect (OSTI)

    Hazen, Damian; Hick, Jason

    2008-08-12T23:59:59.000Z

    In 2005 NERSC and IBM Global Services Federal began work to develop an integrated HSM solution using the GPFS file system and the HPSS hierarchical storage system. It was foreseen that this solution would play a key role in data management at NERSC, and fill a market niche for IBM. As with many large and complex software projects, there were a number of unforeseen difficulties encountered during implementation. As the effort progressed, it became apparent that DMAPI alone could not be used to tie two distributed, high performance systems together without serious impact on performance. This document discusses the evolution of the development effort, from one which attempted to synchronize the GPFS and HPSS name spaces relying solely on GPFS?s implementation of the DMAPI specification, to one with a more traditional HSM functionality that had no synchronized namespace in HPSS, and finally to an effort, still underway, which will provide traditional HSM functionality, but requires features from the GPFS Information Lifecycle Management (ILM) to fully achieve this goal in a way which is scalable and meets the needs of sites with aggressive performance requirements. The last approach makes concessions to portability by using file system features such as ILM and snapshotting in order to achieve a scalable design.

  5. Deployment Support Leading to Implementation

    SciTech Connect (OSTI)

    E. E. Cook

    1997-10-01T23:59:59.000Z

    The following paragraphs summarize the progress of each research project funded under the WVU Cooperative Agreement during the third quarter of 1997 (July - September 1997). The projects are arranged according to their 1997 WVU task number. WVU Focus Area 1.0: Subsurface Contaminants, Containment and Remediation Task No. 1.1: Project discontinued. Task No. 1.2: Development of Standard Test Protocols and Barrier Design Models for Desiccation Barriers (K. Amininan & S. Ameri): A number of experiments were preformed this period to evaluate the ability of the dried sand-packs to act as a barrier to liquids. Water infiltration tests were done with a constant head, dispersing 80 ml of water, and by adding water in small increments. Results indicate that when the water is spilled over the sand-pack, it has the tendency to channel through the sand-pack, significantly reducing the capacity of the dried zone to retain liquid contaminants. This appears to be largely influenced by particle size. As the particle size is reduced, the capillary forces spread the water and prevent/delay channels from forming. The measured permeability values were in agreement with those measured with air. The water retention capacity and capillary rise were largely influenced by time and showed no sensitivity to channeling. The water retention capacity tests suggest the sand-packs can retain more water than the expected. Two sets of water infiltration and drying experiments were designed to evaluate the CAB?s ability to prevent spills from spreading. Ten ml of water was injected every 20 minutes and 80 ml of water was added at one time. When injected slowly, results showed the drying process to be similar to the original drying process. The second set indicted the drying process follows a slowly declining drying with no break through. Results also suggested that air flow through the sand-pack can remove water infiltration. The air flow appeared to prevent any water channeling and thus should cause lateral distribution of the water. The large tank that accommodates the sand bed and the necessary plumbing to simulate various well configurations was received. The monitoring equipment and the sensors are currently being installed. The experimental procedures for Phase II experiments are under further investigation and will be initiated upon installation of CATC and assembly of the monitoring system. Due to insufficient operating funds, the large scale experiments will not be done this year. Task No. 1.3: Technical Support - Development of Standard Test Protocols and Barrier Design Models for In Situ Formed Barriers (B. Overbey & D. Locke, BDM Federal): The Operating Permit Renewal Request for bench scale operations in the FETC B-17 building was submitted to the FETC Lab Safety Committee for approval on 8/14/97. A review of the revised NEPA documents prepared last year indicates that these documents are still applicable for the current work. The initial design and specifications for the CATC vessel were prepared. Construction of the CATC was initiated in early July, the vessel was received August 15, 1997, and on-site work was completed this quarter.

  6. Implementing the chemical weapons convention

    SciTech Connect (OSTI)

    Kellman, B.; Tanzman, E. A.

    1999-12-07T23:59:59.000Z

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty implementing issues, showing how various States Parties have enacted measures that are responsive to CWC obligations. It is intended to highlight the issues that States Parties must address and to identify trends among States Parties that might be useful to States that have not yet made crucial decisions as to how to resolve key matters. At various points in the text, country names are listed in parenthesis to identify pieces of national legislation that demonstrate the point in the text. It should not be inferred that nations not listed have not addressed the point or have taken a different position. In some cases, a nation's position is explained in somewhat more depth to give specific detail to an assertion in the text. Attached to this paper is a chart which illustrates how States Parties in the Central European region as well as the United States respond to the issues raised. Obviously, in preparing such a chart, many subtle provisions in national legislation must be simplified. The point of the chart is to portray, on a few pages, the major trends of legislation.

  7. Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks

    E-Print Network [OSTI]

    Turgut, Damla

    of a crisis. Our protocol does not rely on critical infrastructure. It is designed to be spectrally efficient then present the link rendezvous process in detail. At the heart of this process is an attention signal, inability to scale to meet the capacity demands of the crisis, and in some instances, difficulty

  8. Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    and energy consumption by up to three times compared to Deluge. These improvements are most prominent of these factors on the protocol's behavior. Moreover, we compare Typhoon's performance to that of Deluge--the de times faster than Deluge in sparse and lossy networks. This paper has five sections. We summarize

  9. Tone based MAC protocol for use with Adaptive Array Antennas

    E-Print Network [OSTI]

    Singh, Suresh

    Abstract--This paper presents a novel Tone-based 802.11b protocol for use in wireless networks where nodes understand the networking issues in WLAN. The predominant model used in most of this work has assumed omni-directional antennas in which the transmission energy is spread out in all the directions from the sender. In this work

  10. How to Use Bitcoin to Design Fair Protocols Iddo Bentov

    E-Print Network [OSTI]

    How to Use Bitcoin to Design Fair Protocols Iddo Bentov idddo@cs.technion.ac.il Ranjit Kumaresan then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-or-refund"), that formalizes and abstracts the exact properties we require from the Bitcoin network to achieve our goals

  11. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  12. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  13. Reducing Transaction Abort Rates with Prioritized Atomic Multicast Protocols

    E-Print Network [OSTI]

    Muñoz, Francesc

    D. Mu~noz-Esco´i Instituto Tecnol´ogico de Inform´atica Universidad Polit´ecnica de Valencia 46022 Valencia (SPAIN) {emiedes,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/22 E.Miedes,F.D.Mu~noz-Esco´i Transaction Abort Rates with Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  14. GUV formation protocol: -Ethanol, DI water and Kimwipes for cleaning

    E-Print Network [OSTI]

    Movileanu, Liviu

    GUV formation protocol: Materials: - Ethanol, DI water and Kimwipes for cleaning - 5-10 µl glass with ethanol and DI water using Kimwipes alternating the solvents at least twice to make sure any grease-ring using a Kimwipe and ethanol. Use Que-tip or grease slide to apply a thin layer of vacuum grease to one

  15. SMDP a Simple Multimedia Service Description Protocol on the Internet

    E-Print Network [OSTI]

    Lung, Chung-Horng

    SMDP ­ a Simple Multimedia Service Description Protocol on the Internet Qiang Nelson Yin Chung}@sce.carleton.ca Abstract Downloading multimedia content from the Internet becomes more and more popular. Consumers have. Based on the current model, it is time consuming for consumers to obtain the desired multimedia content

  16. Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc.

    E-Print Network [OSTI]

    1 Refrigerator Recycling Evaluation Protocol Doug Bruchs, The Cadmus Group, Inc. Refrigerator Description Refrigerator recycling programs are designed to save energy through the removal of old-but- operable refrigerators from service. By offering free pick-up, providing incentives, and disseminating

  17. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  18. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  19. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L. (Edgewood, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM)

    2007-08-14T23:59:59.000Z

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  20. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  1. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770-2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770- 2) both assume that the two parties who wish to establish centre). 1 #12;· In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC 11770

  2. Parsing ambiguities in authentication and key establishment protocols

    E-Print Network [OSTI]

    establishment mechanisms using symmetric cryptography, ISO/IEC 11770­2, appeared in 1996 [8], and no problems protocols (mechanisms 12 and 13 of ISO/IEC 11770­ 2) both assume that the two parties who wish to establish centre). 1 #12; . In 2004 Cheng and Comley [5, 6] described two attacks on mechanism 12 from ISO/IEC

  3. Energy Analysis of Four Wireless Sensor Network MAC Protocols

    E-Print Network [OSTI]

    Kinicki, Robert E.

    Energy Analysis of Four Wireless Sensor Network MAC Protocols Brian Bates, Andrew Keating, Robert-hop network topology were conducted using three wireless sensor net- work traffic patterns (broadcast which reduce radio energy consumption is important for wireless sensor networks (WSNs). The most

  4. Routing protocol for anycast communications in a wireless sensor network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Routing protocol for anycast communications in a wireless sensor network Nancy El Rachkidy. 1 Introduction In the past few years, wireless sensor networks have been used in several moni University Complexe scientifique des C´ezeaux, 63177 Aubi`ere cedex, France Abstract. In wireless sensor

  5. PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks Chieh-Yih Wan Dept. of Electrical class of reliable data applications emerging in wireless sensor networks. For example, currently sensor of sensors in wireless sensor networks on the fly (e.g., during disaster recovery). Due to the application

  6. Towards a Protocol-Independent Internet Transport API

    E-Print Network [OSTI]

    Welzl, Michael

    a standardized API yet, and at the time of writing, the most recent Internet-draft specifying the SCTP API [1Towards a Protocol-Independent Internet Transport API Michael Welzl University of Oslo Email Gjessing University of Oslo Email: steing@ifi.uio.no Abstract--The conjoint API of TCP, UDP, UDP-Lite, SCTP

  7. A Review of Embedded Automotive Protocols Nicolas Navet

    E-Print Network [OSTI]

    Navet, Nicolas

    is given. Next, the current eorts of the automotive industry on middleware technologies which mayA Review of Embedded Automotive Protocols Nicolas Navet 1 , Françoise Simonot-Lion 2 April 14, 2008 of a large number of automotive networks such as LIN, J1850, CAN, FlexRay, MOST, etc.. This pa- per rst

  8. LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note

    E-Print Network [OSTI]

    Raizada, Manish N.

    LUCIFERASE ASSAY PROTOCOL FROM TRANSFORMED TISSUE Special Note: The Luciferase enzyme is unstable-ground samples. 2. Collect liquid nitrogen from downstairs and place 24 frozen tissue samples inside. 3. Place the power. 14.The luminometer cuvettes can be reused, BUT ONLY if they have been thoroughly soaked

  9. The COMPOW Protocol for Power Control in Ad Hoc Networks

    E-Print Network [OSTI]

    Kawadia, Vikas

    .S Sreenivas and P.R. Kumar The Power Control problem · How do we choose the right transmit power level ­ Power;3 Affects battery life · Higher power transmission is unnecessary if the receiver is close of links is critical · Find a way to ensure bidirectionality without breaking existing protocols

  10. Air to Air Communication Protocol Arjan Durresi1

    E-Print Network [OSTI]

    Jain, Raj

    1 Air to Air Communication Protocol Arjan Durresi1 , Vamsi Paruchuri1 , Leonard Barolli2 and Raj. Louis, MO 63130, USA 314-935-4963, jain@cse.wustl.edu Abstract--We present Air to Air Communication (AAC........................................................2 3. AIR TO AIR COMMUNICATION..............................3 4. SIMULATIONS

  11. Reply to "Comment on Protocol for Direct Counterfactual Quantum Communication"

    E-Print Network [OSTI]

    Hatim Salih; Zheng-Hong Li; M. Al-Amri; M. Suhail Zubairy

    2014-04-28T23:59:59.000Z

    In reply to Vaidman's Comment [arXiv:1304.6689], we show that his claim that our Protocol for Direct Counterfactual Quantum Communication [PRL 110, 170502 (2013), arXiv:1206.2042] is counterfactual only for one type of information bit is wrong.

  12. Survivability validation protocol issues for a system-of-systems

    SciTech Connect (OSTI)

    Brock, G.; Ianacone, K.J.; Stringer, T.A. [Kaman Sciences Corp., Colorado Springs, CO (United States)

    1993-08-01T23:59:59.000Z

    This paper illuminates the various issues confronting a protocol developer as he attempts to construct a system-of-systems (SOS) survivability validation protocol. These issues are considered in the context of a Battle Management Command, Control, and Communications (BMC{sup 3}) network in the form of a Hypothetical System Architecture consisting of air, sea, ground, and space platforms. The purpose of the protocol of concem is to validate the nuclear survivability of the BMC{sup 3} SOS. To achieve this validation, the combined susceptibilities of the SOS platforms and communications links must be considered. A basic SOS simulation concept is described, which assumes individual platform survivability. The nuclear environments to be considered in the simulation are outlined with a discussion of the relationship to basic system susceptibility. Various validation concepts for the SOS protocol are summarized in relation to the life cycle phase during which they would be utilized. Computer simulation issues are discussed, including the environments to be modeled, validation of the codes, documentation, and configuration control. Concluding remarks center on the most likely way of simulating nuclear effects and on treating simulation tools like mission critical items.

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  15. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  16. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  17. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07T23:59:59.000Z

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  18. Lightweight Protocol Suite for Wireless Sensor Networks: Design and Evaluation

    E-Print Network [OSTI]

    Huang, Changcheng

    , China Graduate School of the Chinese Academy of Sciences, Beijing, 100049, China E-mail: {chenhaiming phenomena [1]. Forecasting its wide application in both civilian and industrial fields, more and more are on the networking issues and energy consumption problems. To date, lots of efficient protocols have been proposed

  19. A proposed protocol for remote control of automated assessment devices

    SciTech Connect (OSTI)

    Kissock, P.S. [AlliedSignal FM and T/NM, Albuquerque, NM (United States); Pritchard, D.A. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31T23:59:59.000Z

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices.

  20. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  1. Implementing Fast Hierarchical Back Projection Jason Chang

    E-Print Network [OSTI]

    Willsky, Alan S.

    Implementing Fast Hierarchical Back Projection Jason Chang ECE 558 ­ Final Project Paper May 9, 2007 #12;Implementing Fast Hierarchical Back Projection Chang ii Abstract ­ Filtered back projection implemented in this project, called fast hierarchical back projection (FHBP), was proposed in [1] as a fast

  2. Level Set Implementations on Unstructured Point Cloud

    E-Print Network [OSTI]

    Duncan, James S.

    Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong A Thesis Submitted;Level Set Implementations on Unstructured Point Cloud by HO, Hon Pong This is to certify that I have implementations on unstructured point cloud 15 3.1 Level set initialization

  3. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution

    E-Print Network [OSTI]

    Feihu Xu; He Xu; Hoi-Kwong Lo

    2014-06-01T23:59:59.000Z

    Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field-tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to non-optimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

  4. Implementation of Endomorphisms of the CAR Algebra

    E-Print Network [OSTI]

    Carsten Binnenhei

    1997-01-10T23:59:59.000Z

    The implementation of non-surjective Bogoliubov transformations in Fock states over CAR algebras is investigated. Such a transformation is implementable by a Hilbert space of isometries if and only if the well-known Shale-Stinespring condition is met. In this case, the dimension of the implementing Hilbert space equals the square root of the Watatani index of the associated inclusion of CAR algebras, and both are determined by the Fredholm index of the corresponding one-particle operator. Explicit expressions for the implementing operators are obtained, and the connected components of the semigroup of implementable transformations are described.

  5. Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, this division of functionality evolved organically- tures of the algorithms, we construct TRUMP: a traffic man- agement protocol that is distributed

  6. TDROP: A routing protocol for physically hierarchical ad hoc mobile networks

    E-Print Network [OSTI]

    Ahmed, Zaheer

    2000-01-01T23:59:59.000Z

    Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc networks together to form...

  7. Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on Diesel Aftertreatment (Agreement 13415) Rapid Aging and Poisoning Protocols to AssessFuel and Lube Effects on...

  8. Diamond turning machine controller implementation

    SciTech Connect (OSTI)

    Garrard, K.P.; Taylor, L.W.; Knight, B.F.; Fornaro, R.J.

    1988-12-01T23:59:59.000Z

    The standard controller for a Pnuemo ASG 2500 Diamond Turning Machine, an Allen Bradley 8200, has been replaced with a custom high-performance design. This controller consists of four major components. Axis position feedback information is provided by a Zygo Axiom 2/20 laser interferometer with 0.1 micro-inch resolution. Hardware interface logic couples the computers digital and analog I/O channels to the diamond turning machine`s analog motor controllers, the laser interferometer, and other machine status and control information. It also provides front panel switches for operator override of the computer controller and implement the emergency stop sequence. The remaining two components, the control computer hardware and software, are discussed in detail below.

  9. Energy efficient sensor network implementations

    SciTech Connect (OSTI)

    Frigo, Janette R [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Kulathumani, Vinod [WEST VIRGINIA UNIV.; Rosten, Ed [CAMBRIDGE UNIV.; Wolinski, Christophe [IRISA; Wagner, Charles [IRISA; Charot, Francois [IRISA

    2009-01-01T23:59:59.000Z

    In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. We analyze the following modes of operation; event detection, sleep(wake-up), data acquisition, data processing modes using low power, high performance embedded technology such as specialized embedded DSP processors and a low power FPGAs at the sensing node. We use compute intensive sensor node applications: an acoustic vehicle classifier (frequency domain analysis) and a video license plate identification application (learning algorithm) as a case study. We report performance and total energy usage for our system implementations and discuss the system architecture design trade offs.

  10. Implementation impacts of PRL methodology

    SciTech Connect (OSTI)

    Caudill, J.A.; Krupa, J.F.; Meadors, R.E.; Odum, J.V.; Rodrigues, G.C.

    1993-02-01T23:59:59.000Z

    This report responds to a DOE-SR request to evaluate the impacts from implementation of the proposed Plutonium Recovery Limit (PRL) methodology. The PRL Methodology is based on cost minimization for decisions to discard or recover plutonium contained in scrap, residues, and other plutonium bearing materials. Implementation of the PRL methodology may result in decisions to declare as waste certain plutonium bearing materials originally considered to be a recoverable plutonium product. Such decisions may have regulatory impacts, because any material declared to be waste would immediately be subject to provisions of the Resource Conservation and Recovery Act (RCRA). The decision to discard these materials will have impacts on waste storage, treatment, and disposal facilities. Current plans for the de-inventory of plutonium processing facilities have identified certain materials as candidates for discard based upon the economic considerations associated with extending the operating schedules for recovery of the contained plutonium versus potential waste disposal costs. This report evaluates the impacts of discarding those materials as proposed by the F Area De-Inventory Plan and compares the De-Inventory Plan assessments with conclusions from application of the PRL. The impact analysis was performed for those materials proposed as potential candidates for discard by the De-Inventory Plan. The De-Inventory Plan identified 433 items, containing approximately 1% of the current SRS Pu-239 inventory, as not appropriate for recovery as the site moves to complete the mission of F-Canyon and FB-Line. The materials were entered into storage awaiting recovery as product under the Department`s previous Economic Discard Limit (EDL) methodology which valued plutonium at its incremental cost of production in reactors. An application of Departmental PRLs to the subject 433 items revealed that approximately 40% of them would continue to be potentially recoverable as product plutonium.

  11. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01T23:59:59.000Z

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  12. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect (OSTI)

    Mickalonis, J.

    2014-09-16T23:59:59.000Z

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  13. On the Performance of Collision Avoidance Protocols in Ad-Hoc Networks

    E-Print Network [OSTI]

    Paterakis, Michael

    the dialogue-based scheme. Examples of such protocols are: MACA [1], MACAW [2], DBTMA [3], FPRP [5], HRMA [7

  14. Performance Test Protocol for Evaluating Inverters Used in Grid-Connected

    E-Print Network [OSTI]

    Performance Test Protocol for Evaluating Inverters Used in Grid-Connected Photovoltaic Systems....................................................................................... 6 4.1 Inverter Size

  15. Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe

    E-Print Network [OSTI]

    Roscoe, Bill

    . . An essential part of our CSP models is knowing what a given agent believes about the progress of its protocolInternalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe Oxford University of cryptographic protocols using CSP [11] and FDR [5], often via extensions to Casper [6]. Since FDR can only check

  16. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect (OSTI)

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30T23:59:59.000Z

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  17. Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco´i InstitutoMiedesetal.:DynamicTotalOrderProtocolReplacementITI-SIDI-2012/009 #12;#12;Dynamic Total Order Protocol Replacement Emili Miedes, Francesc D. Mu~noz-Esco

  18. A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely Acs, Levente Buttyan

    E-Print Network [OSTI]

    Levente, Buttyán

    A Taxonomy of Routing Protocols for Wireless Sensor Networks Gergely ´Acs, Levente Butty application scenarios. In this work, we propose a taxonomy of sensor network routing protocols, and classify the mainstream protocols proposed in the literature using this taxonomy. We distinguish five families

  19. Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky

    E-Print Network [OSTI]

    Zelikovsky, Alexander

    Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing pro- tocols and workload balancing techniques for improving MANET routing protocols and energy efficiency. We give new routing protocol

  20. QoS-aware Optimization Strategy for Security Ranking in SSL Protocol , Zhe Tang 1

    E-Print Network [OSTI]

    Wu, Jie

    QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi 1 , Zhe Tang 1 socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA

  1. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Wagner, David

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised November 19, 1996 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  2. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Boult, Terrance E.

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor flaws in the protocol

  3. Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier

    E-Print Network [OSTI]

    Schneier, Bruce

    Analysis of the SSL 3.0 protocol David Wagner Bruce Schneier University of California, Berkeley Counterpane Systems daw@cs.berkeley.edu schneier@counterpane.com Revised April 15, 1997 Abstract The SSL analysis of the cryptographic strength of the SSL 3.0 protocol. A number of minor aws in the protocol

  4. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    Brown, Timothy X.

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

  5. An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

    E-Print Network [OSTI]

    An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

  6. A CDMA-Based, Self-Organizing, Location-Aware Media Access Control Protocol

    E-Print Network [OSTI]

    New South Wales, University of

    protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over latency. Our MAC protocols for sensor networks such as S-MAC [12] primarily prioritize energy-efficiency over protocol design balances the con- siderations of energy-efficiency, latency, accuracy, and fault

  7. A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Demirbas, Murat

    A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination

  8. PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Shihada, Basem

    PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks Lei Tang-MAC (Predictive-Wakeup MAC), a new energy-efficient MAC protocol based on asyn- chronous duty cycling. In PW it to X-MAC, WiseMAC, and RI-MAC, three previous energy-efficient MAC protocols, under multiple concurrent

  9. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Perkins, Richard A.

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland .........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  10. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  11. CRAD, Chemical Management Implementation - June 30, 2011 | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Chemical Management Implementation - June 30, 2011 CRAD, Chemical Management Implementation - June 30, 2011 June 30, 2011 Chemical Management Implementation Inspection Criteria,...

  12. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01T23:59:59.000Z

    DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

  13. The thermodynamics of creating correlations: Limitations and optimal protocols

    E-Print Network [OSTI]

    David Edward Bruschi; Martí Perarnau-Llobet; Nicolai Friis; Karen V. Hovhannisyan; Marcus Huber

    2015-03-11T23:59:59.000Z

    We establish a rigorous connection between fundamental resource theories at the quantum scale. Correlations and entanglement constitute indispensable resources for numerous quantum information tasks. However, their establishment comes at the cost of energy, the resource of thermodynamics, and is limited by the initial entropy. Here, the optimal conversion of energy into correlations is investigated. Assuming the presence of a thermal bath, we establish general bounds for arbitrary systems and construct a protocol saturating them. The amount of correlations, quantified by the mutual information, can increase at most linearly with the available energy, and we determine where the linear regime breaks down. We further consider the generation of genuine quantum correlations, focusing on the fundamental constituents of our universe: fermions and bosons. For fermionic modes, we find the optimal entangling protocol. For bosonic modes, we show that while Gaussian operations can be outperformed in creating entanglement, their performance is optimal for high energies.

  14. Quantum secret-sharing protocol based on Grover's algorithm

    SciTech Connect (OSTI)

    Hsu, Li-Yi [Physics Division, National Center of Theoretical Sciences, Hsinchu, Taiwan, Republic of China (China)

    2003-08-01T23:59:59.000Z

    A marked state can be found with certainty in the two-qubit case of Grover's algorithm. This property is included in the proposed quantum secret-sharing protocol. In the proposed scheme, the sender prepares some initial state in private and then performs a phase shift of the marked state as the sender's bit. Then, the sender sends these two qubits to each of the two receivers. Only when the sender broadcasts the initially prepared state and then the receivers perform the corresponding inversion operation about the average, is the sender's bit faithfully revealed. Moreover, the sender can detect deception using cheat-detecting states. The proposed quantum secret-sharing protocol is shown to be secure.

  15. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect (OSTI)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01T23:59:59.000Z

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  16. Schedule optimization study implementation plan

    SciTech Connect (OSTI)

    Not Available

    1993-11-01T23:59:59.000Z

    This Implementation Plan is intended to provide a basis for improvements in the conduct of the Environmental Restoration (ER) Program at Hanford. The Plan is based on the findings of the Schedule Optimization Study (SOS) team which was convened for two weeks in September 1992 at the request of the U.S. Department of Energy (DOE) Richland Operations Office (RL). The need for the study arose out of a schedule dispute regarding the submission of the 1100-EM-1 Operable Unit (OU) Remedial Investigation/Feasibility Study (RI/FS) Work Plan. The SOS team was comprised of independent professionals from other federal agencies and the private sector experienced in environmental restoration within the federal system. The objective of the team was to examine reasons for the lengthy RI/FS process and recommend ways to expedite it. The SOS team issued their Final Report in December 1992. The report found the most serious impediments to cleanup relate to a series of management and policy issues which are within the control of the three parties managing and monitoring Hanford -- the DOE, U.S. Environmental Protection Agency (EPA), and the State of Washington Department of Ecology (Ecology). The SOS Report identified the following eight cross-cutting issues as the root of major impediments to the Hanford Site cleanup. Each of these eight issues is quoted from the SOS Report followed by a brief, general description of the proposed approach being developed.

  17. Single-step distillation protocol with generalized beam splitters

    SciTech Connect (OSTI)

    Martin-Delgado, M. A.; Navascues, M. [Departamento de Fisica Teorica I, Universidad Complutense, 28040 Madrid, (Spain)

    2003-07-01T23:59:59.000Z

    We develop a distillation protocol for multilevel qubits (qudits) using generalized beam splitters like in the proposal of Pan et al. for ordinary qubits. We find an acceleration with respect to the scheme of Bennet et al. when extended to qudits. It is also possible to distill entangled pairs of photons carrying orbital angular momenta states that conserve the total angular momenta as those produced in recent experiments.

  18. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect (OSTI)

    Shinn, J.H.

    1995-09-01T23:59:59.000Z

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  19. Sandia National Laboratories: implement energy storage projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    implement energy storage projects Sandian Spoke at the New York Energy Storage Expo On December 12, 2014, in Energy, Energy Storage, Energy Storage Systems, Grid Integration,...

  20. Improved Audit Implementation Through Programmed Report Delivery

    E-Print Network [OSTI]

    Brown, M. L.; Gurta, M. E.; Meffert, W. A.

    Studies of energy audit recommendations have identified four primary barriers to implementation, perceived process interference, finances, organizational changes, and knowledge limitations leading to a bias against innovative technologies...

  1. EFFICIENT IMPLEMENTATIONS OF HEURISTICS FOR ROUTING ...

    E-Print Network [OSTI]

    2008-01-29T23:59:59.000Z

    Jan 29, 2008 ... paper, we propose efficient implementations of these heuristics and reevaluate them on a broader set of testbed instances. 1. Introduction.

  2. Optimization Online - On Implementing a Homogeneous Interior ...

    E-Print Network [OSTI]

    Anders Skajaa

    2011-01-25T23:59:59.000Z

    Jan 25, 2011 ... imm.dtu.dk) Per Christian Hansen (pch ***at*** imm.dtu.dk). Abstract: Based on earlier work by Nesterov, an implementation of a homogeneous ...

  3. California Nonpoint Source Program Strategy and Implementation...

    Open Energy Info (EERE)

    LibraryAdd to library Legal Document- OtherOther: California Nonpoint Source Program Strategy and Implementation Plan, 1998-2013Legal Abstract California Nonpoint Source Program...

  4. Council on Environmental Quality - Regulations for Implementing...

    Open Energy Info (EERE)

    OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Council on Environmental Quality - Regulations for Implementing the Procedural Provisions of the NEPALegal...

  5. Mid-Blend Ethanol Fuels ? Implementation Perspectives

    Broader source: Energy.gov (indexed) [DOE]

    Blend Ethanol Fuels - Implementation Perspectives William Woebkenberg - US Fuels Technical and Regulatory Affairs Mercedes-Benz Research & Development North America July 25, 2013...

  6. State Energy Program: Kentucky Implementation Model Resources

    Broader source: Energy.gov [DOE]

    Below are resources associated with the U.S. Department of Energy's Weatherization and Intergovernmental Programs Office State Energy Program Kentucky Implementation Model.

  7. Energy Sector Cybersecurity Framework Implementation Guidance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector...

  8. Renewable Energy Institutional Arrangements for Implementation...

    Open Energy Info (EERE)

    Terms of Reference Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy Institutional Arrangements for Implementation Terms of Reference Agency...

  9. Implementation of Title V in California

    SciTech Connect (OSTI)

    Werner, B.; Cook, B.

    1996-12-31T23:59:59.000Z

    This presentation provides information on California`s Title V operating permit programs for stationary sources mandated by the 1990 Clean Air Act amendments. It covers background, applicability, regulatory history, requirements, and issues. In addition, specific information is provided on the progress of Title V implementation in California, including: the roles of implementing agencies, the status of district Title V programs, number and distribution of Title V sources, cost of Title V implementation, and highlights of Title V implementation in the State. The question and answer format is intended to facilitate easy access to specific information related to the Title V operating permit programs in California.

  10. Implementing a Corporate Energy Management System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementing a Corporate Energy Management System" Steve Schultz Corporate Energy Manager 3M Presented at the U.S. Department of Energy Industrial Technologies Program June 3, 2010...

  11. Implementation of Department of Energy Oversight Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25T23:59:59.000Z

    This Order implements the policy that establishes a Department-wide oversight process to protect the public, workers, environment, and national security assets effectively through continuous improvement.

  12. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01T23:59:59.000Z

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  13. Nuclear Energy Governance and the Politics of Social Justice: Technology, Public Goods, and Redistribution in Russia and France

    E-Print Network [OSTI]

    Grigoriadis, Theocharis N

    2009-01-01T23:59:59.000Z

    Essentials, March 2007. OECD/Nuclear Energy Agency. "Nuclear Energy and the Kyoto Protocol"OECD/IEA Report OECD/Nuclear Energy Agency. "Nuclear Energy

  14. A fission matrix based validation protocol for computed power distributions in the advanced test reactor

    SciTech Connect (OSTI)

    Nielsen, J. W. [Idaho National Laboratory, MS 3840, PO Box 1625, Idaho Falls, ID 83415 (United States); Nigg, D. W. [Idaho National Laboratory, MS 3860, PO Box 1625, Idaho Falls, ID 83415 (United States); LaPorta, A. W. [Idaho National Laboratory, MS 7136, PO Box 1625, Idaho Falls, ID 83415 (United States)

    2013-07-01T23:59:59.000Z

    The Idaho National Laboratory (INL) has been engaged in a significant multi year effort to modernize the computational reactor physics tools and validation procedures used to support operations of the Advanced Test Reactor (ATR) and its companion critical facility (ATRC). Several new protocols for validation of computed neutron flux distributions and spectra as well as for validation of computed fission power distributions, based on new experiments and well-recognized least-squares statistical analysis techniques, have been under development. In the case of power distributions, estimates of the a priori ATR-specific fuel element-to-element fission power correlation and covariance matrices are required for validation analysis. A practical method for generating these matrices using the element-to-element fission matrix is presented, along with a high-order scheme for estimating the underlying fission matrix itself. The proposed methodology is illustrated using the MCNP5 neutron transport code for the required neutronics calculations. The general approach is readily adaptable for implementation using any multidimensional stochastic or deterministic transport code that offers the required level of spatial, angular, and energy resolution in the computed solution for the neutron flux and fission source. (authors)

  15. Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

    2010-09-20T23:59:59.000Z

    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

  16. ALGEBRAIC MODELS OF SUPERSCALAR MICROPROCESSOR IMPLEMENTATIONS: A

    E-Print Network [OSTI]

    Harman, Neal.A.

    ALGEBRAIC MODELS OF SUPERSCALAR MICROPROCESSOR IMPLEMENTATIONS: A CASE STUDY A. C. J. Fox and N. A INTRODUCTION In this chapter, we extend a set of algebraic tools for microprocessors (Harman and Tucker [1996], Harman and Tucker [1997] and Fox and Harman [1996a]) to model superscalar microprocessor implementations

  17. hal00270574, Testing Data Types Implementations from

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    is data type abstraction, testing a concrete implementation raises the issue of the gap betweenhal­00270574, version 1 ­ 6 Apr 2008 Testing Data Types Implementations from Algebraic Speci#12.legall@ibisc.univ-evry.fr Abstract. Algebraic speci#12;cations of data types provide a natural basis for testing data types

  18. OASIS4 coupling interface implementation on ETHZ'

    E-Print Network [OSTI]

    OASIS4 coupling interface implementation on ETHZ' land-atmosphere coupled model E. Maisonnave WN 9 2010 at ETH, Zürich(Switzerland), I implement and validate an OASIS4 interface for a regional) and a land scheme (CLM, NCAR) model have been coupled with OASIS4, at low resolution on a MPP scalar machine

  19. Object Oriented Artificial Neural Network Implementations

    E-Print Network [OSTI]

    Slatton, Clint

    1 Object Oriented Artificial Neural Network Implementations W. Curt Lefebvre Jose C. Principe Neuro artificial neural networks (ANNs). The conven- tion for ANN simulation has been a direct implementation to develop a graphical artificial neural network simulation environment motivated towards the pro- cessing

  20. Implementation and Performance of Parallelised Turbo Decoders

    E-Print Network [OSTI]

    Yýlmaz, �zgür

    1 Implementation and Performance of Parallelised Turbo Decoders Enes Erdin TUBITAK Defense In this paper, we discuss the implementation of a low latency decoding algorithm for turbo codes and repeat. Index Terms Turbo codes, repeat accumulate codes, parallellised turbo decoding, BCJR, FPGA, metric

  1. Wind power communication Design and implementation

    E-Print Network [OSTI]

    Wind power communication ­ Design and implementation of test environment for IEC61850/UCA2 Elforsk rapport 02:16 Anders Johnsson, Jörgen Svensson April 2002 #12;#12;Wind power communication ­ Design 2002 #12;#12;Wind power communication ­ Design and implementation of test environment for IEC61850/UCA2

  2. RDS operations manualField implementation

    E-Print Network [OSTI]

    Mullins, Dyche

    for trainings and TA. #12;RDS operations manual IBBS Toolbox 227 Women's Health Monitoring Survey fieldRDS operations manualField implementation #12;RDS operations manual 226 IBBS Toolbox RDS operations manual The RDS operations manual is designed to guide project staff during the implementation of RDS

  3. Development of a microfluidic platform for integrated DNA sequencing protocols

    E-Print Network [OSTI]

    Kumar, Mayank, S.M. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    This thesis describes the design and development of a microfluidic platform to reduce costs and improve the quality of in the DNA sequencing methodology currently implemented at the Broad Institute in Cambridge, Massachusetts. ...

  4. A Flexible Framework for Wireless Medium Access Protocols

    E-Print Network [OSTI]

    .11 PHY, it offers limited functionality for research in the larger space of clean-slate MAC-PHY pairs for a large class of algorithms. Space of possible MACs Complexity of implementation Derivative MACs Clean-Slate

  5. Efficient protocols for deterministic secure quantum communication using GHZ-like states

    E-Print Network [OSTI]

    Anindita Banerjee; Anirban Pathak

    2012-01-18T23:59:59.000Z

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols can be modified to an equivalent but more efficient protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed in detail and are critically compared with the existing protocols. It is shown that the proposed protocols are highly efficient. It is also shown that all the physical systems where dense coding is possible can be used to design maximally efficient protocol of DSQC and QSDC. Further, it is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols of the present kind. We have shown that there exist a large class of quantum state which can be used to design maximally efficient DSQC and QSDC protocols of the present kind. It is further, observed that maximally efficient QSDC protocols are more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate.

  6. Design And Implementation Of Digital Radio Communications Link For Platoon Control

    E-Print Network [OSTI]

    Li, Wei-yi

    1995-01-01T23:59:59.000Z

    remote terminals) and the SDLC (Synchronous Data LinkThe protocol selected is the SDLC synchronous protocol.The SDLC protocol is derived originaIly from the data link

  7. Implementing Safeguards-by-Design

    SciTech Connect (OSTI)

    Trond Bjornard; Robert Bean; Phillip Casey Durst; John Hockert; James Morgan

    2010-02-01T23:59:59.000Z

    Executive Summary Excerpt Safeguards-by-Design (SBD) is an approach to the design and construction of nuclear facilities whereby safeguards are designed-in from the very beginning. It is a systematic and structured approach for fully integrating international and national safeguards (MC&A), physical security, and other proliferation barriers into the design and construction process for nuclear facilities. SBD is primarily a project management or project coordination challenge, and this report focuses on that aspect of SBD. The present report continues the work begun in 2008 and focuses specifically on the design process, or project management and coordination - the planning, definition, organization, coordination, scheduling and interaction of activities of the safeguards experts and stakeholders as they participate in the design and construction of a nuclear facility. It delineates the steps in a nuclear facility design and construction project, in order to provide the project context within which the safeguards design activities take place, describes the involvement of safeguards experts in the design process, the nature of their analyses, interactions and decisions, as well as describing the documents created and how they are used. Designing and constructing a nuclear facility is an extremely complex undertaking. The stakeholders in an actual project are many – owner, operator, State regulators, nuclear facility primary contractor, subcontractors (e.g. instrument suppliers), architect engineers, project management team, safeguards, safety and security experts, in addition to the IAEA and its team. The purpose of the present report is to provide a common basis for discussions amongst stakeholders to collaboratively develop a SBD approach that will be both practically useful and mutually beneficial. The principal conclusions from the present study are: • In the short term, the successful implementation of SBD is principally a project management problem. • Life-cycle cost analysis can be a useful tool in safeguards design. • An important obstacle to straight forward application of life-cycle cost analysis is that there is no single organization responsible for the entire life-cycle cost of the facility. • The Safeguards Effectiveness Report (SGER) is proposed as a focus for the safeguards design activities, and is intended to be a living document that contains increasing safeguards relevant scope and content as the facility design emerges. Further work is required in a number of areas. The authors note that other studies supported by NGSI are addressing the development of requirements and performance criteria, as well as contributing to the design toolkit through the development of technology, methodology, and safeguards guidelines for designers. With respect to further development of the SBD design process, the authors recommend: • In the short term, conduct a workshop with interested industry representatives, to ensure that their perspectives and needs are factored into further development. • In the short term, provide NGSI SBD project documents to IAEA, and support them in the conduct of an ‘SBD Workshop II.” • In the medium term, continue to support the SBD demonstration work started with the Next Generation Nuclear Plant project. • In the longer term, conduct further studies to examine the integration of SBD into projects with concurrent consideration of physical security and safety.

  8. Algorithms, Protocols & Systems for Remote Observation Using Networked Robotic Cameras

    E-Print Network [OSTI]

    Qin, Ni

    2010-01-16T23:59:59.000Z

    assist in waste cleanup using Point- and-Direct (PAD) commands. Users point to cleanup locations in a shared image and a robot excavates each location in turn. Recent developments in MOSR systems can be found in [26,27]. In [27] Goldberg et al. propose...ALGORITHMS, PROTOCOLS AND SYSTEMS FOR REMOTE OBSERVATION USING NETWORKED ROBOTIC CAMERAS A Dissertation by NI QIN Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

  9. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01T23:59:59.000Z

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  10. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01T23:59:59.000Z

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  11. The two phase commit protocol simulation and analysis

    E-Print Network [OSTI]

    Bokil, Anupam

    1993-01-01T23:59:59.000Z

    IDENTIFICATION II. A Failures in a. Distributed DBMS 10 HI ATOIYIIC COMMITMENT HI. A Uncertainty Period . HI. B Blocking HI C Independent Recovery 17 17 IU THE TWO PHASE COMMIT PROTOCOL V111 CHAPTER Pa, ge IV. A Timeout Actions 21 IV. B Recovery..., 55 LIST OF TABLES TABLE Page Comparison of three versions of the two phase comniit CHAPTER I INTRODUCTION A database management system(DBMS) consists of a collection of interrelated, persis- tent data. and a set of programs to access this data...

  12. ASHRAE's New Performance Measurement Protocols for Commercial Buildings

    E-Print Network [OSTI]

    Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

    meters. Figure 8 shows an example of photograph of a lighting modelcompared with a simulated image using Radiance software. Chapter 5:Acoustics (CurtEichelberger). In Chapter 5 protocols are provided for the performance measurement of indoor acoustics...-metering of specific water using loads such as landscapewateringor coolingtowers. In a similar fashion as Level 1, the benchmark for Level 2 would be a comparison to a national database.Level 3 would consist of Level 2 information and hourly metering from data loggers...

  13. Generic protocol for environmental audits at federal facilities

    SciTech Connect (OSTI)

    NONE

    1989-08-01T23:59:59.000Z

    The Generic Protocol is a supplement to earlier efforts by EPA to provide technical assistance to Federal agencies on environmental auditing. EPA`s Office of Federal Activities (OFA) issued the Federal Facility Compliance Strategy (referred to as the `Yellow Book`), prepared in 1984 and revised in 1988, as a framework for EPA`s media programs to follow to ensure that Federal facilities are fully integrated into Federal and State compliance monitoring and enforcement activities. The policy encourages Federal agencies to voluntarily develop comprehensive auditing programs to ensure environmental compliance.

  14. Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |ofDepartment of Energy November 2012 Protocol

  15. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prev nextEnergy Consumer Privacy whileProtocol for

  16. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    E-Print Network [OSTI]

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01T23:59:59.000Z

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  17. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect (OSTI)

    Assche, G. van; Cerf, N.J. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); Iblisdir, S. [QuIC, Ecole Polytechnique, Universite Libre de Bruxelles, CP 165/59, 1050 Brussels (Belgium); GAP-Optique, University of Geneva, 20 rue de l'Ecole-de-Medecine, CH-1211 Geneva (Switzerland)

    2005-05-15T23:59:59.000Z

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  18. Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report TR-ITI-ITE-07/23 (supersedes TR-ITI-ITE-07/07) E.Miedes,F.D.Mu~noz-Esco´i:AddingPrioritiestoTotalOrderBroadcastProtocolsTR-ITI-ITE-07/23( #12;#12;Adding Priorities to Total Order Broadcast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  19. On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Escoi

    E-Print Network [OSTI]

    Muñoz, Francesc

    On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco,fmunyoz}@iti.upv.es Technical Report ITI-SIDI-2009/002 E.Miedes,F.D.Mu~noz-Esco´i:OntheCostofPrioritizedAtomicMulticastProtocolsITI-SIDI-2009/002 #12;#12;On the Cost of Prioritized Atomic Multicast Protocols Emili Miedes, Francesc D. Mu~noz-Esco

  20. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.