Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

data; but little "useable" information for selecting windows based on heatingcooling energy use * Wide performance range for any one window often exceeds the range across all...

2

Key Emergency Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Emergency Information What to Do if an Emergency Arises DOE is committed to public safety in the event an emergency arises. You will likely be made aware that an emergency is...

3

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

4

An outline of the three-layer survivability analysis architecture for strategic information warfare research  

Science Conference Proceedings (OSTI)

We apply the three-layer survivability analysis architecture developed by Ma & Krings (Ma & Krings 2009, Ma 2008) in the context of distributed networks (such as wireless sensor networks) to the study of strategic information warfare. To simplify ... Keywords: Byzantine generals playing evolutionary game, dynamic hybrid fault models, enhanced evolutionary game theory, information security, information warfare, survivability, survival analysis, three-layer survivability analysis

Zhanshan (Sam) Ma; Axel W. Krings; Frederick T. Sheldon

2009-04-01T23:59:59.000Z

5

Glossary of Key Information Security Terms (Draft)  

E-Print Network (OSTI)

Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and

Richard Kissel; Richard Kissel

2012-01-01T23:59:59.000Z

6

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy...

7

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

8

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy efficiency goals and standards. In addition, this guide will help instruct policy makers on how they can: » Encourage the adoption of statewide codes. » Establish energy code awareness programs. » Support enforcement of and compliance with energy codes. » Participate in the development of national codes and standards. » Determine the viability of the new code. Building TECHnOlOgiES PROgRAM Resource Guide for Policy Makers PREPAREd By Building Energy Codes Program The u.S. department of Energy's (uSdOE) Building Energy Codes Program (BECP) is an information resource on national energy codes. They work with other government

9

Unit Outline Training Guide  

E-Print Network (OSTI)

Unit Outline Builder Training Guide Document Status: Final Revision Number: 6.0 Revision Date: 14 Approved #12;Online Unit Outline Builder Training Guide Curtin University of Technology Page 2 TABLE................................................................................................................. 4 4. Log in and Select a Unit Outline

10

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

11

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

12

Big Coppitt Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigCoppittKey,Florida&oldid227749" Categories: Places Stubs Cities What links here...

13

Big Pine Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigPineKey,Florida&oldid227765" Categories: Places Stubs Cities What links here...

14

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

15

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

Keys El Coop Assn, Inc Keys El Coop Assn, Inc Jump to: navigation, search Name Florida Keys El Coop Assn, Inc Place Florida Utility Id 6443 Utility Location Yes Ownership C NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Rate Code 1 - Residential Service Residential Rate Code 2 - Commercial Service (General Service Non-Demand) Commercial Rate Code 3 - Commercial Service (General Service Demand) Commercial Average Rates Residential: $0.1210/kWh Commercial: $0.1220/kWh Industrial: $0.1140/kWh

16

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

17

KeyTex Energy LLC | Open Energy Information  

Open Energy Info (EERE)

KeyTex Energy LLC KeyTex Energy LLC Jump to: navigation, search Name KeyTex Energy LLC Place Greensburg, Pennsylvania Zip 15601 Product KeyTex Energy is a full service energy and consulting company, helping businesses implement both wholesale and retail strategies to control and reduce energy costs as well as manage the risks and complexities associated with the energy markets. Coordinates 40.299245°, -79.543159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.299245,"lon":-79.543159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

18

Key West, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Key West, FL) (Redirected from Key West, FL) Jump to: navigation, search Equivalent URI DBpedia Coordinates 24.5557025°, -81.7825914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":24.5557025,"lon":-81.7825914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

19

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a feature class (FC) with the following attributes: Field_name Buffer distance (can be unique for each well to represent reservoirs with different drainage radii) ...see figure below. Copy the code into a new module. Inputs: In ArcMap, data frame named "Task 1" Well FC as first layer (layer 0). Output: Polygon feature class in same GDB as the well points FC, with one polygon field record (may be multiple polygon rings) per field_name. Overlapping buffers for the same field name are dissolved and unioned (see figure below). Adds an attribute PCTFEDLAND which can be populated using the VBA

20

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Florida (Utility Company) Florida (Utility Company) Jump to: navigation, search Name Key West City of Place Florida Utility Id 10226 Utility Location Yes Ownership M NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Governmental Recreational Facility Lighting (Schedule S-3) LED High Watt, Approx. 72 Watt (Street Light Schedule S-1) Lighting LED High Watt, Approx. 72 Watts (Area Lighting Schedule S-2) Lighting

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Scientist Equipment and Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Outline and Equipment Outline and Equipment LIGHT AND COLOR Grade levels: can be adapted for grades 2-8. Length of time: 30-45 minues. Room preference: Double classroom or all-purpose room. Equipment is located in the Lederman Science Center. Talk to Susan Dahl to borrow this set. Spectrum tube power supply, gas tubes and diffraction grating glasses Light box with red, green, and blue translucent film Power chord, extension chord Large set of lenses Small concave and convex lenses Magnetic optics kit, includes a small laser Slinky Flashlight Clear plastic tub, powdered milk Water Radiometer Electromagnetic energy spectrum poster Set of red, green and blue flood lights Where does light come from? Use a boy and a girl to make a human demonstration of molecules and atoms. Have students rub their hands together and notice friction equals heat.

22

DOCS SCMP (ANNOTATED OUTLINE)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of the Executive Secretariat Document Online Coordination System (DOCS) Systems Configuration Management Plan (SCMP) October, 1998 U. S. DEPARTMENT OF ENERGY Assistant Secretary of Human Resources Administration Deputy Assistant Secretary for Information Management Operations, Management, Systems Support, and Customer Service Groups Table of Contents 1. INTRODUCTION ...............................................................................................................................................4 1.1. PURPOSE.........................................................................................................................................................4 1.2. SCOPE.............................................................................................................................................................4

23

Outline  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BLM RD&D Lease Paper 1 Final 04/29/12 BLM RD&D Lease Paper 1 Final 04/29/12 Assessment of Plans and Progress on US Bureau of Land Management Oil Shale RD&D Leases in the United States Peter M. Crawford, Christopher Dean, and Jeffrey Stone, INTEK, Inc. James C. Killen, US Department of Energy Purpose This paper describes the original plans, progress and accomplishments, and future plans for nine oil shale research, development and demonstration (RD&D) projects on six existing RD&D leases awarded in 2006 and 2007 by the United States Department of the Interior, Bureau of Land Management (BLM) to Shell, Chevron, EGL (now AMSO), and OSEC (now Enefit American, respectively); as well as three pending leases to Exxon, Natural Soda, and AuraSource, that were offered in 2010. The outcomes

24

Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Project Research Project Summer Student Research for the Next Linear Collider (NLC) Student Researchers: Rachel Lansom Sara Waugh Advisor: Josef Frisch I.Introduction A. Schematic Diagram II. Electronics: Basic Terms A. Mixing 2 frequencies 1. Calculation III. Noise Tests A. What is Noise? B. Synthesizer Test 1. Goal of Experiment and Diagram of Test Circuit 2. Comparing dBm to mW and Power variation calculation 3. Capacitor plate calculation: acceptable offset distance C. Amplifier Test 1. Graph of rms/gain vs. gain 2. Attenuator Test D. Noise Equation 1. Diagram 2. General equation for determining noise/motion relationship IV. Capacitor A. Sample Calculations 1. Capacitance 2. Frequency B. Diagram C. Photographs D. Measurements 1. Graph: DC Volts per Micron 2. Final Noise Calculations

25

Outline  

Science Conference Proceedings (OSTI)

... step for the 7- and 8- cycle fuel elements Shim arms, regulating rod, beam tubes, etc. ... 31 mcnp 12/14/0 tally n nps bin norm mctal = f sur d flag u s ...

2005-06-23T23:59:59.000Z

26

Outline  

E-Print Network (OSTI)

Marcus Miller and John Williamson for many discussions of the ideas contained in this paper. They are not responsible for the end-product. The views expressed are my own. They do not represent the views of any organisation I am associated with.

Willem H. Buiter; Willem H. Buiter

2008-01-01T23:59:59.000Z

27

OUTLINE  

Science Conference Proceedings (OSTI)

... Poly(ethylene oxide) in d-ethanol phase separated (2-phase) mixed phase (1-phase) ... d-Water Fraction PEO in d-ethanol/d-water Mixtures UCST ...

2013-06-12T23:59:59.000Z

28

Outline  

Science Conference Proceedings (OSTI)

... Nanotubes Forro, Europhysics News (2001) Vol. 32 No. 3 W ang, in preparation Page 4. 4 Nanotubes Nonchiral ( armchair' ) ...

2005-06-14T23:59:59.000Z

29

New Report Outlines Key Features of Next-Generation Public ...  

Science Conference Proceedings (OSTI)

... Smart Grid Interoperability Panel, which includes representatives from a large number of sectors with an interest in the next-generation power grid. ...

2012-02-08T23:59:59.000Z

30

Determining the Specificity of Terms based on Information Theoretic Pum-Mo Ryu and Key-Sun Choi  

E-Print Network (OSTI)

Determining the Specificity of Terms based on Information Theoretic Measures Pum-Mo Ryu and Key@world.kaist.ac.kr, kschoi@world.kaist.ac.kr Abstract This paper introduces new specificity determining methods for terms based on information theoretic measures. The specificity of terms represents the quantity of domain

31

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

32

OUTLINE OF DETAILED TEST PLAN  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0/ 177 0/ 177 Implementation Plan and Initial Development of Nuclear Concrete Materials Database for Light Water Reactor Sustainability Program September 30, 2010 Prepared by Weiju Ren and Dan Naus Oak Ridge National Laboratory Barry Oland XCEL Engineering DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge. Web site http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source. National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone 703-605-6000 (1-800-553-6847) TDD 703-487-4639 Fax 703-605-6900 E-mail info@ntis.gov

33

Unit Outline Policy Commencement Date: 25 February, 2011  

E-Print Network (OSTI)

Unit Outline Policy Commencement Date: 25 February, 2011 Category: Teaching and Learning Students 1. PURPOSE To ensure all students are provided with essential administrative information about a unit of study and to guide them in achieving the learning outcomes for the unit. 2. APPLICATION All Staff

34

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

35

Key Research Results Achievement  

E-Print Network (OSTI)

daylighting options for specific spaces with sample design layouts · Various HVAC system types that achieve%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvanced school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy

36

12/23/2011 PROGRAM REVIEW OUTLINE  

E-Print Network (OSTI)

provision. #12;Industrial Engineering 29 I. Department efforts to retain students and graduation rates#12;12/23/2011 PROGRAM REVIEW OUTLINE Industrial Engineering I. Program Overview ­ A one to two preparation of graduate students. I. Department efforts to retain students and graduation rates V. Department

Rock, Chris

37

Outline of a Course in Plasma Physics  

Science Conference Proceedings (OSTI)

This outline is part of an educational experiment initiated by the Commission on College Physics. The Commission has undertaken to highlight the need of college curriculum development in various areas of modern physics. One of these areas is the field of plasma physics. Difficulties in preparing a course in this particular field result from the fact that it has grown from fairly disparate areas of physics including gas discharges magnetohydrodynamics and fusion physics. Synthesis of these various fields into a single course in plasma physics has not taken place spontaneously throughout the country and to look into this problem

Plasma Physics Study Group

1963-01-01T23:59:59.000Z

38

Course Outline - CECM - Simon Fraser University  

E-Print Network (OSTI)

I encourage you to make appropriate use of all sources of available information, including: the textbook, materials posted on the Web, my office hours, other...

39

Outline of ANSI Response to Request for Information on ...  

Science Conference Proceedings (OSTI)

... to the well-being of the United States and to ... The expansion of global trade is increasingly ... technologies (ICT), cybersecurity, and electric vehicles. ...

2012-11-23T23:59:59.000Z

40

Quantum information technology with Sagnac interferometer: Interaction-free measurement, quantum key distribution and quantum secret sharing  

E-Print Network (OSTI)

The interferometry of single-photon pulses has been used to implement quantum technology systems, like quantum key distribution, interaction-free measurement and some other quantum communication protocols. In most of these implementations, Mach-Zehnder, Michelson and Fabry-Perot interferometers are the most used. In this work we present optical setups for interaction-free measurement, quantum key distribution and quantum secret sharing using the Sagnac interferometer. The proposed setups are described as well the quantum protocols using them are explained.

Wellington Alves de Brito; Rubens Viana Ramos

2007-06-08T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

KEY PERSONNEL  

National Nuclear Security Administration (NNSA)

APPENDIX J KEY PERSONNEL 07032013 TITLE NAME President Christopher C. Gentile Vice President, Operations Robin Stubenhofer Director, Sr. Program Management Rick Lavelock...

42

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INDIAN COUNTRY ENERGY AND INFRASTRUCTURE WORKING GROUP ICEIWG Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado...

43

Key Documents  

Science Conference Proceedings (OSTI)

AOCS by-laws, code of ethics and anti trust policy established during our 100+ legacy. Key Documents AOCS History and Governance about us aocs committees contact us division council fats governing board history oils professionals science value cen

44

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Points & Action Items Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado Participants Tracey LeBeau, Director, Pilar Thomas, Deputy Director, and Brandt Petrasek, Special Assistant, Department of Energy, Office of Indian Energy Policy and Programs; Vice Chairman Ronald Suppah and Jim Manion, Confederated Tribes of the Warm Springs Reservation of Oregon; William Micklin, Ewiiaapaayp Band of Kumeyaay Indians; Councilman Barney Enos, Jr., Jason Hauter, Gila River Indian Community; Mato Standing High, Rosebud Sioux Tribe; R. Allen Urban, Yocha Dehe Wintun Nation; Glen Andersen, Scott Hendrick, Brooke Oleen, Jacquelyn Pless, Jim Reed and Julia Verdi, National Conference of State Legislatures-staff

45

Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea  

E-Print Network (OSTI)

The core competency of the most effective organizations will be their capacity to learn in an increasingly complex and unpredictable business environment and HRD should expand its role to become a partner in the transformation of the entire organization. Organizational learning style, therefore, is an important research topic for the field of HRD (human resource development). This study had four primary purposes, which were germane to the corporations in the Republic of Korea: 1) to identify what organizational learning styles exist; 2) to identify the factors that differentiate the organizations with different organizational learning styles; 3) to identify the roles of HRD to facilitate organizational learning within the organizations in each organizational learning style; and 4) to identify the differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles. The population for this study was the key informants at the corporations in the three industry areas: wholesale and retail trade; manufacturing; and hotels and restaurants. The survey instrument was delivered to 353 key informants, i.e. HR persons, at 240 corporations and 237 key informants at 166 corporations returned the survey instrument for a return rate of 67.1%. The findings of this study revealed the followings: 1) there are four types of organizational learning styles and the characteristics of each type of organizational learning style is determined by the combination of the organizations?? learning orientations, i.e. Knowledge Source, Learning Content, Dissemination Mode, and Learning Scope; 2) types of organizational culture, industry classification, and the size of an organization are the factors that differentiate the organizations with different organizational learning styles; 3) all roles of HRD are necessary for facilitating organizational learning; and 4) there are not differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles.

Jeong, Jinchul

2003-05-01T23:59:59.000Z

46

Alaska NAD 83 Official Protraction Diagram (OPD) Outlines | Data...  

NLE Websites -- All DOE Office Websites (Extended Search)

NAD 83 Official Protraction Diagram (OPD) Outlines Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov Communities Ocean ...

47

Alaska NAD 83 Official Protraction Diagram (OPD) Outlines (clipped...  

NLE Websites -- All DOE Office Websites (Extended Search)

Official Protraction Diagram (OPD) Outlines (clipped) Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov Communities Ocean ...

48

Study on Hydrodynamic Outline of an Unmanned Underwater Vehicle  

Science Conference Proceedings (OSTI)

Unmanned Underwater Vehicle (UUV) is being widely developed and used in many areas. In order to meet the low resistance and low noise requirements of a kind of UUV for long voyage, the outline curve and parameters of different sections of the UUV are ... Keywords: Unmanned underwater vehicle, Hydrodynamic outline, Low resistance, Low noise

Shao Zhiyu, Fang Jing, Feng Shunshan, Cheng Yufeng

2013-01-01T23:59:59.000Z

49

Optical key system  

Science Conference Proceedings (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, K.G.; Clough, R.E.

2000-04-25T23:59:59.000Z

50

Optical key system  

DOE Patents (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

51

Vice President Biden Outlines Funding for Smart Grid Initiatives |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outlines Funding for Smart Grid Initiatives Outlines Funding for Smart Grid Initiatives Vice President Biden Outlines Funding for Smart Grid Initiatives April 16, 2009 - 12:00am Addthis Washington, DC - Vice President Joe Biden, on a visit to Jefferson City, Missouri, today with Commerce Secretary Gary Locke, detailed plans by the Department of Energy to develop a smart, strong and secure electrical grid, which will create new jobs and help deliver reliable power more effectively with less impact on the environment to customers across the nation. As part of the American Recovery and Reinvestment Act, the Vice President outlined plans to distribute more than $3.3 billion in smart grid technology development grants and an additional $615 million for smart grid storage, monitoring and technology viability.

52

President Obama to Outline Plan for America's Energy Security | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Outline Plan for America's Energy Security to Outline Plan for America's Energy Security President Obama to Outline Plan for America's Energy Security March 30, 2011 - 12:00am Addthis Today at 11:20 AM ET, President Obama will deliver a speech at Georgetown University where he will outline his plan for America's energy security. The speech will be streamed live online at www.whitehouse.gov/live. The White House Fact Sheet on America's Energy Security is below. Also, on Friday, April 1, the President will visit a UPS shipping facility in Landover, MD where he will view vehicles from AT&T, FedEx, PepsiCo, UPS and Verizon's clean fleets and deliver remarks to the companies' employees. THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE March 30, 2011 FACT SHEET: America's Energy Security

53

President Obama to Outline Plan for America's Energy Security | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama to Outline Plan for America's Energy Security President Obama to Outline Plan for America's Energy Security President Obama to Outline Plan for America's Energy Security March 30, 2011 - 12:00am Addthis Today at 11:20 AM ET, President Obama will deliver a speech at Georgetown University where he will outline his plan for America's energy security. The speech will be streamed live online at www.whitehouse.gov/live. The White House Fact Sheet on America's Energy Security is below. Also, on Friday, April 1, the President will visit a UPS shipping facility in Landover, MD where he will view vehicles from AT&T, FedEx, PepsiCo, UPS and Verizon's clean fleets and deliver remarks to the companies' employees. THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE March 30, 2011 FACT SHEET: America's Energy Security

54

Fixed-outline thermal-aware 3D floorplanning  

Science Conference Proceedings (OSTI)

In this paper, we present a novel algorithm for 3D floorplanning with fixed outline constraints and a particular emphasis on thermal awareness. A computationally efficient thermal model that can be used to guide the thermal-aware floorplanning algorithm ...

Linfu Xiao; Subarna Sinha; Jingyu Xu; Evangeline F. Y. Young

2010-01-01T23:59:59.000Z

55

DOE Outlines Research Needed to Improve Solar Energy Technologies |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Outlines Research Needed to Improve Solar Energy Technologies Outlines Research Needed to Improve Solar Energy Technologies DOE Outlines Research Needed to Improve Solar Energy Technologies August 12, 2005 - 2:39pm Addthis WASHINGTON, D.C. - To help achieve the Bush Administration's goal of increased use of solar and other renewable forms of energy, the Department of Energy's (DOE) Office of Science has released a report describing the basic research needed to produce "revolutionary progress in bringing solar energy to its full potential in the energy marketplace." The report resulted from a workshop of 200 scientists held earlier this year. "The tax credits contained in the historic energy bill signed by President Bush will greatly help expand the use of renewable energy," said Dr. Raymond L. Orbach, Director of DOE's Office of Science. "This research

56

Extraction of Typographic Elements from Outline Representations of Fonts  

E-Print Network (OSTI)

Digital typefaces for computer graphics and multimedia applications must be capable of supporting operations such as font variations, transformations, deformations and blending. A powerful implementation of such operations must rely on the inherent typographic attributes of the typeface. However, even today's most advanced typeface representations support only geometric outline representations and basic font variations. In this paper we discuss high-level typeface representations which we term Parametric Typographic Representations (PTRs). We present an algorithm for automatically extracting typographic elements of typefaces from their outline representation, which is an essential initial step in converting typefaces from outline representations to PTRs. The extracted typographic elements include serifs, bars, stems, slants, bows, arcs, curve stems and curve bars. Most notable is the treatment of serifs, which are represented by finite-automata. The algorithm only needs to learn a ser...

Ariel Shamir; Ari Rappoport

1996-01-01T23:59:59.000Z

57

O'Leary outlines policy views at confirmation hearing  

Science Conference Proceedings (OSTI)

In her confirmation hearing, Secretary O'Leary outlined her views on various controversial issues. Among these were management of Yucca Mountain and the search for a nuclear waste repository, research on alternative fuels, encouragement of the use of renewable energy sources, and her views on intergrated resource planning.

Simpson, J.

1993-02-15T23:59:59.000Z

58

UFO: unified convex optimization algorithms for fixed-outline floorplanning  

Science Conference Proceedings (OSTI)

In this paper, we apply two convex optimization methods, named UFO, for fixed-outline floorplanning. Our approach consists of two stages which are a global distribution stage and a local legalization stage. In the first stage, we first transform modules ...

Jai-Ming Lin; Hsi Hung

2010-01-01T23:59:59.000Z

59

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

60

SMOOTH OIL & GAS FIELD OUTLINES MADE FROM BUFFERED WELLS  

U.S. Energy Information Administration (EIA) Indexed Site

The VBA code provided at the bottom of this document is an updated version The VBA code provided at the bottom of this document is an updated version (from ArcGIS 9.0 to ArcGIS 9.2) of the polygon smoothing algorithm described below. A bug that occurred when multiple wells had the same location was also fixed. SMOOTH OIL & GAS FIELD OUTLINE POLYGONS MADE FROM BUFFERED WELLS Why smooth buffered field outlines? See the issues in the figure below: [pic] The smoothing application provided as VBA code below does the following: Adds area to the concave portions; doesn't add area to convex portions to maintain buffer spacing Fills in non-field "islands" smaller than buffer size Joins separate polygon rings with a "bridge" if sufficiently close Minimizes increase in total field area Methodology: creates trapezoids between neighboring wells within an oil/gas

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Multiparty quantum key agreement with single particles  

Science Conference Proceedings (OSTI)

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. ... Keywords: Quantum cryptography, Quantum information, Quantum key agreement

Bin Liu; Fei Gao; Wei Huang; Qiao-Yan Wen

2013-04-01T23:59:59.000Z

62

BUDGET KEY DATES  

Science Conference Proceedings (OSTI)

BUDGET KEY DATES. For Immediate Release: December 15, 2009. Contact: Diane Belford 301-975-8400. Budget Key Dates.

2013-06-16T23:59:59.000Z

63

Underground oil shale retorting. [Basic principles are outlined  

DOE Green Energy (OSTI)

The basic principles involved in combustion processing of oil shale are outlined. The manual is designed to serve as an introduction to the subject for the support personnel of the LLL Oil Shale Project. The material is presented in a simple two page format with one page devoted to a figure or table and the facing page contains a brief description of that material. Thus, it can serve as a self-study guide. Following a brief description of oil shale, how it was formed, and the extent of the resource, an overview of the concepts and major technical problems of Modified In-Situ (MIS) Oil Shale Retorting is presented. Finally, the liquid product, shale oil, is compared with typical petroleum crudes.

Campbell, J.H.; Raley, J.H.

1980-02-01T23:59:59.000Z

64

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

65

The importance of parameter variances, correlations lengths, and cross-correlations in reactive transport models: key considerations for assessing the need for microscale information  

SciTech Connect

A process-oriented modeling approach is implemented to examine the importance of parameter variances, correlation lengths, and especially cross-correlations in contaminant transport predictions over large scales. It is shown that the most important consideration is the correlation between flow rates and retardation processes (e.g., sorption, matrix diffusion) in the system. lf flow rates are negatively correlated with retardation factors in systems containing multiple flow pathways, then characterizing these negative correlation(s) may have more impact on reactive transport modeling than microscale information. Such negative correlations are expected in porous-media systems where permeability is negatively correlated with clay content and rock alteration (which are usually associated with increased sorption). Likewise, negative correlations are expected in fractured rocks where permeability is positively correlated with fracture apertures, which in turn are negatively correlated with sorption and matrix diffusion. Parameter variances and correlation lengths are also shown to have important effects on reactive transport predictions, but they are less important than parameter cross-correlations. Microscale information pertaining to contaminant transport has become more readily available as characterization methods and spectroscopic instrumentation have achieved lower detection limits, greater resolution, and better precision. Obtaining detailed mechanistic insights into contaminant-rock-water interactions is becoming a routine practice in characterizing reactive transport processes in groundwater systems (almost necessary for high-profile publications). Unfortunately, a quantitative link between microscale information and flow and transport parameter distributions or cross-correlations has not yet been established. One reason for this is that quantitative microscale information is difficult to obtain in complex, heterogeneous systems. So simple systems that lack the complexity and heterogeneity of real aquifer materials are often studied. Another is that instrumentation used to obtain microscale information often probes only one variable or family of variables at a time, so linkages to other variables must be inferred by indirect means from other lines of evidence. Despite these limitations, microscale information can be useful in the development and validation of reactive transport models. For example, knowledge of mineral phases that have strong affinities for contaminants can help in the development of cross-correlations between flow and sorption parameters via characterization of permeability and mineral distributions in aquifers. Likewise, microscale information on pore structures in low-permeability zones and contaminant penetration distances into these zones from higher-permeability zones (e.g., fractures) can provide valuable constraints on the representation of diffusive mass transfer processes between flowing porosity and secondary porosity. The prioritization of obtaining microscale information in any groundwater system can be informed by modeling exercises such as those conducted for this study.

Reimus, Paul W [Los Alamos National Laboratory

2010-12-08T23:59:59.000Z

66

Inquiry into August 2003 Gasoline Price Spike … Revised Outline  

Gasoline and Diesel Fuel Update (EIA)

Inquiry into August 2003 Gasoline Price Spike Inquiry into August 2003 Gasoline Price Spike November 2003 Office of Oil and Gas Energy Information Administration U.S. Department of Energy Washington, DC 20585 This report was prepared by the Energy Information Administration, the independent statistical and analytical agency within the Department of Energy. The information contained herein should not be construed as advocating or reflecting any policy position of the Department of Energy or of any other organization. Contacts and Acknowledgments This report was prepared by the Office of Oil and Gas of the Energy Information Administration (EIA) under the direction of John Cook, Director, Petroleum Division. Questions concerning the report may be directed to Joanne Shore (202/586-4677),

67

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

68

Potential Outline of Section 180(c) Policy and Procedures  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

J J Funding Operational Activities I. Introduction Version 22 1 2 4 6 8 10 12 14 16 18 20 22 24 The States believe that the NWPA creates an obligation on Department of Energy to cover all costs related to SNF/HLW transportation, whether the funds flow through Section 180(c) or another funding mechanism. 1 Since Section 180(c) has been interpreted by DOE's Office of General Counsel as applying strictly to "training-related" activities, this issue paper explores other funding mechanisms available to pay for non-training activities. These activities may include inspections, tracking, escorting, public information, and other operational activities related to accident prevention and emergency response.

69

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions  

Science Conference Proceedings (OSTI)

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed ... Keywords: Fuzzy extractor, Helper data algorithm, Intrinsic PUF, Key distribution, LC-PUFs, Physical unclonable functions, SRAMs, Sensor nodes

Jorge Guajardo; Boris kori?; Pim Tuyls; Sandeep S. Kumar; Thijs Bel; Antoon H. Blom; Geert-Jan Schrijen

2009-03-01T23:59:59.000Z

70

The Key Agreement Schemes  

Science Conference Proceedings (OSTI)

... The three key derivation functions include KDF in Counter Mode, KDF in Feedback Mode, and KDF in Double-Pipeline Iteration Mode. ...

2013-04-23T23:59:59.000Z

71

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

72

Glossary of Key Information Security Terms  

Science Conference Proceedings (OSTI)

... Certified TEMPEST Technical Authority (CTTA) An experienced, technically qualified US government employee who has met established ...

2013-06-04T23:59:59.000Z

73

SR Key Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Facts Savannah River Site Budget FY 2011 Budget Summary FY 2011 SRS EM Program Budget Summary FY 2012 Presidential Budget Request for SRS FY 2014 SRS EM Budget Presentation...

74

Key masking using biometry  

Science Conference Proceedings (OSTI)

We construct an abstract model based on a fundamental similarity property, which takes into account parametric dependencies and reflects a specific collection of requirements. We consider a method for masking a cryptographic key using biometry, which ...

A. L. Chmora

2011-06-01T23:59:59.000Z

75

inform  

Science Conference Proceedings (OSTI)

The monthly member publication of AOCS. inform Inform Magazine Membership Merchandise Subscriptions Journals Membership Merchandise 8C5A902BB64F1A5D499524EFF5918AE0 INFORM-NM 2008

76

DRAFT OUTLINE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE/E A - 1884 Yuma County, Colorado U. S. Department of Energy Western Area Power Administration December 2012 Wray Wind Energy Project Environmental Assessment For DOE/E A - 1884 Yuma County, Colorado U. S. Department of Energy Western Area Power Administration December 2012 THIS P AGE INTENTIONALLY BLAN K Table of Contents Table of Contents i W ray W ind Energy Project EA TABLE OF CONTENTS 1.0 INTRODUCTION ............................................................................................................ 1 -1 1.1 BACKG RO UND .................................................................................................................................1.1-1 1.2 PURPOS E AND NEED ........................................................................................................................1.2-1

77

BRIEFING OUTLINE  

Science Conference Proceedings (OSTI)

... several points within the sewer system, at the wastewater treatment facility, or ... the NIST Boulder Laboratories by the Department of Energy Office of ...

2010-05-03T23:59:59.000Z

78

High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution  

E-Print Network (OSTI)

The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can provide high secret key rate even when the transmission fiber is longer than 150km, which may make the continuous variable scheme to outvie the single photon one.

Yi-bo Zhao; Zheng-fu Han; Jin-jian Chen; You-zhen Gui; Guang-can Guo

2006-03-08T23:59:59.000Z

79

ARM - Key Science Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

govScienceKey Science Questions govScienceKey Science Questions Science Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) ARM Science Team Meetings User Meetings Annual Meetings of the Atmospheric System Research (ASR) Science Team and Fall Working Groups Accomplishments Read about the 20 years of accomplishments (PDF, 696KB) from the ARM Program and user facility. Performance Metrics ASR Metrics 2009 2008 2007 2006 Key Science Questions The role of clouds and water vapor in climate change is not well understood; yet water vapor is the largest greenhouse gas and directly affects cloud cover and the propagation of radiant energy. In fact, there may be positive feedback between water vapor and other greenhouse gases. Carbon dioxide and other gases from human activities slightly warm the

80

Presentation to the EAC - Smart Grid Customer Acceptance Paper Outline - Wanda Reder  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Customer Acceptance Customer Acceptance Paper Outline Electricity Advisory Committee October 16,2012 ∗ Wanda Reder ∗ Susan Kelly ∗ Bob Curry ∗ Phyllis Reha ∗ Elliot Roseman ∗ Paula Klein Thanks To ∗ In Smart Grid Committee, Conclusion That Issues & Challenges Associated With Consumer Acceptance Required More Detailed Discussion ∗ Reaching This Conclusion Close To October EAC Meeting Resulted In A Detailed Outline Of A Paper Being Achievable Why Separate Paper On Consumer Acceptance & Why An Outline? ∗ Brief Discussion Of Detailed Outline & Draft Recommendations To Guide Developing A Full Paper For EAC Review ∗ Comments Can Be Submitted Over The Next Two Weeks ∗ Develop An Approach & Schedule To Develop Full Paper For EAC Review

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

AER 1316H: Introduction and Course Outline Professor D.W. Zingg  

E-Print Network (OSTI)

AER 1316H: Introduction and Course Outline Professor D.W. Zingg (416-667-7709, dwz, by H. Lomax, T.H. Pulliam, and D.W. Zingg, Springer-Verlag, 2001. (Available at the U. of T. textbook

Zingg, David W.

82

AP Key Accomplishments  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments Reduction of Carbon Dioxide Mechanistic insight into CO2 hydrogenation Rapid Transfer of Hydride Ion from a Ruthenium Complex to C1 Species in Water Reversible Hydrogen Storage using CO2 and a Proton-Switchable Iridium Catalyst in Aqueous Media Nickel(II) Macrocycles: Highly Efficient Electrocatalysts for the Selective Reduction of CO2 to CO Calculation of Thermodynamic Hydricities and the Design of Hydride Donors for CO2 Reduction Mechanisms for CO Production from CO2 Using Re(bpy)(CO)3X Catalysts Hydrogen Production Biomass-derived electrocatalytic composites for hydrogen evolution Hydrogen-Evolution Catalysts Based on NiMo Nitride Nanosheets Water Oxidation Enabling light-driven water oxidation via a low-energy RuIV=O intermediate

83

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eves side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eves memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

84

MECH 410N Outline-2010.doc MECH 410N -Internal Combustion Engines  

E-Print Network (OSTI)

MECH 410N Outline-2010.doc 01/09/2010 MECH 410N - Internal Combustion Engines COURSE OUTLINE 1-IGNITION ENGINES 2.1. Air-Standard & Fuel-Air Cycle analysis 2.2. Performance Criteria 2.3. SI Engine Combustion 3.2. The Limited Pressure Cycle 3.3. The fuel-air cycle with complete combustion 3.4. Turbocharged

85

Natural Gas Markets: Recent Changes and Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Natural Gas Markets: Recent Changes and Key Drivers for

86

Report Identifies Three Key R&D Priorities for Future ...  

Science Conference Proceedings (OSTI)

... Networking and Information Technology Research and Development Program. For more details, see Report Identifies Three Key R&D Priorities for ...

2011-07-18T23:59:59.000Z

87

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

88

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

89

Information Release Notice - Energy Information Administration  

U.S. Energy Information Administration (EIA)

On February 22, 2010, the Energy Information Administration (EIA) will change the web addresses for key information releases in the Weekly Natural Gas Storage Report ...

90

City of Chula Vista This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

- Thursday 8:00AM - 5:00PM · Federal Solar Incentives o Residential Renewable Energy Tax Credit · A taxpayer_Code=U S02F&re=1&ee=1 · Property Assessed Clean Energy (PACE) Programs o CaliforniaFIRST - The CityCity of Chula Vista This page outlines solar PV incentives, financing mechanisms, permitting

91

City of San Diego This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

to actual energy use and is responsible for system performance, operations and maintenance. #12; www.energycenter.org/index.php/incentive-programs/california-solar- initiative/csi-latest-news/2167-why-pay-to-install-solar · Property Assessed Clean Energy (PACE) Programs oCity of San Diego This page outlines solar PV incentives, financing mechanisms, permitting process

92

AER 1318H: Introduction and Course Outline 2012 Professor D.W. Zingg  

E-Print Network (OSTI)

AER 1318H: Introduction and Course Outline 2012 Professor D.W. Zingg (416-667-7709, dwz.H. Pulliam and D.W. Zingg (will be dis- tributed in pdf form). Schedule and Mark Breakdown 1. Jan. 18 Lecture

Zingg, David W.

93

County of Los Angeles This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

/csi-latest-news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Property Assessed Clean Energy (PACECounty of Los Angeles This page outlines solar PV incentives, financing mechanisms, permitting

94

City of Long Beach This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

/csi-latest-news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Property Assessed Clean Energy (PACECity of Long Beach This page outlines solar PV incentives, financing mechanisms, permitting process

95

City of Santa Ana This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

/csi-latest-news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Secured Financing Secured financingCity of Santa Ana This page outlines solar PV incentives, financing mechanisms, permitting process

96

City of Palmdale This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

/csi-latest-news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Property Assessed Clean Energy (PACECity of Palmdale This page outlines solar PV incentives, financing mechanisms, permitting process

97

City of Palm Desert This page outlines solar PV incentives, financing mechanisms, permitting process, and  

E-Print Network (OSTI)

/csi-latest-news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Property Assessed Clean Energy (PACECity of Palm Desert This page outlines solar PV incentives, financing mechanisms, permitting

98

City of Santa Monica This page outlines solar PV incentives, financing mechanisms, permitting process, and interconnection  

E-Print Network (OSTI)

-initiative/csi-latest- news/2167-why-pay-to-install-solar o Southern California Edison Solar Rooftop Program · This commercial energy grid. www.sce.com/solarleadership/solar-rooftop-program/ Property Assessed Clean Energy (PACECity of Santa Monica This page outlines solar PV incentives, financing mechanisms, permitting

99

Outline The Ensemble Kalman Filter Parameter estimation Test example Conclusion History matching via  

E-Print Network (OSTI)

Outline The Ensemble Kalman Filter Parameter estimation Test example Conclusion History matching estimation Test example Conclusion Test case setup · For the test case we use CERE's own in-house Black Oil estimation Test example Conclusion Test case setup · For the test case we use CERE's own in-house Black Oil

Mosegaard, Klaus

100

Chemical Hygiene Plan The purpose of the Chemical Hygiene Plan (CHP) is to outline laboratory work  

E-Print Network (OSTI)

Chemical Hygiene Plan I. Policy The purpose of the Chemical Hygiene Plan (CHP) is to outline community are protected from health hazards associated with chemicals with which they work. II. Authority The Chemical Hygiene Plan, required to comply with provisions of CCR Title 8 §5191 et al: A. Standard Operating

de Lijser, Peter

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Explaining culture: an outline of a theory of socio-technical interactions  

Science Conference Proceedings (OSTI)

This paper presents four criticisms of positivistic research in cross-cultural human-computer interactions. An outline of a theory of cultural influences in socio-technical systems is then presented. Based on the ecological approach to perception and ... Keywords: comparative informatics, computer supported intercultural collaboration (csic), culture, perception and appropriation of affordances, socio-technical interactions, structures and functions of technological intersubjectivity

Ravi K. Vatrapu

2010-08-01T23:59:59.000Z

102

New report from White House outlines largest problems facing United States  

Open Energy Info (EERE)

New report from White House outlines largest problems facing United States New report from White House outlines largest problems facing United States energy grid Home > Blogs > Graham7781's blog Graham7781's picture Submitted by Graham7781(2002) Super contributor 16 August, 2013 - 12:21 energy grid OpenEI President Smart Grid United States White House On Monday, the White House released a new report that identifies the one of the biggest problems facing today's power grid. As prepared by the President's Council of Economic Advisers, the U.S. Department of Energy's Office of Electricity Delivery and Energy Reliability and the White House Office of Science and Technology, the report, entitled "Economic Benefits of Increasing Electric Grid Resilience to Weather Outages," states that the grid is extremely vulnerable to power outages due

103

Automatic Verification of String Manipulating ProgramsOverview Outline Overview Symbolic String Verification Composite Verification References  

E-Print Network (OSTI)

Is it Vulnerable? We investigate string verification problem and present an automata-based approach for automatic verification of string manipulating programs based on symbolic string analysis. String analysis plays an important role in the security area. For instance, one can detect various web vulnerabilities like SQL Command Injection and Cross Site Scripting (XSS) attacks. Fang Yu, UCSB Automatic Verification of String Manipulating ProgramsOutline

Fang Yu; Cs Guest Leture

2009-01-01T23:59:59.000Z

104

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

Transportation Energy Futures Study: The Key Results and Conclusions Transportation Energy Futures Study: The Key Results and Conclusions Webinar Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 1 May, 2013 - 11:38 This webinar will outline the key results and conclusions from EERE's Transportation Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be time for questions from attendees at the end of the webinar. Principal Deputy Assistant Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on cross-cutting activities in EERE's portfolio. In particular, he is using his experience in policy

105

Quantum Information Portal  

Science Conference Proceedings (OSTI)

... Quantum Devices; Quantum Information Technology; Quantum Key Distribution; ... Entangled photon generation in a phase-modulated, quasi ...

2013-10-23T23:59:59.000Z

106

Background on Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... Background on Quantum Key Distribution. ... If someone, referred to by cryptographers as Eve, tries to eavesdrop on the transmission, she will not ...

2011-08-02T23:59:59.000Z

107

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

108

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

109

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

110

Projected refined product balances in key Latin American countries: A preliminary examination  

SciTech Connect

Over the years, the East-West Center (EWC) has developed considerable expertise in refinery modeling, especially in the area of forecasting product balances for countries, given planned capacity changes, changes in product demand, changes in crude slates, and changes in product specifications. This expertise has been applied on an ongoing basis to the major refiners in the Middle East and the Asia-Pacific region, along with the US West Coast as region in its own right. Refinery modeling in these three areas has been ongoing for nearly 15 years at the Center, and the tools and information sources are now well developed. To date, the EWC has not applied these tools to Latin America. Although research on Latin America has been an ongoing area of concern at the Center in recent years, the information gathered to date is still not of the level of detail nor quality available for other areas. The modeling efforts undertaken in this report are of a ``baseline`` nature, designed to outline the major issues, attempt a first cut at emerging product balances, and, above all, to elicit commentary from those directly involved in the oil industry in the key countries modeled. Our experience in other regions has shown that it takes a few years dialogue with refiners and government planner in individual countries to develop a reliable database, as well as the insights into operational constraints and practices that make accurate modeling possible. This report is no more than a first step down the road.

1996-06-01T23:59:59.000Z

111

Information Repository  

NLE Websites -- All DOE Office Websites (Extended Search)

3 Information Repository Documents 3 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 14, 2013 Class 1 Permit Modifications and NMED Responses Class 1 Modification, August 29, 2013 WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088. (1. revise a course outline; 2. revise table and panel figures to include Panel 7; 3. update description related to Type B Packages; and 4. update TRUPACT-II and HalfPACT figures) JE Kieling, NMED dated October 13, 2013 Fee Assessment Class 1 Permit Modification WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088-TSDF (Revise a Course Outline; Revise Table and Panel Figures to Include Panel 7; Update Descriptions Related to Type B Packages; and Update TRUPACT-ll and HalfPACT Figures) JM Kieling, NMED dated September 23, 2013

112

Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy Considerations At Microsoft, we see information technology (IT) as a key tool to help address the daunting en-  

E-Print Network (OSTI)

Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy in energy conservation and integration of more renewable and zero-carbon energy sources into our economy. Microsoft envisions a clean energy ecosystem where information technology: · Empowers people

Narasayya, Vivek

113

Key Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Activities Key Activities Key Activities The Water Power Program conducts work in four key areas at the forefront of water power research. The Program is structured to help the United States meet its growing energy demands sustainably and cost-effectively by developing innovative renewable water power technologies, breaking down market barriers to deployment, building the infrastructure to test new technologies, and assessing water power resources for integration into our nation's grid. Research and Development Introduce and advance new marine and hydrokinetic technologies to provide sustainable and cost-effective renewable energy from the nation's waves, tides, currents, and ocean thermal gradients. Research and develop innovative hydropower technologies to sustainably tap our country's diverse water resources including rivers,

114

Key China Energy Statistics 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Title Key China Energy Statistics 2011 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

115

Key China Energy Statistics 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Title Key China Energy Statistics 2012 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

116

EPAct Transportation Regulatory Activities: Key Terms  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Terms Key Terms to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Terms on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Terms on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Terms on Google Bookmark EPAct Transportation Regulatory Activities: Key Terms on Delicious Rank EPAct Transportation Regulatory Activities: Key Terms on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Terms on AddThis.com... Home About Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Guidance Documents Statutes & Regulations Program Annual Reports Fact Sheets Newsletter Case Studies Workshops Tools Key Terms FAQs Key Terms The Energy Policy Act (EPAct) includes specific terminology related to

117

EPAct Transportation Regulatory Activities: Key Federal Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Key Federal Statutes to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Federal Statutes on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Federal Statutes on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Google Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Delicious Rank EPAct Transportation Regulatory Activities: Key Federal Statutes on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Federal Statutes on AddThis.com... Home About Contacts Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Key Federal Statutes These are excerpts from federal statutes that established key Energy Policy Act (EPAct) transportation regulatory activities.

118

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

119

Key Workplace Documents Federal Publications  

E-Print Network (OSTI)

, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devicesKey Workplace Documents Federal Publications Cornell University ILR School Year 2008 China/498 #12;Order Code RL33536 China-U.S. Trade Issues Updated March 7, 2008 Wayne M. Morrison Specialist

120

Key technology trends - Satellite systems  

Science Conference Proceedings (OSTI)

This paper is based on material extracted from the WTEC Panel Report Global Satellite Communications Technology and Systems, December 1998. It presents an overview of key technology trends in communications satellites in the last few years. After the ... Keywords: Communications satellites, Satellite communications, Satellite technology overview

Charles W. Bostian; William T. Brandon; Alfred U. Mac Rae; Christoph E. Mahle; Stephen A. Townes

2000-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Table A4. Residential sector key indicators and consumption  

Gasoline and Diesel Fuel Update (EIA)

3 3 U.S. Energy Information Administration | Annual Energy Outlook 2013 Reference case Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Energy Information Administration / Annual Energy Outlook 2013 Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020 2025 2030 2035 2040 Key indicators Households (millions) Single-family ....................................................... 82.85 83.56 91.25 95.37 99.34 103.03 106.77 0.8% Multifamily ........................................................... 25.78 26.07 29.82 32.05 34.54 37.05 39.53 1.4%

122

The Outlook for Electricity Supply and Demand to 2035: Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov The Outlook for Electricity Supply and Demand to 2035: Key Drivers

123

Key China Energy Statistics 2011  

E-Print Network (OSTI)

information about the LBNL China Energy Group, go to ourUS Dollars/Gallon Mainland China Germany Japan Mexico SouthVessels Refueling in China Stock Change Total Transformation

Levine, Mark

2013-01-01T23:59:59.000Z

124

NREL: Regulatory Support - Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

The Regulatory Support team assists the U.S. Department of Energy by providing regulatory information related to the Energy Policy Act of 1992 and other legislation to help build...

125

Key Blog Distillation: Ranking Aggregates  

E-Print Network (OSTI)

Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

Macdonald, C.; Ounis, I.

126

Rotating Plasma Finding is Key for ITER  

NLE Websites -- All DOE Office Websites (Extended Search)

Plasma Finding is Key for ITER Rotating Plasma Finding is Key for ITER PlasmaTurbulenceCSChang.png Tokamak turbulence showing inward-propagating streamers from normalized...

127

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities in Key Activities in Vehicles to someone by E-mail Share Vehicle Technologies Office: Key Activities in Vehicles on Facebook Tweet about Vehicle Technologies Office: Key Activities in Vehicles on Twitter Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Google Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Delicious Rank Vehicle Technologies Office: Key Activities in Vehicles on Digg Find More places to share Vehicle Technologies Office: Key Activities in Vehicles on AddThis.com... Key Activities Mission, Vision, & Goals Plans, Implementation, & Results Organization & Contacts National Laboratories Budget Partnerships Key Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or

128

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities to Key Activities to someone by E-mail Share Fuel Cell Technologies Office: Key Activities on Facebook Tweet about Fuel Cell Technologies Office: Key Activities on Twitter Bookmark Fuel Cell Technologies Office: Key Activities on Google Bookmark Fuel Cell Technologies Office: Key Activities on Delicious Rank Fuel Cell Technologies Office: Key Activities on Digg Find More places to share Fuel Cell Technologies Office: Key Activities on AddThis.com... Key Activities Plans, Implementation, & Results Accomplishments Organization Chart & Contacts Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Technology Validation Manufacturing Codes & Standards Education Systems Analysis Contacts Key Activities The Fuel Cell Technologies Office conducts work in several key areas to

129

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Activities in Vehicles Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or improving performance, power, and comfort. Research and development (R&D); testing and analysis; government and community stakeholder support; and education help people access and use efficient, clean vehicles that meet their transportation needs. Researcher loads a sample mount of battery cathode materials for X-ray diffraction, an analysis tool for obtaining information on the crystallographic structure and composition of materials. Research and Development of New Technologies Develop durable and affordable advanced batteries as well as other forms of energy storage. Improve the efficiency of combustion engines.

130

Key decisions near for Chad pipeline proposal  

Science Conference Proceedings (OSTI)

The World Bank is expected to play a key role in a proposed $3 billion development of oil fields in Chad and an export pipeline through Cameroon to the Atlantic Ocean. The project, which has been at least 4 years in the making, could see a breakthrough later this year. Esso Exploration and production Chad Inc. is operator for the consortium proposing the project. It holds a 40% interest, Ste. Shell Tchadienne de Recherches et d`Exploitation has 40%, and Elf Hydrocarbures Tchad has a 20% share it purchased from Chevron Corp. in 1993 (OGJ, February 1, 1993, p 25). The governments of Chad and Cameroon, which had approved a framework agreement for the pipeline in 1995, now are studying an assessment of the pipeline`s environmental impact. If they approve the plans, they are expected to apply to the World Bank for financing. The paper describes the Chad fields, the export pipeline, background information, and the Banks role.

Crow, P.

1997-05-12T23:59:59.000Z

131

Information Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 25, 2008 November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel Management and Disposal Act" submitted to Congress March 6, 2007 3. State-by-State Maps that outline each state's electricity generation mix, commercial spent nuclear fuel inventories, and payments into the Nuclear Waste Fund The additional information on the history of the use of engineered barriers will be

132

Low Complexity Spatio-Temporal Key Frame Encoding for Wyner-Ziv Video Coding  

Science Conference Proceedings (OSTI)

In most Wyner-Ziv video coding approaches, the temporal correlation of key frames is not exploited since they are simply intra encoded and decoded. In this paper, using the previously decoded key frame as the side information for the key frame to be ... Keywords: Wyner-Ziv coding, Distributed video coding

Ghazaleh Esmaili; Pamela Cosman

2009-03-01T23:59:59.000Z

133

Key Climate Variables Relevant to the Energy Sector and Electric Utilities  

Science Conference Proceedings (OSTI)

Changes in climate affect the energy sector and electric utilities through changes in demand, altered production and transmission capabilities, and effects on the operation of utility infrastructure. Unfortunately, few studies have been conducted on the impacts of climate change on the energy sector. This report outlines some key climate variables that may affect the energy sector, including long-term trends such as increases in air temperature, water temperatures, and sea-level rise; changes in precipit...

2009-03-31T23:59:59.000Z

134

Algorithms for dynamic multicast key distribution  

Science Conference Proceedings (OSTI)

We study the problem of multicast key distribution for group security. Secure group communication systems typically rely on a group key, which is a secret shared among the members of the group. This key is used to provide privacy by encrypting all group ... Keywords: Dynamic key distribution, experimental algorithms, multicast

Justin Goshi; Richard E. Ladner

2007-02-01T23:59:59.000Z

135

SunShot Initiative: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities Printable Version Share this resource Send a link to SunShot Initiative: Key Activities to someone by E-mail Share SunShot Initiative: Key Activities on Facebook Tweet about SunShot Initiative: Key Activities on Twitter Bookmark SunShot Initiative: Key Activities on Google Bookmark SunShot Initiative: Key Activities on Delicious Rank SunShot Initiative: Key Activities on Digg Find More places to share SunShot Initiative: Key Activities on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Key Activities Under the SunShot Initiative, the DOE Solar Office issues competitive solicitations that fund selective research projects aimed at transforming the ways the United States generates, stores, and utilizes solar energy.

136

Renewable Energy Community: Key Elements  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy of Energy Office of Energy Efficiency & Renewable Energy National Renewable Energy Laboratory Innovation for Our Energy Future A Renewable Energy Community: Key Elements A reinvented community to meet untapped customer needs for shelter and transportation with minimal environmental impacts, stable energy costs, and a sense of belonging N. Carlisle, J. Elling, and T. Penney Technical Report NREL/TP-540-42774 January 2008 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle

137

Key Biscayne, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Biscayne, Florida: Energy Resources Biscayne, Florida: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 25.693713°, -80.1628248° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":25.693713,"lon":-80.1628248,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

138

Revision 1 Glossary of Key Information Security Terms  

E-Print Network (OSTI)

We have received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been extracted from NIST Federal

Richard Kissel; Patrick D. Gallagher; Director Introduction

2011-01-01T23:59:59.000Z

139

Key World Energy Statistics-2010 | Open Energy Information  

Open Energy Info (EERE)

AgencyCompany Organization: International Energy Agency Sector: Energy Topics: Market analysis Resource Type: Dataset, Maps Website: www.iea.orgtextbasenppdffree...

140

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 27, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Ray Mabus, Secretary of the Navy, Department of Defense; Donald Remy, General Counsel of the Army, Department of Defense; J. Randolph Babbitt, Administrator, Federal Aviation Administration; Jose D. Riojas, Assistant Secretary for Operations, Security and Preparedness, Department of Veterans Affairs; John Trasviña, Assistant Secretary for Fair Housing and Equal Opportunity, Department of Housing and Urban Development; Lawrence E. Strickling, Assistant Secretary for Communications and Information, Department of Commerce; and Cathy Zoi, Assistant Secretary for Energy Efficiency and

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

142

Verifiable Random Functions from Identity-Based Key Encapsulation  

Science Conference Proceedings (OSTI)

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption ...

Michel Abdalla; Dario Catalano; Dario Fiore

2009-04-01T23:59:59.000Z

143

New and Underutilized Technology: Wrap Around Heat Pipes  

Energy.gov (U.S. Department of Energy (DOE))

The following information outlines key deployment considerations for wrap around heat pipes within the Federal sector.

144

New and Underutilized Technology: Condensing Boilers  

Energy.gov (U.S. Department of Energy (DOE))

The following information outlines key deployment considerations for condensing boilers within the Federal sector.

145

Answering Key Fuel Cycle Questions  

Science Conference Proceedings (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

146

Monitoring solar-thermal systems: An outline of methods and procedures  

DOE Green Energy (OSTI)

This manual discusses the technical issues associated with monitoring solar-thermal systems. It discusses some successful monitoring programs that have been implemented in the past. It gives the rationale for selecting a program of monitoring and gives guidelines for the design of new programs. In this report, solar thermal monitoring systems are classified into three levels. For each level, the report discusses the kinds of information obtained by monitoring, the effort needed to support the monitoring program, the hardware required, and the costs involved. Ultimately, all monitoring programs share one common requirement: the collection of accurate data that characterize some aspect or aspects of the system under study. This report addresses most of the issues involved with monitoring solar thermal systems. It does not address such topics as design fundamentals of thermal systems or the relative merits of the many different technologies employed for collection of solar energy.

Rosenthal, A. [New Mexico State Univ., Las Cruces, NM (United States). Southwest Technology Development Inst.

1994-04-01T23:59:59.000Z

147

TYPiMatch: type-specific unsupervised learning of keys and key values for heterogeneous web data integration  

Science Conference Proceedings (OSTI)

Instance matching and blocking, a preprocessing step used for selecting candidate matches, require determining the most representative attributes of instances called keys, based on which similarities between instances are computed. We show that for the ... Keywords: heterogeneous web data, information integration, unsupervised learning

Yongtao Ma; Thanh Tran

2013-02-01T23:59:59.000Z

148

On multi-column foreign key discovery  

Science Conference Proceedings (OSTI)

A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is a crucial step in understanding and working with the data. Nevertheless, ...

Meihui Zhang; Marios Hadjieleftheriou; Beng Chin Ooi; Cecilia M. Procopiuc; Divesh Srivastava

2010-09-01T23:59:59.000Z

149

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

150

Cryptographic Key Managment Workshop 2012-A Draft ...  

Science Conference Proceedings (OSTI)

... Specify the key generation methods used Specify the random number generators used Specify ... primary and backup facilities ...

2012-09-11T23:59:59.000Z

151

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

152

DOE M 200.1-1 Chapter 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key ...

2000-02-15T23:59:59.000Z

153

Physical key-protected one-time pad  

E-Print Network (OSTI)

We describe an encrypted communication principle that can form a perfectly secure link between two parties without electronically saving either of their keys. Instead, cryptographic key bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 cubic millimeter scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any random bits without fundamentally altering the entire key space. Beyond the demonstrated communication scheme, our ability to securely couple the randomness contained within two unique physical objects may help strengthen the hardware for a large class of cryptographic protocols, which ...

Horstmeyer, Roarke; Vellekoop, Ivo; Yang, Changhuei

2013-01-01T23:59:59.000Z

154

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

155

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

156

New Quantum Key System Combines Speed, Distance  

Science Conference Proceedings (OSTI)

... a prototype high-speed quantum key distribution (QKD) system ... a theoretically unbreakable one-time pad encryption, transmission and decryption ...

2013-07-08T23:59:59.000Z

157

Nanomechanics: New Test Measures Key Properties of ...  

Science Conference Proceedings (OSTI)

Nanomechanics: New Test Measures Key Properties of ... Tests using the wrinkle-crack method, however, show ... to the longest duration tested, 10 days ...

2012-10-18T23:59:59.000Z

158

CODATA Key Values for Thermodynamics - TMS  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... This site includes internationally agreed upon values for thermodynamic properties of key chemical substances established by the Committee...

159

Design and Analysis of Key Comparisons  

Science Conference Proceedings (OSTI)

... new methods, and make statistically best practices available ... to Key Comparisons such as data reporting and ... In the big picture, with the lowering ...

2010-11-18T23:59:59.000Z

160

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Quantum key distribution network with wavelength addressing  

E-Print Network (OSTI)

Most traditional applications of quantum cryptography are point-to-point communications, in which only two users can exchange keys. In this letter, we present a network scheme that enable quantum key distribution between multi-user with wavelength addressing. Considering the current state of wavelength division multiplexing technique, dozens or hundreds of users can be connected to such a network and directly exchange keys with each other. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.

Mo, X F; Han, Z F; Xu, F X; Zhang, T; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Xu, Fang-Xing; Zhang, Tao

2006-01-01T23:59:59.000Z

162

Schedules of Key Environmental Impact Statements  

Energy.gov (U.S. Department of Energy (DOE))

This document graphically displays the milestone dates and projected schedules of key Environmental Impact Statements (updated monthly).This chart represents anticipated activity and is not a...

163

BIASED RANDOM-KEY GENETIC ALGORITHMS WITH ...  

E-Print Network (OSTI)

Handbook of Metaheuristics. Kluwer. Academic Publishers, 2003. J.F. Gonalves and M.G.C. Resende. Biased random-key genetic algorithms for combinatorial...

164

Two key questions about color superconductivity.  

E-Print Network (OSTI)

??We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of (more)

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

165

Comment on "Quantum dense key distribution"  

E-Print Network (OSTI)

In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.

Antoni Wojcik

2004-05-07T23:59:59.000Z

166

Identity-based authenticated asymmetric group key agreement protocol  

Science Conference Proceedings (OSTI)

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key ... Keywords: asymmetric group key agreement, bilinear map, group key agreement, identity-based public-key cryptography

Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer

2010-07-01T23:59:59.000Z

167

DOCS SCMP (ANNOTATED OUTLINE)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NMMSS PROJECT NMMSS PROJECT NMMSS UPGRADE SOFTWARE CONFIGURATION MANAGEMENT PLAN September 2001 Doc No: 135-PL-300A Revision: 1 REVIEWS AND APPROVALS Prepared by: _____________________________ ___________________________ xxxxx Date Software Project Manager _____________________________ ___________________________ xxxxx Date End-User Representative _____________________________ ___________________________ xxxxx Date Security Manager _____________________________ ___________________________ xxxxx Date Software Project Manager's Manager _____________________________ __________________________ xxxxx Date Vice President, Quality Approved by: _____________________________ __________________________

168

NETL Final Report Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Sensor Evaluation for a Robotic In Line Inspection Vehicle for Sensor Evaluation for a Robotic In Line Inspection Vehicle for Detection of Natural Gas Pipeline Defects and Leaks Final Report February 2003 Submitted by Michael Hassard and Gerald Stoker Advanced Diagnostics and Production Testing Department Sandia National Laboratories P.O. Box 5800, MS 0555 And Mark Vaughn and Bob Bickerstaff Mobile Robotics Department Sandia National Laboratories P.O. Box 5800, MS1125 Albuquerque, NM 87185 This work was sponsored by The Strategic Center for Natural Gas Natural Gas Infrastructure Reliability Program, Natural Energy Technology Laboratory (NETL), DOE Office of Fossil Energy ABSTRACT When examining the condition of a pipeline, In-Line Inspection (ILI) utilizing various Non-Destructive Testing (NDT) methods is an essential tool and a significant factor in establishing a quality management

169

OUTLINE FOR PCC REPORT  

NLE Websites -- All DOE Office Websites (Extended Search)

CALIFORNIA ENERGY CALIFORNIA ENERGY COMMISSION PIER Lighting Research Program Project 3.1 Retrofit Fluorescent Dimming with Integrated Lighting Controls FINAL REPORT Consultant Report November 2004 500-01-041-A-5 Arnold Schwarzenegger, Governor Deliverable 3.1.10 Final Report LBNL/Architectural Energy Corporation PIER Lighting Research Program 2 500-01-041 CALIFORNIA ENERGY COMMISSION Prepared By: Lawrence Berkeley National Laboratory Frances Rubinstein, Project Lead Berkeley, CA Managed By: Architectural Energy Corporation Judie Porter Program Director Boulder, CO CEC Contract # 500-01-041 Prepared For: Don Aumann Contract Manager Nancy Jenkins PIER Buildings Program Manager

170

NETL Final Report Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Instrument for Airborne Remote Sensing of Transmission Instrument for Airborne Remote Sensing of Transmission Pipeline Leaks Final Report August 2004 Submitted by Thomas A. Reichardt, Sanjay Devdas, and Thomas J. Kulp Diagnostics and Remote Sensing Department Sandia National Laboratories P.O. Box 969, MS 9056 Livermore, CA 94551 and Wayne Einfeld Environmental Monitoring and Characterization Department Sandia National Laboratories P.O. Box 5800, MS 0755 Albuquerque, NM 87185 This work was sponsored by The Strategic Center for Natural Gas, Natural Gas Infrastructure Reliability Program, National Energy Technology Laboratory (NETL), DOE Office of Fossil Energy Abstract The pipeline industry would benefit considerably from the development of systems that could provide early warning capabilities for major pipeline integrity and safety issues indicated by

171

QUARTERLY REPORT OUTLINE  

NLE Websites -- All DOE Office Websites (Extended Search)

INEEL/EXT-04-02482 INEEL/EXT-04-02482 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Advanced Vehicle Testing Activity NYPA/TH!NK Clean Commute Program Report - Inception through May 2004 TECHNICAL REPORT Don Karner James Francfort Randall Solomon November 2004 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-04-02482 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Advanced Vehicle Testing Activity NYPA/TH!NK Clean Commute Program Report - Inception through May 2004 Don Karner 1 James Francfort 2 Randall Solomon 3 November 2004 Idaho National Engineering and Environmental Laboratory Transportation Technology and Infrastructure Department Idaho Falls, Idaho 83415

172

Contract Management Plan Outline  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TABLE OF CONTENTS TABLE OF CONTENTS 1.0 Introduction/Overview ..................................................................................................... 1 2.0 Purpose/Applicability/Updates and Distribution........................................................... 1 3.0 Contract Summary ........................................................................................................... 3 4.0 Organizational Roles and Contract Oversight Responsibilities ................................... 6 5.0 Contract Authorities, Delegations and Limitations....................................................... 8 6.0 Contract Administration and Oversight....................................................................... 12 7.0 Communication Protocols ..............................................................................................

173

NETL Final Report Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Evaluation of Active and Passive Gas Imagers for Evaluation of Active and Passive Gas Imagers for Transmission Pipeline Remote Leak Detection Final Report December 2002 Submitted by Thomas A. Reichardt, Sanjay Devdas, and Thomas J. Kulp Diagnostics and Remote Sensing Department Sandia National Laboratories P.O. Box 969, MS 9056 Livermore, CA 94551 and Wayne Einfeld Environmental Monitoring and Characterization Department Sandia National Laboratories P.O. Box 5800, MS 0755 Albuquerque, NM 87185 This work was sponsored by The Strategic Center for Natural Gas Natural Gas Infrastructure Reliability Program, National Energy Technology Laboratory (NETL), DOE Office of Fossil Energy 2 Abstract The pipeline industry would benefit considerably from the development of systems that could provide early warning capabilities for major pipeline integrity and safety issues caused by leaks.

174

QUARTERLY REPORT OUTLINE  

NLE Websites -- All DOE Office Websites (Extended Search)

indicating that the Clean Commute Program can have a significant affect on gasoline usage and emissions. * Over 95% of all trips with the THNK city replaced trips that would...

175

NETL Final Report Outline  

NLE Websites -- All DOE Office Websites (Extended Search)

Evaluation of Active and Passive Gas Imagers for Transmission Pipeline Remote Leak Detection Final Report December 2002 Submitted by Thomas A. Reichardt, Sanjay Devdas, and Thomas...

176

2013 AAOCS Abstract Outline  

Science Conference Proceedings (OSTI)

Guidelines for submission Please submit abstracts by Friday the 20th September 2013 - Submissions can be for oral or poster presentations (please indicate preference) - Submit a single paragraph abstract of ...

177

Final draft report outline  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Subcommittee also found the metrics and processes being developed for DOE by Gretchen Jordan, et al. to be valuable (Reference 2). In the current report the Subcommittee has...

178

Outline 2003 ASER  

NLE Websites -- All DOE Office Websites (Extended Search)

Air sparge and bioremediation activities continued at the Rock Springs, Wyoming, Oil Shale Retort site and at the Hoe Creek Underground Coal Gasification sites II and III. Hoe...

179

Outline for today  

Science Conference Proceedings (OSTI)

... Road map on Smart Grid standardization ... 2 . Optimized controls for system storage cells 15. ... 6 . Distribution automation systems 19. ...

2012-06-13T23:59:59.000Z

180

STRBase and Information Resources on Forensic DNA  

E-Print Network (OSTI)

Genetics Information Gathering and Sharing · We live in the information age and need to share what we learn a solid foundation for research and future work #12;Applied Genetics Presentation Outline Information of Journals in Our Group Library We now have on-line access to all forensic DNA journals #12;Applied Genetics

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

General quantum key distribution in higher dimension  

E-Print Network (OSTI)

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1?g?d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key ...

Shi, Han-Duo

182

Robust key extraction from physical uncloneable functions  

Science Conference Proceedings (OSTI)

Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in ... Keywords: authentication, challenge-response pair, error correction, noise, physical uncloneable function, speckle pattern

B. kori?; P. Tuyls; W. Ophey

2005-06-01T23:59:59.000Z

183

General model of quantum key distribution  

E-Print Network (OSTI)

A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.

A. S. Trushechkin; I. V. Volovich

2005-04-20T23:59:59.000Z

184

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

185

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities The Fuel Cell Technologies Office conducts work in several key areas to advance the development and commercialization of hydrogen and fuel cell technologies. Research, Development, and Demonstration Key areas of research, development, and demonstration (RD&D) include the following: Fuel Cell R&D, which seeks to improve the durability, reduce the cost, and improve the performance of fuel cell systems, through advances in fuel cell stack and balance of plant components Hydrogen Fuel R&D, which focuses on enabling the production of low-cost hydrogen fuel from diverse renewable pathways and addressing key challenges to hydrogen delivery and storage Manufacturing R&D, which works to develop and demonstrate advanced manufacturing technologies and processes that will reduce the cost of fuel cell systems and hydrogen technologies

186

residential sector key indicators | OpenEI  

Open Energy Info (EERE)

residential sector key indicators residential sector key indicators Dataset Summary Description This dataset is the 2009 United States Residential Sector Key Indicators and Consumption, part of the Source EIA Date Released March 01st, 2009 (5 years ago) Date Updated Unknown Keywords AEO consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon 2009 Residential Sector Key Indicators and Consumption (xls, 55.3 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm Rate this dataset Usefulness of the metadata Average vote Your vote Usefulness of the dataset Average vote Your vote

187

Common randomness and secret key capacities of two-way channels  

Science Conference Proceedings (OSTI)

Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental primitives in information theory and cryptography. We study these two problems over the two-way communication channel model, introduced by Shannon. In this model, the ... Keywords: common randomness capacity, secret key capacity, two-way channel, wiretap channel

Hadi Ahmadi; Reihaneh Safavi-Naini

2011-05-01T23:59:59.000Z

188

Cryptographic security of the quantum key distribution from the triangle inequality  

E-Print Network (OSTI)

We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

2013-12-18T23:59:59.000Z

189

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network (OSTI)

Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators (KPIs) to summarize volumes of data into a few critical nuggets of actionable information. These KPIs provide both the metrics that will be used to determine the success of a business plan as well as the timely information managers need to track performance and make adjustments to ensure success. A similar approach can be used in the practice of energy management, where KPIs can be designed to measure the success of key elements in an energy management plan and provide energy managers with the timely nuggets of information they need to ensure success. This paper describes how to define and use KPIs to track the performance and measure the success of an energy management plan. A framework is provided to assist in selecting measurable goals from an energy management plan and determine the raw data and processing required to generate the associated KPIs.

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

190

Key Distribution based on Three Player Quantum Games  

E-Print Network (OSTI)

We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In the scheme proposed in this paper, players in the game, Bob and Charlie (and Alice also) can get some common key or information (applied strategies and their payoffs in the game), when Alice informs Bob and Charlie about some results of the measurement made by her. Even if somebody else knows the public information, he/she can not get any key information. There is not any arbiter in our scheme, since existence of an arbiter increases the risk of wiretapping. Lastly we discuss robustness of the proposed QKD method for eavesdrop. We show that though maximally entangled case and non-entangled case essentially provide an equivalent way as QKD, the latter is not available in the case where there are some eavesdroppers. At the same time, we point put that the entanglement of the initial state is crucial when a partially entangled state is used.

Norihito Toyota

2010-10-09T23:59:59.000Z

191

Captured key electrical safety lockout system  

DOE Patents (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

192

Common Information Model Primer  

Science Conference Proceedings (OSTI)

The Common Information Model (CIM) Primer explains the basics of the CIM (IEC 61970, IEC 61968, and IEC 62325). Starting with a historical perspective, it describes how the CIM originated and grew through the years. The functions of various working groups of Technical Committee 57 of the International Electrotechnical Commission (IEC) are described. The process of how an IEC standard is created is also outlined. The basics of the Unified Modeling Language (UML) are detailed to introduce the reader to the...

2011-11-10T23:59:59.000Z

193

Meeting Information - TMS  

Science Conference Proceedings (OSTI)

In Energy. For More Information. Monday. Materials in Clean Power Systems II: Fuel ...... analysis, troubleshooting and improvement as well as leading a Six Sigma ... a key role in bringing competitively priced advanced materials to market

194

Essential lack of security proof in quantum key distribution  

E-Print Network (OSTI)

All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability $\\geq 1-\\epsilon$ under the trace distance criterion $d\\leq\\epsilon$, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.

Horace P. Yuen

2013-10-02T23:59:59.000Z

195

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (6) Managers: Deanhiller Recent members: Hopcroft Vikasgoyal Ksearight NickL

196

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

197

Cryptographic Key Management Project - Comments on the ...  

Science Conference Proceedings (OSTI)

... planned digital signature lifetime (based on the key strength ... Will the CAVP provide a standalone DH test that ... for about an eighth of the cost of 2.5 ...

2012-05-07T23:59:59.000Z

198

Two key questions about color superconductivity  

E-Print Network (OSTI)

We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of color superconductivity? Motivated by the first question, we study ...

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

199

Some key Y-12 General Foremen remembered  

NLE Websites -- All DOE Office Websites (Extended Search)

expanded from K-25 to Y-12 and X-10, they brought their management style with them. Clark Center was a key individual. Clark Center Park, still known by old timers as "Carbide...

200

Jurisdiction Members Contact Info Key Staffers  

E-Print Network (OSTI)

Relevant Jurisdiction Members Contact Info Key Staffers House Science, Space, and Technology, aeronautics, civil aviation, environment, and marine science · America COMPETES · Energy labs · National Science Foundation, including NCAR · National Aeronautics and Space Administration · National Weather

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Quantum Key Distribution Using Quantum Faraday Rotators  

E-Print Network (OSTI)

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against eavesdropping for single-photon source on a noisy environment and robust against impersonation attacks. It also allows for unconditionally secure key distribution for multiphoton source up to two photons. The protocol could be implemented experimentally with the current spintronics technology on semiconductors.

Choi, T; Choi, Mahn-Soo; Choi, Taeseung

2006-01-01T23:59:59.000Z

202

Multipartite secret key distillation and bound entanglement  

Science Conference Proceedings (OSTI)

Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

2009-10-15T23:59:59.000Z

203

Demand Response in the U.S. - Key trends and federal facility participation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the U.S. in the U.S. Key trends and federal facility participation Phil Coleman Lawrence Berkeley National Lab FUPWG Williamsburg Meeting November 19, 2008 OUTLINE * Demand response defined * Current status in U.S. * Key trends - Increasing opportunities in "economic" DR - Rise of DR in "capacity" markets - Rise of dynamic pricing - Rise of automated DR ("auto-DR") * Federal participation is small - why? * Ramping up federal participation Demand Response * Def.: A short-term decrease in electrical consumption by end-use customers due to either a) increased electricity prices, or b) incentive payments (triggered by high wholesale market prices or compromised grid reliability). * DR participation can be either through load curtailment (short-term

204

Model curriculum outline for Alternatively Fueled Vehicle (AFV) automotive technician training in light and medium duty CNG and LPG  

DOE Green Energy (OSTI)

This model curriculum outline was developed using a turbo-DACUM (Developing a Curriculum) process which utilizes practicing experts to undertake a comprehensive job and task analysis. The job and task analysis serves to establish current baseline data accurately and to improve both the process and the product of the job through constant and continuous improvement of training. The DACUM process is based on the following assumptions: (1) Expert workers are the best source for task analysis. (2) Any occupation can be described effectively in terms of tasks. (3) All tasks imply knowledge, skills, and attitudes/values. A DACUM panel, comprised of six experienced and knowledgeable technicians who are presently working in the field, was given an orientation to the DACUM process. The panel then identified, verified, and sequenced all the necessary job duty areas and tasks. The broad duty categories were rated according to relative importance and assigned percentage ratings in priority order. The panel then rated every task for each of the duties on a scale of 1 to 3. A rating of 3 indicates an {open_quotes}essential{close_quotes} task, a rating of 2 indicates an {open_quotes}important{close_quotes} task, and a rating of 1 indicates a {open_quotes}desirable{close_quotes} task.

NONE

1997-04-01T23:59:59.000Z

205

NIST Special Publication 800-57, Recommendation for Key ...  

Science Conference Proceedings (OSTI)

... keying material from key backup or archive. ... term random number generator (RNG) is ... Deterministic Random Bit Generators (DRBGs), sometimes ...

2012-07-10T23:59:59.000Z

206

ITL Bulletin Generating Secure Cryptographic Keys: A Critical ...  

Science Conference Proceedings (OSTI)

... KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC ... relies upon two basic components: an algorithm (or ... and of keys for symmetric algorithms. ...

2013-04-16T23:59:59.000Z

207

A secure multiple-agent cryptographic key recovery system  

Science Conference Proceedings (OSTI)

Symmetric cryptography uses the same session key for message encryption and decryption. Without having it, the encrypted message will never be revealed. In case the session key is unavailable or government authorities need to inspect suspect messages, ... Keywords: key recovery, key recovery agent, key recovery center, secret sharing, session key

Kanokwan Kanyamee; Chanboon Sathitwiriyawong

2009-08-01T23:59:59.000Z

208

STGWG Key Outcomes for May 3, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Outcomes-Nashville 2010 Page 1 Key Outcomes-Nashville 2010 Page 1 State and Tribal Government Working Group (STGWG) Nashville, Tennessee - May 3, 2010 KEY OUTCOMES OVERVIEW Members appreciated the participation of all DOE officials at the STGWG meeting in Nashville, and are especially appreciative of the participation of high-level DOE management, such as Sky Gallegos, Deputy Assistant Secretary of the Office of Congressional and Intergovernmental Affairs, and Frank Marcinowski, Acting Chief Technical Officer and Deputy Assistant Secretary for Technical and Regulatory Support. Such participation demonstrates a continuing commitment to improve interaction with tribes and states. STGWG looks forward to our next Intergovernmental meeting with DOE in the fall. FULL STGWG ISSUES

209

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (7) Managers: Deanhiller Recent members: Bradmin Hopcroft Vikasgoyal Ksearight

210

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

211

Nonorthogonal decoy-state Quantum Key Distribution  

E-Print Network (OSTI)

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.

Li, J B; Li, Jing-Bo; Fang, Xi-Ming

2005-01-01T23:59:59.000Z

212

Complementarity, distillable secret key, and distillable entanglement  

E-Print Network (OSTI)

We consider controllability of two conjugate observables Z and X by two parties with classical communication. The ability is specified by two alternative tasks, (i) agreement on Z and (ii) preparation of an eigenstate of X with use of an extra communication channel. We prove that their feasibility is equivalent to that of key distillation if the extra channel is quantum, and to that of entanglement distillation if it is classical. This clarifies the distinction between two entanglement measures, distillable key and distillable entanglement.

Masato Koashi

2007-04-27T23:59:59.000Z

213

Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate  

E-Print Network (OSTI)

We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

2013-03-14T23:59:59.000Z

214

Solar information process model  

DOE Green Energy (OSTI)

The MITRE Solar Information Process Model (SIP) is a computerized model that simulates information processes in solar markets. As such, it represents a useful tool in the formulation of solar information outreach programs. For each market investigated, SIP model outputs include prioritized listings of the information needs of key decision makers and other strategically important market participants, and related information flow paths. This report provides macro-descriptions of the model and its logic together with a detailed illustrative example of its application. It also presents the findings and conclusions resulting from utilization of the model in the analysis of information processes in eight solar markets within the residential, commercial and agricultural sectors.

Hewett, R.; Spewak, P.

1978-12-01T23:59:59.000Z

215

Key management and encryption under the bounded storage model.  

SciTech Connect

There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

2005-11-01T23:59:59.000Z

216

Basics about CIM technology and key  

E-Print Network (OSTI)

Basics about CIM® technology and key applications Ales Strancar March, 2011 #12;Leaders in Monolith monolithic technology (CIM®). 4 USA patents granted including their foreign equivalents, more pending. #12;Important Milestones · 2002: First Drug Master File (DMF) for CIM® DEAE supports. · 2002: Pass first FDA

Lebendiker, Mario

217

Key issues of RFID reader network system  

Science Conference Proceedings (OSTI)

RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, Key issues of RFID reader network system are ... Keywords: RFID, WSN, anti-collision algorithm, taxonomy

Leian Liu; Dashun yan; Jiapei Wu; Hongjiang Wang

2009-09-01T23:59:59.000Z

218

Key Management Challenges in Smart Grid  

Science Conference Proceedings (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL; Duren, Mike [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

219

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure  

Science Conference Proceedings (OSTI)

Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability ... Keywords: accountability, certificate validation, public log servers, public-key infrastructure, ssl, tls

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor

2013-05-01T23:59:59.000Z

220

Outline Introduction Literature Review Electric Power Supply Chains Empirical Examples Conclusions An Integrated Electric Power Supply Chain and Fuel Market  

E-Print Network (OSTI)

billion annual sales, 40% of domestic primary energy (Energy Information Administration (2000, 2005 An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling with Empirical Analysis for New England Zugang Liu and Anna Nagurney§ Isenberg School of Management University

Nagurney, Anna

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Outline Introduction Literature Review Electric Power Supply Chains Empirical Examples Conclusions An Integrated Electric Power Supply Chain and Fuel  

E-Print Network (OSTI)

primary energy (Energy Information Administration (2000, 2005)) Deregulation Wholesale market Bilateral An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling with Empirical Analysis for New England Zugang Liu Isenberg School of Management University of Massachusetts at Amherst

Nagurney, Anna

222

Is ICT the Key to Development?  

Science Conference Proceedings (OSTI)

Using panel data for 52 developed and developing countries over the period 1998-2006, this article examines the links between information and communication technology diffusion and human development. We conducted a panel regression analysis of the investments ... Keywords: Human Development Index, Information and Communication Technology, Panel Data, Quantile Regression

Roya Gholami; Dolores An Hign; Payam Hanafizadeh; Ali Emrouznejad

2010-01-01T23:59:59.000Z

223

Leakage resilient strong key-insulated signatures in public channel  

Science Conference Proceedings (OSTI)

Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The ... Keywords: continual key leakage, key-insulation, public channel, signatures

Le Trieu Phong; Shin'ichiro Matsuo; Moti Yung

2010-12-01T23:59:59.000Z

224

Practical Decoy State for Quantum Key Distribution  

E-Print Network (OSTI)

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

X. Ma; B. Qi; Y. Zhao; H. -K. Lo

2005-03-01T23:59:59.000Z

225

Key Facts: Solyndra Solar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Key Facts: Solyndra Solar Key Facts: Solyndra Solar On September 1, 2011, Solyndra, a solar energy start-up and recipient of an Energy Department loan guarantee, declared bankruptcy. While this event is deeply disappointing, at the time the loan guarantee was issued, Solyndra was widely seen as a promising and innovative company: Solyndra was named one of the world's "50 Most Innovative Companies" in 2010 by MIT's Technology Review and included in the Wall Street Journal's "The Next Big Thing: Top 50 Venture Backed Companies." Private investors, after conducting their own careful review of Solyndra, put $1 billion of their own private capital behind the company. Solyndra reported sales growth of 40% from 2009 to 2010, from $100

226

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

227

Key Physical Mechanisms in Nanostructured Solar Cells  

DOE Green Energy (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

228

Website Provides Data for Key Oil Play in North Dakota, Eastern Montana |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Website Provides Data for Key Oil Play in North Dakota, Eastern Website Provides Data for Key Oil Play in North Dakota, Eastern Montana Website Provides Data for Key Oil Play in North Dakota, Eastern Montana July 19, 2011 - 1:00pm Addthis Washington, DC - A new web-based geographic information system designed to improve oil production in North Dakota and eastern Montana has been launched with support from the U.S. Department of Energy. The Bakken Decision Support System (BDSS) assembles data for the Bakken and Three Forks Formations into an application that enables a user to visualize geologic and oil production information.The online tool, called the Bakken Decision Support System (BDSS), assembles data for the Bakken and Three Forks Formations into an application that enables a user to visualize geologic and oil production information. The system was developed by the

229

Method for encryption and transmission of digital keying data  

DOE Patents (OSTI)

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

Mniszewski, Susan M. (Los Alamos, NM); Springer, Edward A. (Los Alamos, NM); Brenner, David P. (North Collins, NY)

1988-01-01T23:59:59.000Z

230

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

231

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version  

E-Print Network (OSTI)

capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007 was performed such that all thirty-seven target capabilities from the TCL were mapped; and each target target capability in the TCL. This crosswalk was created to support the transition that states

Harms, Kyle E.

232

Energy Unit lecture outline & graphics Fritz Stahr Tues 1/21/03 -Transportation of Energy & Energy of Transportation an intricate link  

E-Print Network (OSTI)

Energy Unit lecture outline & graphics ­ Fritz Stahr Tues 1/21/03 - Transportation of Energy & Energy of Transportation ­ an intricate link - history of settlement & industry largely due to transportation and energy supplies - initial towns on rivers or by sea where ships could service cargo as water

233

Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that  

E-Print Network (OSTI)

Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 apart from the lack of networking facilities. If Windows 7 has not yet been installed, please see the documentation that came with Windows 7 or with the computer. You must not attempt to use the network until you

Goldschmidt, Christina

234

Wireless connection instructions -Windows This document outlines the procedure for setting up Windows7, Vista or XP to use the College wireless network. It assumes  

E-Print Network (OSTI)

Wireless connection instructions - Windows This document outlines the procedure for setting up Windows7, Vista or XP to use the College wireless network. It assumes that you have already connected your Wireless Networks window Registering your computer Start your web browser, ie. Internet Explorer Your

Goldschmidt, Christina

235

TMS Fall Meeting '99: USAirways Information  

Science Conference Proceedings (OSTI)

Nov 4, 1999 ... Approximately 100 technical sessions will focus on key information and successful strategies to give attendees insight into the research,...

236

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency to someone by E-mail Share Building Technologies Office: Key Activities in Energy Efficiency on Facebook Tweet about Building Technologies Office: Key Activities...

237

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

238

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

239

NERSC Played Key Role in Nobel Laureate's Discovery  

NLE Websites -- All DOE Office Websites (Extended Search)

Played Key Role in Nobel Laureate's Discovery NERSC Played Key Role in Nobel Laureate's Discovery NERSC, Berkeley Lab Now Centers for Computational Cosmology Community October 4,...

240

TEC Working Group Topic Groups Rail Key Documents Planning Subgroup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rail Key Documents Planning Subgroup TEC Working Group Topic Groups Rail Key Documents Planning Subgroup Planning Subgroup Rail Planning Timeline Benchmarking Project: AREVA Trip...

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Single, Key Gene Discovery Could Streamline Production of Biofuels...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

242

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

243

Technology Key to Harnessing Natural Gas Potential | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy...

244

NIST SP 800-57, Recommendation for Key Management ...  

Science Conference Proceedings (OSTI)

... service use a hash function as a component of the ... mitigated by splitting the key into components that are ... a. When a symmetric key is used only for ...

2012-12-12T23:59:59.000Z

245

Key Renewable Energy Opportunities for Oklahoma Tribes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Renewable Energy Opportunities for Oklahoma Tribes Key Renewable Energy Opportunities for Oklahoma Tribes August 13, 2012 Oklahoma City, Oklahoma Cox Convention Center The...

246

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

Science Conference Proceedings (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

247

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Brierley, Stephen

2009-01-01T23:59:59.000Z

248

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Stephen Brierley

2009-10-14T23:59:59.000Z

249

Many-core key-value store  

Science Conference Proceedings (OSTI)

Scaling data centers to handle task-parallel work-loads requires balancing the cost of hardware, operations, and power. Low-power, low-core-count servers reduce costs in one of these dimensions, but may require additional nodes to provide the required ... Keywords: 64-core Tilera TILEPro64, many-core key-value store, data centers, task-parallel workloads, low-core-count servers, low-power servers, under-utilizing memory, power consumption, high-core-count processor, clock rate, 4-core Intel Xeon L5520, 8-core AMD Opteron 6128 HE

M. Berezecki; E. Frachtenberg; M. Paleczny; K. Steele

2011-07-01T23:59:59.000Z

250

SERI Information Data Bank Network  

DOE Green Energy (OSTI)

The availability of accurate, timely information will be an important key in the continued spread of solar energy. The products and services available through the Solar Energy Information Data Bank, a national information network developed and operated by Solar Energy Research Institute with the participation of member organization, are described.

Ubico, R.E.

1980-02-01T23:59:59.000Z

251

PUBLIC INFORMATION AND INPUT ON WIPP  

E-Print Network (OSTI)

PUBLIC INFORMATION AND INPUT ON WIPP Get The Information You Need 1. Check the EPA Website, Fact Sheets and Issue Papers. EPA will make sure that key information is available on its WIPP Website. EPA the EPA WIPP Information Line at 1-800-331-WIPP (1-800-331-9477) to obtain information on upcoming events

252

NETL: News Release - NETL Technologies are Key to President Bush's Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

4 , 2006 4 , 2006 NETL Technologies are Key to President Bush's Energy Policy Assistant Secretary of Energy Highlights the President's New Energy Initiatives and Funding for Clean Coal Technologies at NETL MORGANTOWN, WV - A U.S. Department of Energy Assistant Secretary told West Virginia news reporters that development of advanced coal technology at the National Energy Technology Laboratory is a keystone of the Advanced Energy Initiative outlined in the President's State of the Union remarks. "Advanced technology and coal can deliver new increments of electric power to our Nation in the near- and mid-term in the volumes we will require it, at the times we will need it, on the terms we want it ? abundant, always available, low cost and clean," Jeffrey Jarrett, Assistant Secretary for Fossil Energy said. "They can ignite the transformation the President seeks in the way we power our homes and offices.

253

Analysis and design of a secure key exchange scheme  

Science Conference Proceedings (OSTI)

We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, ... Keywords: Block matrices, Cryptography, Discrete logarithm problem, Key exchange scheme, Public key, Quick exponentiation, Security, Triangular matrices

Rafael lvarez; Leandro Tortosa; Jos-Fco Vicent; Antonio Zamora

2009-05-01T23:59:59.000Z

254

New and Underutilized Technology: Water Cooled Oil Free Magnetic Bearing Compressors  

Energy.gov (U.S. Department of Energy (DOE))

The following information outlines key deployment considerations for water cooled oil free magnetic bearing compressors within the Federal sector.

255

Key Renewable Energy Opportunities for Oklahoma Tribes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRIBAL LEADER FORUM SERIES TRIBAL LEADER FORUM SERIES KEY RENEWABLE ENERGY OPPORTUNITIES FOR OKLAHOMA TRIBES August 13, 2012 COX CONVENTION CENTER 100 West Sheridan Avenue, Oklahoma City, OK 73102 (405) 602-8500 The fifth in a series of planned U.S. DOE Office of Indian Energy-sponsored strategic energy development & investment forums, this forum is designed to give Oklahoma tribal leaders the opportunity to receive the latest updates on DOE's energy development efforts in Indian Country. The Forum will provide a venue for tribal leaders to discuss best practices in renewable energy development, including project development and finance, issues related to Oklahoma land ownership, and energy planning and energy markets. Tribal leaders will also have the opportunity to directly converse with each other by participating in a roundtable

256

Toolpusher is key to efficient rig operation  

Science Conference Proceedings (OSTI)

Toolpushers earn a higher salary, control more personnel, and are responsible for a more expensive operation than many graduate MBAs. As a result, toolpushers are key to improved rig efficiencies and reduced crew turnover. For example, by having its toolpushers in Libya implement a new managerial approach, Santa Fe Drilling Co. reduced labor turnover 30%, reduced the number of lost-time accidents 58%, and increased average rig inspection scores 6%. During the boom years of drilling, toolpushers complained often about the poor quality of roustabouts and roughnecks assigned to them. Many toolpushers held poor screening of personnel responsible, and felt justified in firing those who were slow to adapt. Few of them considered that they were directly responsible. Today's toolpusher must realize that he is responsible not only for the rig, its maintenance, and its drilling performance, but for training and development of the rig's personnel as well.

Fortney, K.

1983-09-01T23:59:59.000Z

257

Perspectives on Information, 1st edition  

Science Conference Proceedings (OSTI)

Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite ...

Magnus Ramage; David Chapman

2011-04-01T23:59:59.000Z

258

Integrated Materials Information DVD - Revision 1  

Science Conference Proceedings (OSTI)

This EPRI Materials Initiative Document Suite on CD is an interim step toward implementation of an internet-based system for presentation and maintenance of EPRI materials initiative documents and associated links to key EPRI products. The EPRI materials initiative was developed to address NEI 03-08, "Guideline for the Management of Materials Issues." NEI 03-08 outlines the policy and practices that the industry has committed to follow in managing materials aging issues. Two standing committees were esta...

2011-06-07T23:59:59.000Z

259

LANL | Physics | Quantum Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Breakthrough quantum information Breakthrough quantum information science and technology Physics Division's quantum information science and technology capability supports present and future Laboratory missions in cyber-security, sensing, nonproliferation, information science, and materials. Collaborating with researchers throughout Los Alamos and leading institutions in the nation, Physics Division scientists are involved in projects in quantum communications, including quantum key distribution and quantum-enabled security and networking, and in quantum cold-atom physics. Recent fundamental science results include the ability to "paint" potentials that can trap Bose-Einstein condensates into geometric forms, such as the toroidal ring of clusters, the density of which is measured in

260

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key Distribution  

E-Print Network (OSTI)

It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. With correct interpretation of the criterion as well as a correct treatment of the error correcting code and privacy amplification code, it is shown that even for an ideal system under just collective attack, the maximum tolerable quantum bit error rate is about 1.5% and a net key cannot actually be generated with practical error correcting codes even at such low rates, contrary to claims in the literature.

Horace P. Yuen

2012-05-16T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Executive Summary: Treated Wood Ted Poston, Battelle As part of the process outlined in Washington's Statewide Strategy to Recover Salmon:  

E-Print Network (OSTI)

Transportation were charged to develop Aquatic Habitat Guidelines employing an integrated approach to marine, freshwater, and riparian habitat protection and restoration. Guidelines will be issued, as funding allows, in a series of manuals addressing many aspects of aquatic and riparian habitat protection and restoration. This document is one of a series of white papers developed to provide a legitimate scientific and technical basis for developing Aquatic Habitat Guidelines. The white papers address the current understanding of impacts of development and land management activities on aquatic habitat, and potential mitigation for these impacts. Individual white papers will not necessarily result in a corresponding guidance document. Instead, guidance document development, addressing management and technical assistance needs, may incorporate information synthesized from one or more of the white papers. The scope of work for each white paper requested a comprehensive but not exhaustive review of the peer-reviewed scientific literature, symposia literature, and technical (gray) literature, with an emphasis on the peer-reviewed literature. The reader of this report can therefore expect a broad review of the literature, which is current through late 2000. Several of the white papers

Extinction Not; Option Washington; Departments Fish

2001-01-01T23:59:59.000Z

262

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

263

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

264

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution  

E-Print Network (OSTI)

We present a security analysis against collective attacks for the recently proposed time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond $10^4$ for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.

Catherine Lee; Jacob Mower; Zheshen Zhang; Jeffrey H. Shapiro; Dirk Englund

2013-11-05T23:59:59.000Z

265

Using Energy Information Systems (EIS): A Guidebook for the U.S. Postal Service  

SciTech Connect

The U.S. Postal Service (Postal Service) recently installed Energy Information Systems (EIS) at 30 facilities in California. These systems integrate electric utility meter data acquisition hardware, software, and communication systems to collect, archive, analyze, and display whole-facility energy consumption data. At some point in the future, these systems could also be integrated with sub-meters that measure the electricity consumption of key end-use equipment. The purpose of this guidebook is to help Postal Service facility managers interpret and act upon energy data available from their EIS, translating the abundance of information these systems provide into knowledge that can be used to reduce energy use and costs. The guidebook first describes basic EIS capabilities and explains the data and reports that Postal Service EIS provide. It outlines a set of strategies for utilizing this information to improve operations and maintenance of building energy use equipment and for facilitating demand response. Finally, the guidebook offers suggestions on creating a routine for tracking and analyzing energy data and integrating this information into regular energy management activities.

Foster, Dale; Hough, Ben; Barbose, Galen; Golove, William; Goldman, Charles

2004-10-11T23:59:59.000Z

266

Compression station key to Texas pipeline project  

SciTech Connect

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

267

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

268

Greater Caribbean Energy and Environment Future. Ad hoc working group report, Key Biscayne, Florida, October 26-28, 1980  

SciTech Connect

This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)

Thorhaug, A. (ed.)

1980-01-01T23:59:59.000Z

269

Implementation of Distributed Key Generation Algorithms using Secure Sockets  

Science Conference Proceedings (OSTI)

Distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such ...

A. T. Chronopoulos; F. Balbi; D. Veljkovic; N. Kolani

2004-08-01T23:59:59.000Z

270

Exploring the context : a small hotel in Key West  

E-Print Network (OSTI)

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

271

Arbitrary blade section design based on viscous considerations. Background information  

SciTech Connect

Background information is presented on an arbitrary blade section design method which is outlined in a joint paper. This information concerns the assumptions, the development, and the predictive capabilities of the viscous flow calculation tool used in the design procedure. General properties of laminar and turbulent, unseparated or separated compressible shear layers, necessary for the blade optimization procedure, are discussed.

Bouras, B.; Karagiannis, F.; Leoutsakos, G.; Giannakoglou, K.C.; Papailiou, K.D. [National Technical Univ. of Athens (Greece). Thermal Turbomachinery Lab.

1996-06-01T23:59:59.000Z

272

Key Ingredient: Change in Material Boosts Prospects of ...  

Science Conference Proceedings (OSTI)

Key Ingredient: Change in Material Boosts Prospects of Ultrafast Single-photon Detector. From NIST Tech Beat: June 30, 2011. ...

2011-10-14T23:59:59.000Z

273

Nano Changes Rise to Macro Importance in a Key Electronics ...  

Science Conference Proceedings (OSTI)

Nano Changes Rise to Macro Importance in a Key Electronics Material. From NIST Tech Beat: April 7, 2009. ...

2012-10-01T23:59:59.000Z

274

Better 'Photon Loops' May Be Key to Computer and Physics ...  

Science Conference Proceedings (OSTI)

Better 'Photon Loops' May Be Key to Computer and Physics Advances. From NIST Tech Beat: August 22, 2011. ...

2012-08-23T23:59:59.000Z

275

Energy Usage Data Standard for US Smart Grid Passes Key ...  

Science Conference Proceedings (OSTI)

Energy Usage Data Standard for US Smart Grid Passes Key Advisory Panel Vote. From NIST Tech Beat: March 1, 2011. ...

2011-03-01T23:59:59.000Z

276

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S, Ireland http://www.phy.hw.ac.uk/resrev/photoncounting/index.html Abstract: An improved quantum key-based quantum key distribution test system performance in terms of transmission distance and quantum bit error

Buller, Gerald S.

277

Information Management Strategic Plan. Information: The fuel for success  

SciTech Connect

Reliable information is key to the ultimate success of the Departmental Strategic Plan. To help ensure that success, this Information Management Strategic Plan has been developed, which evolved from and directly supports the Departmental Strategic Plan and the Human Resources and Administration Strategic Plan.

1994-07-01T23:59:59.000Z

278

Analysis of a rate-adaptive reconciliation protocol and the effect of the leakage on the secret key rate  

E-Print Network (OSTI)

Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate adaptive information reconciliation protocol, that adapts to the changes in the communication channel, is then required to minimize the leakage of information in the classical postprocessing. We consider here the leakage of a rate-adaptive information reconciliation protocol. The length of the exchanged messages is larger than that of an optimal protocol; however, we prove that the min-entropy reduction is limited. The simulation results, both on the asymptotic and in the finite-length regime, show that this protocol allows to increase the amount of distillable secret key.

David Elkouss; Jesus Martinez-Mateo; Vicente Martin

2013-04-11T23:59:59.000Z

279

Simple and efficient quantum key distribution with parametric down-conversion  

E-Print Network (OSTI)

We propose an efficient quantum key distribution protocol based on the photon-pair generation from parametric down-conversion (PDC). It uses the same experimental setup as the conventional protocol, but a refined data analysis enables detection of photon-number splitting attacks by utilizing information from a built-in decoy state. Assuming the use of practical detectors, we analyze the unconditional security of the new scheme and show that it improves the secure key generation rate by several orders of magnitude at long distances, using a high intensity PDC source.

Yoritoshi Adachi; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

2006-10-15T23:59:59.000Z

280

Key Issues in Designing Mechanisms to Reduce Greenhouse Gas Emissions from Deforestation and Degradation (REDD)  

Science Conference Proceedings (OSTI)

In 2008, EPRI launched the EPRI Greenhouse Gas (GHG) Emissions Offset Policy Dialogue project. The goals of this project are 1) to inform key constituencies involved in the development of U.S. climate mitigation strategies and policies about GHG emissions offsetrelated policies and design issues and 2) to provide a forum in which representatives of key sectors of the U.S. economy and communities involved in the ongoing development and debate on climate change policies can discuss these issues. On May 13...

2009-07-13T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts November 29, 2011 - 4:34pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASENovember 29, 2011 President Obama Announces More Key Administration Posts WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Frederick "Rick" Barton - Assistant Secretary for Conflict and Stabilization Operations and Coordinator for Reconstruction and Stabilization, Department of State Arun Majumdar - Under Secretary of Energy, Department of Energy Marie F. Smith - Member, Social Security Advisory Board The President also announced his intent to appoint the following

282

Building commissioning: The key to quality assurance  

SciTech Connect

This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

1998-05-01T23:59:59.000Z

283

Metric adjusted skew information  

E-Print Network (OSTI)

We extend the concept of Wigner-Yanase-Dyson skew information to something we call ``metric adjusted skew information'' (of a state with respect to a conserved observable). This ``skew information'' is intended to be a non-negative quantity bounded by the variance (of an observable in a state) that vanishes for observables commuting with the state. We show that the skew information is a convex function on the manifold of states. It also satisfies other requirements, proposed by Wigner and Yanase, for an effective measure-of-information content of a state relative to a conserved observable. We establish a connection between the geometrical formulation of quantum statistics as proposed by Chentsov and Morozova and measures of quantum information as introduced by Wigner and Yanase and extended in this article. We show that the set of normalized Morozova-Chentsov functions describing the possible quantum statistics is a Bauer simplex and determine its extreme points. We determine a particularly simple skew information, the ``lambda-skew information,'' parametrized by a lambda in (0,1], and show that the convex cone this family generates coincides with the set of all metric adjusted skew informations. Key words: Skew information, convexity, monotone metric, Morozova-Chentsov function, lambda-skew information.

Frank Hansen

2006-07-23T23:59:59.000Z

284

Inform Editors  

Science Conference Proceedings (OSTI)

Inform editorial board Inform Editors inform Magazine algae algal AOCS biomass business chemistry cottonseed date detergents fats filing first history inform inform Magazine international inventor law magazine member members monthly news oil oils

285

Subscription Information  

Science Conference Proceedings (OSTI)

Inform subscription rates. Subscription Information inform Magazine algae algal AOCS biomass business chemistry cottonseed date detergents fats filing first history inform inform Magazine international inventor law magazine member members monthly

286

Secret key distillation from shielded two-qubit states  

Science Conference Proceedings (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

2010-05-15T23:59:59.000Z

287

Secret key distillation from shielded two-qubit states  

E-Print Network (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Joonwoo Bae

2008-03-03T23:59:59.000Z

288

Brainstorming Outline: Combining Subgroup Deliverables  

Science Conference Proceedings (OSTI)

... Email, Michael Seablom, NASA Headquarters, michael.s ... new skill sets, organization structures, processes ... Namenode - Directory service for Hadoop. ...

2013-08-06T23:59:59.000Z

289

Outline for MOU Writing Guide  

Science Conference Proceedings (OSTI)

... by others arising out of the terms of this ... not to exceed [insert #] days ? Process search result verifications in ... Enter cases into the UL and UL palm ...

2012-05-04T23:59:59.000Z

290

Baseline information development for energy smart schools -- applied research, field testing and technology integration  

E-Print Network (OSTI)

daylighting Other key parameters and information that would be available to investigate overall energy uses, building and systems

Xu, Tengfang; Piette, Mary Ann

2004-01-01T23:59:59.000Z

291

Proceedings of the Workshop on Multi-source Multilingual Information Extraction and Summarization  

Science Conference Proceedings (OSTI)

Information extraction (IE) and text summarization (TS) are key technologies aiming at extracting relevant information from texts and presenting the information to the user in a condensed form. The ongoing information explosion makes IE and TS particularly ...

Sivaji Bandyopadhyay; Thierry Poibeau; Horacio Saggion; Roman Yangarber

2008-08-01T23:59:59.000Z

292

Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry  

E-Print Network (OSTI)

High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate (SKR) with high photon-information efficiency (PIE). We consider HDQKD based on the time-energy entanglement (TEE) produced by spontaneous parametric downconversion (SPDC), and show that it is secure against collective attacks. Its security rests upon visibility data---obtained from Franson and conjugate-Franson interferometers---that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable QKD so that it applies to our HDQKD protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, SKR lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results suggest that TEE-based HDQKD could permit a 650 bit/sec SKR over 200 km transmission distance in optical fiber with a PIE of 1.9 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

2013-11-04T23:59:59.000Z

293

The Death of a Massive Star Holds Key to Early Universe | U.S. DOE Office  

Office of Science (SC) Website

The Death of The Death of a Massive Star Holds Key to Early Universe News Featured Articles 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Science Headlines Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 12.16.09 The Death of a Massive Star Holds Key to Early Universe Scientists found the remains of a massive star, providing them with new information to reassess the environment of the early Universe. Print Text Size: A A A Subscribe FeedbackShare Page Imagine if paleontologists found the fossilized remains of a long-hypothesized, but never discovered dinosaur deep in the Amazon rainforest. Well, physicists participating in the international Supernova Factory, a Department of Energy sponsored project at Lawrence Berkeley

294

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified by the LKMR Recovery Team: (1) monitoring of populations and (2) reintroduction. Monitoring the distribution and status of LKMR populations is critical for targeting future management actions. Informal transects for rabbit fecal pellets were used to survey habitat patches documented in1988?1995 surveys and to identify additional patches of occupied and potential habitat. Next, a buffer was created around patches to help managers account for uncertainty in rabbit movements and to identify groups of patches that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied and potential habitat. Considering only areas included in 1988?1995 surveys, however, revealed a net decrease in the number of occupied patches. Many of the recently extirpated populations, which tended to occupy the periphery of larger islands or small neighboring islands, were unlikely to be recolonized without human intervention. Reintroduction provides a means of artificially recolonizing potential habitat. Two pilot reintroductions were conducted to evaluate this conservation strategy for the species. The second reintroduction was postponed, but the first effort met all criteria for short-term success, including survival comparable to a control group, fidelity to release sites, and evidence of reproduction. There are a limited number of potential source populations for translocations. Future efforts should consider using in-situ captive breeding to prevent potential long-term impacts to these populations. Few potential release sites exhibited suitable habitat quality and landscape context. Thus, for reintroduction to be more widely-applied for this species, it must be part of a comprehensive management plan involving land acquisition, control of secondary impacts from development, and habitat restoration and enhancement.

Faulhaber, Craig Alan

2003-12-01T23:59:59.000Z

295

EIA Data: 2011 United States Residential Sector Key Indicators and  

Open Energy Info (EERE)

Residential Sector Key Indicators and Residential Sector Key Indicators and Consumption Dataset Summary Description This dataset is the 2011 United States Residential Sector Key Indicators and Consumption, part of the Annual Energy Outlook that highlights changes in the AEO Reference case projections for key energy topics. Source EIA Date Released December 16th, 2010 (4 years ago) Date Updated Unknown Keywords consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon Residential Sector Key Indicators and Consumption (xls, 62.5 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm

296

Inform App  

Science Conference Proceedings (OSTI)

Access INFORM anytime with our free app available on iPad, iPhone, Android and Kindle. Inform App Inform App

297

Inequalities for quantum skew information  

E-Print Network (OSTI)

We study quantum information inequalities and show that the basic inequality between the quantum variance and the metric adjusted skew information generates all the multi-operator matrix inequalities or Robertson type determinant inequalities studied by a number of authors. We introduce an order relation on the set of functions representing quantum Fisher information that renders the set into a lattice with an involution. This order structure generates new inequalities for the metric adjusted skew informations. In particular, the Wigner-Yanase skew information is the maximal skew information with respect to this order structure in the set of Wigner-Yanase-Dyson skew informations. Key words and phrases: Quantum covariance, metric adjusted skew information, Robertson-type uncertainty principle, operator monotone function, Wigner-Yanase-Dyson skew information.

Koenraad Audenaert; Liang Cai; Frank Hansen

2008-03-07T23:59:59.000Z

298

Security proof of practical quantum key distribution schemes  

E-Print Network (OSTI)

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29T23:59:59.000Z

299

Florida Keys Electric Cooperative - Residential Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Heating & Cooling Commercial Heating & Cooling Cooling Insulation Design & Remodeling Windows, Doors, & Skylights Program Info State Florida Program Type Utility Rebate Program Rebate Amount Rebates $25 - $500, max $1000 per member Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a free home energy audit. An FKEC trained auditor will assess the home and make recommendations for

300

NREL: News - NREL Fills Key Leadership Role for Energy Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

513 NREL Fills Key Leadership Role for Energy Systems Integration June 17, 2013 Bryan J. Hannegan will join the Energy Department's National Renewable Energy Laboratory on June 24...

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable En ...

302

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts May 28, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Gordon Heddell, Inspector General, Department of Defense; Ellen Murray, Assistant Secretary for Resources and Technology, Department of Health and Human Services; Polly Trottenberg, Assistant Secretary for Transportation Policy, Department of Transportation; and James J. Markowsky, Assistant Secretary for Fossil Energy, Department of Energy. President Obama said, "Each of these individuals brings extensive expertise in their chosen fields, and they are joining my administration at a time

303

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

304

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

013 Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development1 Abstract "The Government of...

305

Overview of Indian Hydrogen Program and Key Safety Issues of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Energy Road Map - Initiatives - Target 2020 : GIFT - Programme in India - CNG - H 2 Programme - Partnership - Technology Development - Concerns & Challenges * Key...

306

EIA highlights key factors in new energy and financial markets ...  

U.S. Energy Information Administration (EIA)

Yesterday, EIA launched a new web-based assessment highlighting key factors that can affect crude oil prices called "Energy and Financial Markets: What Drives Crude ...

307

TEC Working Group Topic Groups Rail Key Documents Intermodal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Intermodal Subgroup TEC Working Group Topic Groups Rail Key Documents Intermodal Subgroup Intermodal Subgroup Draft Work Plan More Documents & Publications TEC Working Group Topic...

308

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

work in three key areas in order to continually develop innovative, cost-effective energy saving solutions. research and development (R&D), market stimulation, and building...

309

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

310

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

311

Knowledge, Skills, and Abilities for Key Radiation Protection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice No. 1 November 2007 DOE STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910...

312

Key Facts about the Mathematics and Computer Science Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Documents Key Facts about the Mathematics and Computer Science Division Researchers in the Mathematics and Computer Science Division attack complex problems in four...

313

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable Energy

314

Fossil Energy Announces Addition of Three Key Staff Members ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant...

315

DVD Production Process & Key Factors for Quality Discs  

Science Conference Proceedings (OSTI)

... wide market share for DVD +/- RW; #2 World-wide market share for CD ... Key factor - deep knowledge of forming thin metal film - optimization of ...

2006-01-20T23:59:59.000Z

316

Using the Internet to Obtain Intellectual Property Information  

Science Conference Proceedings (OSTI)

An enormous amount of information regarding various aspects of intellectual ... easy-to-use sources that enable one to employ retrieval based on key word...

317

Information Security Policy & Guidelines and provides minimum policies and  

E-Print Network (OSTI)

guidelines for agencies to follow in their implementation of the Tasmanian Government Information Security Charter. This document outlines a Risk Assessment and Management process agencies can use to support their information security planning. The methodology expands on AS/NZS 4360:2004 Risk Management to provide a consistent framework for agencies to assess their information security risks. The standard is an essential reference document to the methodology.

unknown authors

2005-01-01T23:59:59.000Z

318

Towards a Synergy-based Approach to Measuring Information Modification  

E-Print Network (OSTI)

Distributed computation in artificial life and complex systems is often described in terms of component operations on information: information storage, transfer and modification. Information modification remains poorly described however, with the popularly-understood examples of glider and particle collisions in cellular automata being only quantitatively identified to date using a heuristic (separable information) rather than a proper information-theoretic measure. We outline how a recently-introduced axiomatic framework for measuring information redundancy and synergy, called partial information decomposition, can be applied to a perspective of distributed computation in order to quantify component operations on information. Using this framework, we propose a new measure of information modification that captures the intuitive understanding of information modification events as those involving interactions between two or more information sources. We also consider how the local dynamics of information modific...

Lizier, Joseph T; Williams, Paul L

2013-01-01T23:59:59.000Z

319

Extending Document Summarization to Information Graphics  

E-Print Network (OSTI)

Information graphics (non-pictorial graphics such as bar charts or line graphs) are an important component of multimedia documents. Often such graphics convey information that is not contained elsewhere in the document. Thus document summarization must be extended to include summarization of information graphics. This paper addresses our work on graphic summarization. It argues that the message that the graphic designer intended to convey must play a major role in determining the content of the summary, and it outlines our approach to identifying this intended message and using it to construct the summary. 1

Ra Carberry; Stephanie Elzer; Nancy Green; Kathleen Mccoy; Daniel Chester

2004-01-01T23:59:59.000Z

320

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become widely used as shared storage solutions for Internet-scale distributed applications. We present a fault-tolerant wait-free efficient ... Keywords: cloud storage, distributed storage

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Marko Vukolic

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internet-scale cloud storage systems. We present an efficient wait-free algorithm that ...

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Alessandro Sorniotti; Marko Vukolic; Ido Zachevsky

2012-06-01T23:59:59.000Z

322

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

323

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

324

Energy Security: A Key Requirement forSustainable Development  

E-Print Network (OSTI)

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

325

MeerKAT Key Project Science, Specifications, and Proposals  

E-Print Network (OSTI)

We present the specifications of the MeerKAT Karoo Array Telescope, the South African Square Kilometre Array Precursor. Some of the key science for MeerKAT is described in this document. We invite the community to submit proposals for Large Key Projects.

Booth, R S; Jonas, J L; Fanaroff, B

2009-01-01T23:59:59.000Z

326

A matricial public key cryptosystem with digital signature  

Science Conference Proceedings (OSTI)

We describe a new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group. The proposed cryptosystem is very efficient, requiring ... Keywords: DLP, Diffie-Hellman, ElGamal, cryptography, digital signature, finite fields, polynomial matrices, public-key, security

Rafael Alvarez; Francisco-Miguel Martinez; Jose-Francisco Vicent; Antonio Zamora

2008-04-01T23:59:59.000Z

327

Efficient decoy-state quantum key distribution with quantified security  

E-Print Network (OSTI)

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

M. Lucamarini; K. A. Patel; J. F. Dynes; B. Frhlich; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

2013-10-01T23:59:59.000Z

328

An extension of secure group communication using key graph  

Science Conference Proceedings (OSTI)

With the continuously emerging of Internet applications based on secure group communication, the design of secure group communication becomes an important Internet design topic. Group key management is important for secure group communication. Previous ... Keywords: Batch rekey, Group security, Key graph, Rekey

Zhang Jun; Zhou Yu; Ma Fanyuan; Gu Dawu; Bai Yingcai

2006-10-01T23:59:59.000Z

329

Electricity and Development: Global Trends and Key Challenges  

E-Print Network (OSTI)

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

330

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts President Obama Announces More Key Administration Posts July 8, 2011 - 12:00am Addthis THE WHITE HOUSE Office of the Press Secretary WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Michael A. Hammer, Assistant Secretary for Public Affairs, Department of State Charles McConnell, Assistant Secretary for Fossil Energy, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts: Terry Guen, Member, Advisory Council on Historic Preservation Dorothy T. Lippert, Member, Advisory Council on Historic Preservation Rosemary A. Joyce, Member, Cultural Property Advisory Committee President Obama said, "Our nation will be greatly served by the talent and

331

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Albert Einstein Distinguished Educator Fellowship (AEF) Program Einstein Fellowship Home Eligibility Benefits Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page Key Dates for the 2014-2015 Einstein Fellowship Application process. On-line Application Opens September 24, 2013 Application Deadline 5:00pm EST December 4, 2013 Application Review 7-8 weeks Notification to Semi-Finalists [Travel Arrangements made for Interviews in Washington, DC] Late January 2014 Interviews in Washington, DC February 23-25, 2014 Finalists Notifications March 2014 Congressional Fellows Placement Interviews June - July 2014 Fellows Arrive in Washington, DC August 2014 Orientation meeting for the 2014-2015 Einstein Fellows

332

Security Notions for Quantum Public-Key Cryptography  

E-Print Network (OSTI)

It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

Takeshi Koshiba

2007-02-19T23:59:59.000Z

333

Maintaining secrecy when information leakage is unavoidable  

E-Print Network (OSTI)

(cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate ...

Smith, Adam (Adam Davidson), 1977-

2004-01-01T23:59:59.000Z

334

A Model for Informed Negotiating Agents  

Science Conference Proceedings (OSTI)

We propose that the key to building intelligent negotiating agents is to take an agent's historic observations as primitive, to model that agent's changing uncertainty in that information, and to use that model as the foundation for the agent's reasoning. ...

John Debenham; Simeon Simoff

2007-05-01T23:59:59.000Z

335

SEI uruguay project: Technical specifications. Turn-key' contract for La Tablada repowering. Export trade information  

Science Conference Proceedings (OSTI)

The study, conducted by Southern Electric International (SEI), was funded by the U.S. Trade and Development Agency on behalf of U.T.E., the Government of Uruguay's electric power company. It is an assessment of three potential projects under consideration by U.T.E. The changes resulting from these projects would add 120 to 360 megawatts capacity to the current system. The first option would involve repowering Jose Batlle y Ordonez Units 3 and 4. As an alternate to this plan, U.T.E. is considering a new combined cycle plant at a Greenfield site. The third project would increase capacity at La Tablada.

Not Available

1994-01-21T23:59:59.000Z

336

Web-Based Integration of Printed and Digital Information  

Science Conference Proceedings (OSTI)

The affordances of paper have ensured its retention as a key information medium, in spite of dramatic increases in the use of digital technologies for information storage, processing and delivery. Recent developments in paper, printing and wand technologies ...

Moira C. Norrie; Beat Signer

2003-01-01T23:59:59.000Z

337

The Electricity Transmission System Opportunities to Overcome Key Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities to Overcome Key Challenges Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia November 2, 2012 Breakout Group Discussion Overview Opportunities to Overcome Key Challenges Each of the four breakout groups prioritized the critical issues facing the grid from the list of synthesized challenges identified in the first breakout session of the workshop. Focusing on these top priorities, each group proposed specific R&D activities and initiatives that DOE can pursue to overcome these challenges and address existing gaps. Summary of Synthesized Challenges A. Need improved understanding of the availability, utility, maintenance, exchange, and security of data and associated requirements.

338

A Key-Distribution Scheme for Wireless Home Automation Networks  

E-Print Network (OSTI)

Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. In this paper we present a key-distribution scheme geared towards home automation networks, but applicable to other networks with related properties as well. Our approach uses a decentralized scheme that is designed to work on resource-poor devices, allows easy addition and removal of devices and limits the workload on the end user while guaranteeing the secrecy of the exchanged keys even in the presence of subverted nodes.

Arno Wacker; Timo Heiber; Holger Cermann

2004-01-01T23:59:59.000Z

339

Information Bridge: DOE Scientific and Technical Information - Widget  

Office of Scientific and Technical Information (OSTI)

Information Bridge Widget Information Bridge Widget You can access key features from the Department of Energy's Office of Scientific and Technical Information (DOE/OSTI) by downloading the Information Bridge widget. Use the widget to search, receive alerts, and top documents. If you wish you may download and install this widget using its html inclusion code. Get the Information Bridge widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info) Search: provides the capability to search the Information Bridge full-text document and bibliographic citations of DOE research report literature. Alerts: provides the functionally for users with e-mail notification of updates to website content in specific areas of interest. By registering with Information Bridge, users can select search queries that are regularly

340

Information Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Science Information Science1354608000000Information ScienceSome of these resources are LANL-only and will require Remote Access.NoQuestions? 667-5809library@lanl.gov...

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information User Information Print User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Includes information about submitting a...

342

Informed Traders  

E-Print Network (OSTI)

A model is introduced in which there is a small agent who is more susceptible to the flow of information in the market than the general market participant, and who tries to implement strategies based on the additional information. In this model market participants have access to a stream of noisy information concerning the future return of an asset, whereas the informed trader has access to a further information source which is obscured by an additional noise that may be correlated with the market noise. The informed trader uses the extraneous information source to seek statistical arbitrage opportunities, while at the same time accommodating the additional risk. The amount of information available to the general market participant concerning the asset return is measured by the mutual information of the asset price and the associated cash flow. The worth of the additional information source is then measured in terms of the difference of mutual information between the general market participant and the informe...

Brody, Dorje C; Friedman, Robyn L; Hughston, Lane P

2008-01-01T23:59:59.000Z

343

About Inform  

Science Conference Proceedings (OSTI)

AOCS member magazine that provide international news on fats, oils, surfactants, detergents, and related material. inform About Inform Publications aocs articles book books cdrom cdroms detergents echapters fats inform international journal journ

344

Department of Energy Announces Key Additions to Public Affairs Staff |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Key Additions to Public Affairs Announces Key Additions to Public Affairs Staff Department of Energy Announces Key Additions to Public Affairs Staff February 26, 2009 - 12:00am Addthis WASHINGTON, DC - Today, the Department of Energy announced key staff additions to the Office Public Affairs: Dan Leistikow, Director of Public Affairs; Tom Reynolds, Deputy Director of Public Affairs; Stephanie Mueller, Press Secretary; and Tiffany Edwards, Deputy Press Secretary. "I am pleased to have these talented individuals join the Department of Energy", said Secretary Steven Chu. "Having worked on President Obama's presidential campaign Dan, Tom, Stephanie and Tiffany bring knowledge about the President's commitment to end our addiction to foreign oil, invest in alternative and renewable energy, address the global climate crisis and

345

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts June 10, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joan Evans, Assistant Secretary for Congressional and Legislative Affairs, Department of Veterans Affairs; Warren F. "Pete" Miller, Jr., PhD, Assistant Secretary for Nuclear Energy, Department of Energy; and John R. Norris, Commissioner, Federal Energy Regulatory Commission. President Obama said, "I am grateful that these three impressive individuals will be working with me in these important roles. The commitment of these experienced public servants has made an impression on

346

Key Science and Engineering Indicators: Digest 2012 | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Science and Engineering Indicators: Digest 2012 Key Science and Engineering Indicators: Digest 2012 BusinessUSA Data/Tools Apps Challenges Let's Talk BusinessUSA You are here Data.gov » Communities » BusinessUSA » Data Key Science and Engineering Indicators: Digest 2012 Dataset Summary Description This 2012 digest of key S&E indicators is an interactive tool that draws from the National Science Board's (NSB's) Science and Engineering Indicators report. The digest serves to draw attention to important trends and data points from across Indicators and to introduce readers to the data resources available in the report. Tags {science,engineering,indicators,statistics,nsf,nsb,srs,federal,government,education,labor,employment,workforce,research,development,industry,international,global,r&d,technology,patents,"research citations"}

347

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 20, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Dr. Steven E. Koonin, Under Secretary for Science, Department of Energy; David Sandalow, Assistant Secretary for Policy and International Affairs, Department of Energy; Ambassador Johnnie Carson, Assistant Secretary for African Affairs, State Department; Kathy Martinez, Assistant Secretary for Disability Employment Policy (ODEP), Department of Labor; Jonathan S. Adelstein, Administrator for the Rural Utilities Service, United States Department of Agriculture; Timothy W. Manning, Deputy Administrator for National Preparedness, FEMA, Department of Homeland Security; and Priscilla

348

Key Activities in Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About » Key Activities in Energy Efficiency About » Key Activities in Energy Efficiency Key Activities in Energy Efficiency The Building Technologies Office conducts work in three key areas in order to continually develop innovative, cost-effective energy saving solutions: research and development (R&D), market stimulation, and building codes and equipment standards. Working with our partners on these activities results in better products, better new homes, better ways to improve older homes, and better buildings in which to work, shop, and lead our everyday lives. Research and Development Spearhead the development of new, energy efficient technologies. Lead R&D activities that reduce home energy use through Building America. Collaborate with industry to improve the energy efficiency of new

349

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Science Undergraduate Laboratory Internships (SULI) SULI Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. SULI Internship Term: Spring 2014 Summer 2014* Fall 2013 On-line Application Opens August 6, 2013 October 18, 2013 May 1, 2013 Applications Due October, 1, 2013 5:00 PM ET January 10, 2014 5:00 PM ET June 12, 2013 5:00 PM ET Offer Notification Period Begins on or around October, 15, 2013 January 20, 2014 June 24, 2013

350

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Visiting Faculty Program (VFP) VFP Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. VFP Term: Summer 2014 On-line Application Opens October 18, 2013 Applications Due January 10, 2014 5:00 PM ET* Offer Notification Period Begins January 20, 2014 All DOE Offers and Notifications Complete April 1, 2014 *A research proposal co-developed with a DOE laboratory researcher must be electronically submitted by all faculty applicants as part of their

351

Energy Secretary Bodman Commends Key Milestone In MOX Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commends Key Milestone In MOX Program Commends Key Milestone In MOX Program Energy Secretary Bodman Commends Key Milestone In MOX Program April 1, 2005 - 11:28am Addthis WASHINGTON, DC - In response to the Nuclear Regulatory Commission's (NRC) authorization of the construction of a U.S. Mixed-Oxide (MOX) Fuel Fabrication Facility at the Department of Energy's Savannah River Site in South Carolina, Secretary of Energy Samuel W. Bodman today released the following statement: "Issuing the permit for construction of a MOX facility in South Carolina is the crucial next step in the MOX program. It is a key milestone in our efforts to dispose of surplus weapons grade plutonium in the U.S. and Russia," Secretary Bodman said. "We look forward to proceeding with this nonproliferation program that will ultimately eliminate enough

352

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about

353

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

354

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

355

SLAC National Accelerator Laboratory - LCLS-II Passes Key Milestone...  

NLE Websites -- All DOE Office Websites (Extended Search)

LCLS-II Passes Key Milestone in DOE Approval Process By Glennda Chui November 1, 2011 The Department of Energy has approved a preliminary budget, schedule and design plans for the...

356

Recommendation for Pair-Wise Key Establishment Schemes ...  

Science Conference Proceedings (OSTI)

... with unilateral key-confirmation from party V to party ... may be a component of a protocol, which in ... Note that protocols, per se, are not specified in this ...

2013-06-05T23:59:59.000Z

357

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network (OSTI)

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

358

First look at cellulose's early production could hold keys to...  

NLE Websites -- All DOE Office Websites (Extended Search)

cellulose's early production could hold keys to bacteria-free medical devices, better biofuel By Jared Sagoff * May 14, 2013 Tweet EmailPrint Produced by plants as well as algae...

359

The use of a logistic map for key generation  

E-Print Network (OSTI)

A key generation scheme is proposed and its performance analyzed. The method, the logistic map scheme (LMS), is applicable for use on wireless networks because it does not require devices to engage in computationally ...

Ando, Megumi, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

360

EIA Data: 2011 United States Residential Sector Key Indicators...  

Open Energy Info (EERE)

Residential Sector Key Indicators and Consumption This datasetis the 2011 United...

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

An Implementation of Key-Based Digital Signal Steganography  

Science Conference Proceedings (OSTI)

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random ...

Toby Sharp

2001-04-01T23:59:59.000Z

362

Interest/Users Group Meeting Proceedings and Key Findings, 2011  

Science Conference Proceedings (OSTI)

This technical update is the summary of the meeting proceedings and key findings for the Fossil Operations and Maintenance Program Area Interest/Users Groups meetings held during 2011. The report represents a culmination of numerous meetings, conferences, users groups, and workshops conducted throughout the year. The document incorporates the meeting logistics and objectives; names of keynote speaker, attendees, and host utility; presentation location, and key findings and recommendations from each meeti...

2011-12-21T23:59:59.000Z

363

Key-and-keyway coupling for transmitting torque  

DOE Patents (OSTI)

The design of an improved key-and-keyway coupling for the transmission of torque is given. The coupling provides significant reductions in stress concentrations in the vicinity of the key and keyway. The keyway is designed with a flat-bottomed u-shaped portion whose inboard end terminates in a ramp which is dished transversely, so that the surface of the ramp as viewed in transverse section defines an outwardly concave arc.

Blue, S.C.; Curtis, M.T.; Orthwein, W.C.; Stitt, D.H.

1975-11-18T23:59:59.000Z

364

W-like bound entangled states and secure key distillation  

E-Print Network (OSTI)

We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

Remigiusz Augusiak; Pawel Horodecki

2008-11-21T23:59:59.000Z

365

Key distillation from Gaussian states by Gaussian operations  

E-Print Network (OSTI)

We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

M. Navascues; J. Bae; J. I. Cirac; M. Lewenstein; A. Sanpera; A. Acin

2004-05-11T23:59:59.000Z

366

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

ystein Mary; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

367

General Information  

Science Conference Proceedings (OSTI)

... at the Embassy Suites Hotel, Pittsburgh, Pennsylvania. For more information on this location, check out the travel information and destination highlights page.

368

Peering Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Peering Information Network Overview Tools Peering Information Interactive Network Map Network Maps Connected Sites Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US)...

369

Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Innovations for Key Innovations for Adding Energy Efficiency to Maintenance Projects A. Wood and J. Wiehagen NAHB Research Center September 2012 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, subcontractors, or affiliated partners makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply

370

"The Ambassadors are key leaders in industry, government, academia, and nonpro  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ambassadors are key leaders in industry, government, academia, and nonprofits Ambassadors are key leaders in industry, government, academia, and nonprofits who are committed to lending their voices and vision to inform and inspire Americans about the critical need for greater diversity in STEM professions, energy entrepreneurship, and climate change adaptation and mitigation." The Honorable Dr. Ernest J. Moniz Secretary U.S. Department of Energy The Honorable Eddie Bernice Johnson is serving her 11th term representing the 30th Congressional District of Texas. In December 2010, Congresswoman Johnson was elected as the first African-American and the first female Ranking Member of the House Committee on Science, Space and Technology. From 2000 to 2002, she was the Ranking Member of the Subcommittee on Research and Science

371

Controlling excess noise in fiber optics continuous variables quantum key distribution  

E-Print Network (OSTI)

We describe a continuous variables coherent states quantum key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecom components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mb/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber set-up is studied as a function of the line transmission and excess noise.

Jrme Lodewyck; Thierry Debuisschert; Rosa Tualle-Brouri; Philippe Grangier

2005-11-10T23:59:59.000Z

372

A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks  

Science Conference Proceedings (OSTI)

Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impractical for a WSN. Random key predistribution ...

Guanfeng Li; Hui Ling; Taieb Znati; Weili Wu

2006-04-01T23:59:59.000Z

373

Employment Information  

Science Conference Proceedings (OSTI)

Employment Information. The CNST technical staff includes Project Leaders, Postdoctoral and Student Researchers, Visiting ...

2013-01-16T23:59:59.000Z

374

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

375

RFS - Energy Information Administration  

U.S. Energy Information Administration (EIA)

Weather: The possibility of a hot summer or cold winter would put upward demand pressure on gas markets. Storage ... CELLS BELOW THAT ARE OUTLINED IN ...

376

Information Science REFERENCE  

E-Print Network (OSTI)

This handbook examines issues and challenges in successfully deploying new generation Web applications and outlines their implications for businesses and individuals.

unknown authors

2009-01-01T23:59:59.000Z

377

Charging Your Electric Car on the Smart Grid: Three Key ...  

Science Conference Proceedings (OSTI)

... that deal with exchanging financial information or using ... reduced carbon emissions, and energy independence. ... vehicles grow in market share will ...

2012-05-21T23:59:59.000Z

378

Information practices of disaster preparedness professionals in multidisciplinary groups  

Science Conference Proceedings (OSTI)

OBJECTIVE: This article summarizes the results of a descriptive qualitative study addressing the question, what are the information practices of the various professionals involved in disaster preparedness? We present key results, but focus on issues ... Keywords: disaster preparedness, information behavior, information practice, information science theory, library science research

Barbara L. Folb; Ellen G. Detlefsen; Sandra C. Quinn; Gerald Barron; Jeanette M. Trauth

2010-10-01T23:59:59.000Z

379

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact...

380

Turn Your Key, Be Idle Free | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes gasoline, costs money, produces pollutants, and yet doesn't get you anywhere? Idling! And yet, every year, Americans waste 3 billion gallons of fuel by idling their vehicles. Idling is running a vehicle any time that it's not moving. In this condition, the car's fuel economy is exactly zero miles per gallon. Although many people think that restarting the engine too often will wear out the starter, that idea is just an "old husband's tale." In fact, idling places unnecessary wear-and-tear on the engine, and many manufacturers discourage it. Although drivers can't avoid some amount of idling, such as being stuck in

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar July 12, 2010 - 3:51pm Addthis APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS Nestled in the mountains of northern Arizona and just 75 miles from Grand Canyon National Park, the city of Flagstaff, Ariz. is an ideal city for the Arizona Public Service (APS) to pilot a high concentration of solar photovoltaic energy systems. "Flagstaff is unique electrically," says Eran Mahrer, Director of Renewable

382

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

383

Property:Specializations, Capabilities, and Key Facility Attributes Not  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Jump to: navigation, search Property Name Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Property Type Text Pages using the property "Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere" Showing 25 pages using this property. 1 11-ft Wave Flume Facility + Glass window 6 6-ft Wave Flume Facility + Glass window A Alden Large Flume + This is a recirculating flume facility, so a constant velocity can be maintained indefinitely. This allows collection of a much greater amount of data than possible in tow tanks. Alden's biologists are highly experienced in assessing the impacts of generation devices on fish and the facilities allow for accurate testing with fish in a highly controlled environment.

384

Special Presentation: Key Findings from the Barrier Immune Radio  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Presentation: Key Findings from the Barrier Immune Radio Special Presentation: Key Findings from the Barrier Immune Radio Communications Project Speaker(s): Francis Rubinstein Girish Ghatikar Peter Haugen Date: November 29, 2007 - 12:00pm Location: 90-3122 The Barrier Immune Radio Communications (BIRC) Project was established in January 2007 by the Demand Response Emerging Technologies Program (DRETD) to identify radio frequency technologies that could enable the widespread deployment of Demand Response strategies in buildings. Researchers from Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory will present the key findings from this project in a one-hour presentation. Researchers found that several of the RF technologies tested at LBNL's Molecular Foundry building were able to provide sufficiently

385

Small Businesses Key in Hydropower Tech Advancement | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Businesses Key in Hydropower Tech Advancement Businesses Key in Hydropower Tech Advancement Small Businesses Key in Hydropower Tech Advancement September 6, 2011 - 2:59pm Addthis Earlier today, the Department of Energy and the Department of Interior announced nearly $17 million in funding over the next three years to advance hydropower technology. The funding announced today will go to sixteen innovative projects around the country, including sustainable small hydro projects, like the ones from Hydro Green Energy, a small business that handles hydroelectric power generation and power and communication line construction. The company, which has eight employees currently, has been awarded funding for two projects. Near Space Systems, a Colorado Springs-based company, is a service-disabled veteran-owned business with a manufacturing focus that's

386

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage: The Key to a Reliable, Clean Electricity Supply Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

387

Technology Key to Harnessing Natural Gas Potential | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy What does this project do? Builds on President Obama's call for a new era for American energy

388

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist for the Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

389

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist, Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

390

Worldwide Trends in Energy Use and Efficiency: Key Insights from  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Focus Area: Power Plant Efficiency Topics: Potentials & Scenarios Website: www.iea.org/papers/2008/indicators_2008.pdf Equivalent URI: cleanenergysolutions.org/content/worldwide-trends-energy-use-and-effic Language: English Policies: "Regulations,Deployment Programs" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

391

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

392

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

393

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

394

Single, Key Gene Discovery Could Streamline Production of Biofuels |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON, DC -- A team of researchers at the Department of Energy's BioEnergy Science Center (BESC) have pinpointed the exact, single gene that controls ethanol production capacity in a microorganism. This discovery could be the missing link in developing biomass crops that produce higher concentrations of ethanol at lower costs. "The Department of Energy relies on the scientific discoveries of its labs and research centers to improve the production of clean energy sources," said Energy Secretary Steven Chu. "This discovery is an important step in developing biomass crops that could increase yield of

395

Building MRV Standards and Capacity in Key Countries | Open Energy  

Open Energy Info (EERE)

MRV Standards and Capacity in Key Countries MRV Standards and Capacity in Key Countries Jump to: navigation, search Name Building MRV Standards and Capacity in Key Countries Agency/Company /Organization World Resources Institute (WRI) Sector Climate Focus Area Renewable Energy Topics Implementation Website http://www.wri.org/topics/mrv Program Start 2011 Program End 2014 Country Brazil, Colombia, Ethiopia, India, South Africa, Thailand South America, South America, Eastern Africa, Southern Asia, Southern Africa, South-Eastern Asia References World Resources Institute (WRI)[1] Program Overview Developing countries will be required to measure, report, and verify (MRV) mitigation actions according to international guidelines, but few have the capacity to do so. The goal of this project is to build the capacity of a

396

SECOQC White Paper on Quantum Key Distribution and Cryptography  

E-Print Network (OSTI)

The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

Romain Alleaume; Jan Bouda; Cyril Branciard; Thierry Debuisschert; Mehrdad Dianati; Nicolas Gisin; Mark Godfrey; Philippe Grangier; Thomas Langer; Anthony Leverrier; Norbert Lutkenhaus; Philippe Painchault; Momtchil Peev; Andreas Poppe; Thomas Pornin; John Rarity; Renato Renner; Gregoire Ribordy; Michel Riguidel; Louis Salvail; Andrew Shields; Harald Weinfurter; Anton Zeilinger

2007-01-23T23:59:59.000Z

397

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

398

Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation  

E-Print Network (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

Dagmar Bruss; Matthias Christandl; Artur Ekert; Berthold-Georg Englert; Dagomir Kaszlikowski; Chiara Macchiavello

2003-03-31T23:59:59.000Z

399

Security bounds for continuous variables quantum key distribution  

E-Print Network (OSTI)

Security bounds for key distribution protocols using coherent and squeezed states and homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) collective attacks where Eve interacts individually with the sent states, but delays her measurement until the end of the reconciliation process. For the case of a lossy line and coherent states, it is first proven that a secure key distribution is possible up to 1.9 dB of losses. For the second scenario, the security bounds are the same as for the completely incoherent attack.

Miguel Navascues; Antonio Acin

2004-07-19T23:59:59.000Z

400

Measuring students' information skills through concept mapping  

Science Conference Proceedings (OSTI)

This paper seeks to develop a methodology that will discover, specify and measure students?? abilities and skills in creating concept maps. Because competencies are the key factor in higher education, the paper analyzes the role of concept maps ... Keywords: competencies, concept maps, information literacy, information organization, skills

Maria Pinto; Anne-Vinciane Doucet; Andrs Fernndez-Ramos

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Scalar Reconciliation for Gaussian Modulation of Two-Way Continuous-Variable Quantum Key Distribution  

E-Print Network (OSTI)

The two-way continuous-variable quantum key distribution (CVQKD) systems allow higher key rates and improved transmission distances over standard telecommunication networks in comparison to the one-way CVQKD protocols. To exploit the real potential of two-way CVQKD systems a robust reconciliation technique is needed. It is currently unavailable, which makes it impossible to reach the real performance of a two-way CVQKD system. The reconciliation process of correlated Gaussian variables is a complex problem that requires either tomography in the physical layer that is intractable in a practical scenario, or high-cost calculations in the multidimensional spherical space with strict dimensional limitations. To avoid these issues, we propose an efficient logical layer-based reconciliation method for two-way CVQKD to extract binary information from correlated Gaussian variables. We demonstrate that by operating on the raw-data level, the noise of the quantum channel can be corrected in the scalar space and the reconciliation can be extended to arbitrary high dimensions. We prove that the error probability of scalar reconciliation is zero in any practical CVQKD scenario, and provides unconditional security. The results allow to significantly improve the currently available key rates and transmission distances of two-way CVQKD. The proposed scalar reconciliation can also be applied in one-way systems as well, to replace the existing reconciliation schemes.

Laszlo Gyongyosi

2013-08-06T23:59:59.000Z

402

Information Accountability  

E-Print Network (OSTI)

Ease of information flow is both the boon and the bane of large-scale, decentralized systems like the World Wide Web. For all the benefits and opportunities brought by the information revolution, with that same revolution ...

Weitzner, Daniel J.

2007-06-13T23:59:59.000Z

403

Contractor Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Vienna U.S. Vienna Vienna, Austria Other Information U.S. Dept. of State U.S. Dept. of Energy IAEA NRC CONTRACTOR INFORMATION Contractor Procurement Template SSTS Process...

404

The S/KEY One-Time Password System  

Science Conference Proceedings (OSTI)

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories ...

N. Haller

1995-02-01T23:59:59.000Z

405

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels  

Science Conference Proceedings (OSTI)

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally ...

Dominic Mayers

1996-08-01T23:59:59.000Z

406

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network (OSTI)

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

407

What were the key energy commodity price trends in 2011?  

Reports and Publications (EIA)

Energy commodity price trends varied widely during 2011. Crude oil and petroleum products prices increased during 2011, while natural gas, coal, and electricity prices declined. This article provides an overview of key energy commodity price trends in 2011 based on prices seen in futures markets.

2012-02-14T23:59:59.000Z

408

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

409

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

410

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

An improved quantum key distribution test system operating at clock rates of up to 2GHz using a specially adapted commercially available silicon single photon avalanche diode is presented. The use of improved detectors has improved the fibre-based test system performance in terms of transmission distance and quantum bit error rate.

K. J. Gordon; V. Fernandez; G. S. Buller; I. Rech; S. D. Cova; P. D. Townsend

2006-05-08T23:59:59.000Z

411

Illustrated plant identification keys: An interactive tool to learn botany  

Science Conference Proceedings (OSTI)

An Interactive Dichotomous Key (IDK) for 390 taxa of vascular plants from the Ria de Aveiro, available on a website, was developed to help teach botany to school and universitary students. This multimedia tool includes several links to Descriptive and ... Keywords: Applications in subject areas, Post-secondary education, Secondary education, Teaching/learning strategies

Helena Silva; Rosa Pinho; Lsia Lopes; Antnio J. A. Nogueira; Paulo Silveira

2011-05-01T23:59:59.000Z

412

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

construction of a verifiable ran- dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

413

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

#cient construction of a verifiable ran­ dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali­Rabin­Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

414

A Veri able Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

?? Abstract. We give a simple and e?cient construction of a veri#12;able random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids reasonable given cur- rent state of knowledge. For small message spaces, our VRF's proofs and keys have

415

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

416

Extracting Key Factors to Design Applications in Ambient Intelligence Environment  

Science Conference Proceedings (OSTI)

In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary in developing those applications. We developed four applications applied ... Keywords: ambient feedback, persuasive technology, behavior modification, emotional engagement

Hiroaki Kimura; Tatsuo Nakajima

2008-12-01T23:59:59.000Z

417

news and views A key issue for hydrogen storage materi-  

E-Print Network (OSTI)

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

418

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

419

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network (OSTI)

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS Gerald A. Navratil Columbia University/FESAC Burning Plasma Strategy Dec 2002 NRC/NAS Interim Report on Burning Plasmas Jan 30, 2003 DOE of the physics of burning plasma, advance fusion technology, and contribute to the development of fusion energy

420

Key issues in ITER diagnostics: Problems and solutions (invited)  

Science Conference Proceedings (OSTI)

The key problems associated with designing diagnostic systems for the International Thermonuclear Experimental Reactor (ITER) are identified and representative solutions are described. The plans for dealing with some outstanding issues are briefly presented. The detailed work is specific to the ITER

A. E. Costley; Members of the ITER Joint Central Team and Home Teams

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Quantum key distribution with a reference quantum state  

SciTech Connect

A new quantum key distribution protocol stable at arbitrary losses in a quantum communication channel has been proposed. For the stability of the protocol, it is of fundamental importance that changes in states associated with losses in the communication channel (in the absence of the eavesdropper) are included in measurements.

Molotkov, S. N., E-mail: molotkov@issp.ac.ru [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

2011-11-15T23:59:59.000Z

422

Generic Security Proof of Quantum Key Exchange using Squeezed States  

E-Print Network (OSTI)

Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.

Karin Poels; Pim Tuyls; Berry Schoenmakers

2005-08-09T23:59:59.000Z

423

The Key Renewal Theorem for a Transient Markov Chain  

E-Print Network (OSTI)

We consider a time-homogeneous Markov chain $X_n$, $n\\ge0$, valued in ${\\bf R}$. Suppose that this chain is transient, that is, $X_n$ generates a $\\sigma$-finite renewal measure. We prove the key renewal theorem under condition that this chain has asymptotically homogeneous at infinity jumps and asymptotically positive drift.

Korshunov, Dmitry

2007-01-01T23:59:59.000Z

424

Key website factors in e-business strategy  

Science Conference Proceedings (OSTI)

The design of a quality website, as part of e-business strategy, has become a key element for success in the online market. This article analyzes the main factors that must be taken into account when designing a commercial website, concentrating on the ... Keywords: Accessibility, Content, Navigability, Speed, Web Assessment Index (WAI), Website

Blanca HernNdez; Julio JimNez; M. Jos MartN

2009-10-01T23:59:59.000Z

425

Mercury Information Clearinghouse  

SciTech Connect

The Canadian Electricity Association (CEA) identified a need and contracted the Energy & Environmental Research Center (EERC) to create and maintain an information clearinghouse on global research and development activities related to mercury emissions from coal-fired electric utilities. With the support of CEA, the Center for Air Toxic Metals{reg_sign} (CATM{reg_sign}) Affiliates, and the U.S. Department of Energy (DOE), the EERC developed comprehensive quarterly information updates that provide a detailed assessment of developments in the various areas of mercury monitoring, control, policy, and research. A total of eight topical reports were completed and are summarized and updated in this final CEA quarterly report. The original quarterly reports can be viewed at the CEA Web site (www.ceamercuryprogram.ca). In addition to a comprehensive update of previous mercury-related topics, a review of results from the CEA Mercury Program is provided. Members of Canada's coal-fired electricity generation sector (ATCO Power, EPCOR, Manitoba Hydro, New Brunswick Power, Nova Scotia Power Inc., Ontario Power Generation, SaskPower, and TransAlta) and CEA, have compiled an extensive database of information from stack-, coal-, and ash-sampling activities. Data from this effort are also available at the CEA Web site and have provided critical information for establishing and reviewing a mercury standard for Canada that is protective of environment and public health and is cost-effective. Specific goals outlined for the CEA mercury program included the following: (1) Improve emission inventories and develop management options through an intensive 2-year coal-, ash-, and stack-sampling program; (2) Promote effective stack testing through the development of guidance material and the support of on-site training on the Ontario Hydro method for employees, government representatives, and contractors on an as-needed basis; (3) Strengthen laboratory analytical capabilities through analysis and quality assurance programs; and (4) Create and maintain an information clearinghouse to ensure that all parties can keep informed on global mercury research and development activities.

Chad A. Wocken; Michael J. Holmes; Dennis L. Laudal; Debra F. Pflughoeft-Hassett; Greg F. Weber; Nicholas V. C. Ralston; Stanley J. Miller; Grant E. Dunham; Edwin S. Olson; Laura J. Raymond; John H. Pavlish; Everett A. Sondreal; Steven A. Benson

2006-03-31T23:59:59.000Z

426

Information Needs  

Science Conference Proceedings (OSTI)

...J.H. Westbrook, Sources of Materials Property Data and Information, Materials Selection and Design, Vol 20, ASM Handbook,

427

General Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Feature Stories Public Reading Room: Environmental Documents, Reports LANL Home Phonebook Calendar Video Business Small Business General Information General...

428

Information Exchange  

Science Conference Proceedings (OSTI)

To encourage the exchange of information, NIST holds many workshops, seminars, tours and other events available to the public. ...

2012-08-29T23:59:59.000Z

429

Dry sorbent injection may serve as a key pollution control ...  

U.S. Energy Information Administration (EIA)

Energy Information Administration ... Home; Browse by Tag; Most Popular Tags. ... are the technologies that will allow plants to meet the MATS for HCl and other acid ...

430

NIST Demonstrates Key Step in Use of Quantum Computers ...  

Science Conference Proceedings (OSTI)

... to factor large numbers, are used to encode ... Nevertheless, Shor's algorithm uses these properties to ... in the original input, and to use this information ...

2013-04-23T23:59:59.000Z

431

Verifiable Random Functions from Identity-based Key Encapsulation  

E-Print Network (OSTI)

encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable by Micali, Rabin and Vadhan [21]. Informally a VRF is something that behaves like a random function but also into a VRF using the Goldreich-Levin [15] theorem to "extract" random bits. Unfortunately, however, the VRF

Catalano, Dario

432

Lower Merion a Key Player in Alternative Fuel Buses  

DOE Green Energy (OSTI)

This 2-page Clean Cities fact sheet describes the use of natural gas power in buses by the Lower Merion School District, located in the western suburbs of Philadelphia, PA. It includes information on the history of the program, along with contact information for the local Clean Cities Coordinator and Lower Merion School District.

Not Available

2004-04-01T23:59:59.000Z

433

Header Information  

National Nuclear Security Administration (NNSA)

26f27f Project Number Project 26g27g Material Type MaterialType 26h27h CompFacility Code CompCode IAEACompCode FacilityCompCode 26i27i Owner Code OwnerCode 26j27j Key...

434

Contributions to Key Energy Conversion Technologies and Advanced Methods  

NLE Websites -- All DOE Office Websites (Extended Search)

Contributions to Key Energy Conversion Technologies and Advanced Methods Contributions to Key Energy Conversion Technologies and Advanced Methods for Optimum Energy Systems Design and Planning Speaker(s): Daniel Favrat Date: February 27, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Kristina LaCommare This presentation reviews some of EPFL-LENI's recent contributions to advanced cogeneration and heat pump technologies as well as to new system design approaches based on multimodal evolutionar algorithms. In the field of cogeneration, theoretical and experimental results show that gas engines with unscavenged ignition prechambers can, without the need of a catalyst, achieve high efficiencies with reasonable emissions with both natural gas and biogas. Combination with Organic Rankine Cycle (ORC) heat recovery

435

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

436

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

and Policy Recommendations for Future Bioenergy and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Agency/Company /Organization Food and Agriculture Organization of the United Nations Sector Land Focus Area Biomass, Agriculture Topics Co-benefits assessment, Policies/deployment programs, Background analysis Resource Type Lessons learned/best practices Website http://www.fao.org/docrep/013/ Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development[1] Abstract "The Government of Thailand, through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion

437

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2011 - 9:20pm August 2, 2011 - 9:20pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Ashton B. Carter - Nominee for Deputy Secretary of Defense, Department of Defense I. Charles McCullough III - Inspector General of the Intelligence Community, Office of the Director of National Intelligence Ernest Mitchell, Jr. - Administrator, United States Fire Administration, Federal Emergency Management Agency, Department of Homeland Security Nancy M. Ware - Director, Court Services and Offender Supervision Agency for the District of Columbia Gregory H. Woods - General Counsel, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts:

438

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 27, 2011 - 3:25pm July 27, 2011 - 3:25pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson - Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy Dot Harris - Director of the Office of Minority Economic Impact, Department of Energy President Obama said, "I am honored that these talented individuals have decided to join this Administration and serve our country. I look forward to working with them in the months and years to come." President Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson, Nominee for Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy

439

Key Accomplishments @ Catalysis: Reactivity and Structure Group | Chemistry  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments WGS: Importance of the Metal-Oxide Interface in Catalysis: In Situ Studies of the Water-Gas Shift Reaction by Ambient-Pressure X-ray Photoelectron Spectroscopy A New Type of Strong Metal-Support Interaction and the Production of H-2 through the Transformation of Water on Pt/CeO2(111) and Pt/CeOx/TiO2(110) Catalysts In situ studies of CeO2-supported Pt, Ru, and Pt-Ru alloy catalysts for the water-gas shift reaction: Active phases and reaction intermediates In situ/operando studies for the production of hydrogen through the water-gas shift on metal oxide catalysts Mechanistic understanding of WGS catalysts from first principles: Au(111) Supported Oxide Nanoparticles Theoretical catalyst optimization of WGS catalysts: Cu(111) supported oxide nanostructures

440

Quantum key distribution using intra-particle entanglement  

E-Print Network (OSTI)

We propose the use of intra-particle entanglement to enhance the security of a practical implementation of the Bennett-Brassard-1984 (BB84) quantum key distribution scheme. Intra-particle entanglement is an attractive resource since it can be easily generated using only linear optics. Security is studied under a simple model of incoherent attack for protocols involving two or all five mutually unbiased bases. In terms of efficiency of secret key generation and tolerable error rate, the latter is found to be superior to the former. We find that states that allow secrecy distillation are necessarily entangled, though they may be local. Since more powerful attacks by Eve obviously exist, our result implies that security is a strictly stronger condition than entanglement for these protocols.

S. Adhikari; Dipankar Home; A. S. Majumdar; A. K. Pan; Akshata Shenoy H.; R. Srikanth

2011-01-04T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network (OSTI)

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

442

JM to Cancel DOE M 200.1-1 Ch 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The Federal Chief Information Officers' (CIO) Council has consolidated PKI programs into the Identity, Credential, and Access Management (ICAM) Program. PKI ...

2013-06-11T23:59:59.000Z

443

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network (OSTI)

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect air-quality in rooms of multi-polluting heat sources. Results show that it is very important to determine the suitable air-intemperature , air-inflow, and heat source quantity and dispersion, to obtain better displacement ventilation results.

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

444

Extensible router for multi-user quantum key distribution network  

E-Print Network (OSTI)

A feasible quantum key distribution (QKD) network scheme has been proposed with the wavelength routing. An apparatus called "quantum router", which is made up of many wavelength division multiplexers, can route the quantum signals without destroying their quantum states. Combining with existing point-to-point QKD technology, we can setup a perfectly QKD star-network. A simple characteristic and feasibility of this scheme has also been obtained.

Zhang, T; Han, Z F; Mo, X F; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Zhang, Tao

2006-01-01T23:59:59.000Z

445

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

446

Key Elements of and Materials Performance Targets for Highly Insulating  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Elements of and Materials Performance Targets for Highly Insulating Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Title Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Publication Type Journal Article LBNL Report Number LBNL-5099E Year of Publication 2011 Authors Gustavsen, Arlid, Steinar Grynning, Dariush K. Arasteh, Bjørn Petter Jelle, and Howdy Goudey Journal Energy and Buildings Volume 43 Issue 10 Pagination 2583-2594 Date Published 10/2011 Keywords Fenestration, heat transfer modeling, thermal performance, thermal transmittance, u-factor, window frames Abstract The thermal performance of windows is important for energy efficient buildings. Windows typically account for about 30-50 percent of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U-factor of their opaque counterparts (wall, roof and floor constructions). In well insulated buildings the U-factor of walls, roofs an floors can be between 0.1-0.2 W/(m2K). The best windows have U-values of about 0.7-1.0. It is therefore obvious that the U-factor of windows needs to be reduced, even though looking at the whole energy balance for windows (i.e. solar gains minus transmission losses) makes the picture more complex.

447

DOE-STD-1107-97; DOE Standard Knowledge, Skills, and Abilities For Key Radiation Protection Positions at DOE Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

STANDARD STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910 Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1107-97 January 1997 Reaffirmed June 2005 This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (423) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE97003656 Reaffirmation with Errata DOE-HDBK-1107-97 Knowledge, Skills, and Abilities for Key Radiation Protection Positions at DOE

448

Information Forests  

E-Print Network (OSTI)

We describe Information Forests, an approach to classification that generalizes Random Forests by replacing the splitting criterion of non-leaf nodes from a discriminative one -- based on the entropy of the label distribution -- to a generative one -- based on maximizing the information divergence between the class-conditional distributions in the resulting partitions. The basic idea consists of deferring classification until a measure of "classification confidence" is sufficiently high, and instead breaking down the data so as to maximize this measure. In an alternative interpretation, Information Forests attempt to partition the data into subsets that are "as informative as possible" for the purpose of the task, which is to classify the data. Classification confidence, or informative content of the subsets, is quantified by the Information Divergence. Our approach relates to active learning, semi-supervised learning, mixed generative/discriminative learning.

Yi, Zhao; Dewan, Maneesh; Zhan, Yiqiang

2012-01-01T23:59:59.000Z

449

Information Repository  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Repository Index Permit Renewal Application (Parts A and B) Submissions, September 2009, Department of Energy CBFOWashington TRU Solutions Administrative Completeness...

450

Personal Information  

NLE Websites -- All DOE Office Websites (Extended Search)

with a friend or relative. Personal Information Full name Home address Street City State Zip Home phone E-mail address Birthday SSN (MMDDYYYY) Passport number Driver's license...

451

Radiation Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiation Information << Timeline >> Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player July 31, 1942 The Army Corp of Engineers leases...

452

Project information  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Information Amistad Project (Texas) Collbran Project (Colorado) Colorado River Storage Project Dolores Project (Colorado) Falcon Project (Texas) Provo River Project (Utah)...

453

Training Management Information System  

Science Conference Proceedings (OSTI)

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

454

VULCAN Proposal Information | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Points for Beam Time Proposals Key Points for Beam Time Proposals The key points below are essential elements the Scientific Review Committee (SRC) considers when assigning a rating to your proposal for beam time on the VULCAN engineering instrument at SNS; see http://neutrons.ornl.gov/vulcan/. They apply to the Statement of Research, i.e., after the specified sections: Title, PI, abstract, facility requested, days requested, student involvement, experiment team, samples, and sample environment. Consideration of the key points will 1) encourage you to think through the feasibility and reasonableness of your proposed measurement and 2) provide relevant information to the SRC so they can make a sound judgment. Key points to include in your Statement of Research What scientific question are you trying to answer?

455

Smart meters | Open Energy Information  

Open Energy Info (EERE)

meters meters Jump to: navigation, search Smart meters are part of the initiative to install a smart grid to better power the United States in the coming year, helping incorporate renewable energy technologies into the grid while also making the existing grid more efficient. About Smart Grid Smartgridlogo.png The purpose of smart meters is to aid development of the United States Smart Grid initiative. The purpose of Smart Grid "to support the modernization of the nation's electricity transmission and distribution system to maintain a reliable and secure electricity infrastructure, outlined in Title XIII of the Energy Independence and Security Act of 2007 (PDF 821 KB)." More in-depth information can be found at SmartGrid.gov. It is believed that the implementation of a new Smart Grid "will make our grid more secure

456

Information Management for Reverse Logistics  

E-Print Network (OSTI)

Introduction In this chapter, we examine how Information and Communication Technologies (ICT) are being used to support reverse logistics. In this respet, this chapter does not follow a quantitative approach as the rest of the book. Nonetheless, the topics covered in this section outline how ICT systems enable and support the quantitative approaches presented in other chapters of this book. Furthermore, this chapter provides a roadmap to the reader about what aspects of reverse logistics are implemented and what remains to be addressed in the future. Most ICT systems for reverse logistics have been developed to address needs in a specific sector (i.e. decision making on di#erent recovery options of returns, designing a product for optimal end of use recovery, etc.) or to cover the reverse logistics requirements of a particular company. Thus, in our attempt to present this area systematically we need to develop a framework of reference first. For that reason, we go back to the essent

Angelika Kokkinaki; Rob Zuidwijk

2002-01-01T23:59:59.000Z

457

Information Bridge: DOE Scientific and Technical Information...  

Office of Scientific and Technical Information (OSTI)

DOE Scientific and Technical Information DOE Scientific and Technical Information DOE * OSTI * Go Mobile Information Bridge: DOE Scientific and Technical Information FAQ * Widget...

458

Registration Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Registration Information Registration Information Registration Information Focusing on methods and computational tools used to help sequence, assemble, and finish genomes, including new sequencing technologies. Contact Chris Detter (505) 665-3024 Email Registration is limited to 150 participants so please register ASAP if you plan to attend. There is no deadline for registration. To register, please send an e-mail to Chris Detter with your contact information: Name Citizenship status. Institution information. Area(s) of specific interest. Do you plan to submit an abstract by March 30th? Within 48 hrs of registering you will be sent an e-mail confirmation number that you should include on your abstract if you are submitting one. To submit an abstract, please refer to the Abstract Submission guidelines.

459

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyberspace Policy Review: Assuring a Trusted and Resilient Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties and privacy communities, State governments, international partners, and the Legislative and Executive Branches. This paper summarizes the review team's conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure More Documents & Publications

460

ON USING GRAPHICAL MODELS FOR SUPPORTING CONTEXT AWARE INFORMATION RETRIEVAL  

E-Print Network (OSTI)

ON USING GRAPHICAL MODELS FOR SUPPORTING CONTEXT AWARE INFORMATION RETRIEVAL Lynda Tamine@irit.fr, boubekeur@irit.fr, bougha@irit.fr Keywords: Contextual information retrieval, Graphical models, Influence, a key challenge in in- formation retrieval nowadays consists in enhancing an information seeking process

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

WP1: Targeted and informative forecast system design  

E-Print Network (OSTI)

WP1: Targeted and informative forecast system design Emma Suckling, Leonard A. Smith and David Stainforth EQUIP Meeting ­ August 2011 Edinburgh #12;Targeted and informative forecast system design Develop models to support decision making (1.4) #12;Targeted and informative forecast system design KEY QUESTIONS

Stevenson, Paul

462

Ontology-based information extraction for business intelligence  

Science Conference Proceedings (OSTI)

Business Intelligence (BI) requires the acquisition and aggregation of key pieces of knowledge from multiple sources in order to provide valuable information to customers or feed statistical BI models and tools. The massive amount of information available ... Keywords: business intelligence, cross-source entity coreference, ontology-based information extraction

Horacio Saggion; Adam Funk; Diana Maynard; Kalina Bontcheva

2007-11-01T23:59:59.000Z

463

Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative *Ways of Using Wireless Technology to Help You Reduce Energy Usage at your Facility Together with our industry partners, we strive to: * Accelerate adoption of the many energy-efficient technologies and practices available today * Conduct vigorous technology innovation to radically improve future energy diversity, resource efficiency, and carbon mitigation * Promote a corporate culture of energy efficiency and carbon management What Is the Industrial Technologies Program ? The Industrial Technologies Program (ITP) is the lead federal agency responsible for improving energy efficiency in the largest energy-using sector of the country. Industrial Sector National Initiative

464

Local structures - key to improved gas adsorption in carbon materials |  

NLE Websites -- All DOE Office Websites (Extended Search)

Functional Materials for Energy Functional Materials for Energy Local structures - key to improved gas adsorption in carbon materials September 23, 2013 (Inset, top left) A simulated disordered carbon structure. (Inset, bottom right) Same structure, with dense colored regions showing the strongest adsorption positions. (Main figure) Isosteric heat of adsorption as a function of carbon density, showing the strong change of adsorption with pore size. Combined results from electron microscopy, neutron scattering, and theory, illustrate the link between local structures and adsorption properties in carbon materials. The achieved understanding at the atomic scale is a crucial step towards predicting and designing materials with enhanced gas adsorption properties, with important implications for applications such as

465

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

466

Stable polarization-encoded quantum key distribution in fiber  

E-Print Network (OSTI)

Polarizations of single-photon pulses have been controlled with long-term stability of more than 10 hours by using an active feedback technique for auto-compensation of unpredictable polarization scrambling in long-distance fiber. Experimental tests of long-term operations in 50, 75 and 100 km fibers demonstrated that such a single-photon polarization control supported stable polarization encoding in long-distance fibers to facilitate stable one-way fiber system for polarization-encoded quantum key distribution, providing quantum bit error rates below the absolute security threshold.

Wu, G; Li, Y; Zeng, H; Wu, Guang; Chen, Jie; Li, Yao; Zeng, Heping

2006-01-01T23:59:59.000Z

467

Renewable: A key component of our global energy future  

DOE Green Energy (OSTI)

Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

Hartley, D.

1995-12-31T23:59:59.000Z

468

Key results from SB8 simulant flowsheet studies  

SciTech Connect

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

469

New and Underutilized Technology: HVAC Occupancy Sensors | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HVAC Occupancy Sensors New and Underutilized Technology: HVAC Occupancy Sensors October 4, 2013 - 4:20pm Addthis The following information outlines key deployment considerations...

470

New and Underutilized Technology: Air-side Economizers and Filters for Data Centers  

Energy.gov (U.S. Department of Energy (DOE))

The following information outlines key deployment considerations for air-side economizers and filters for data centers within the Federal sector.

471

Experimental work related to two bismuth sulfate cycles and their possible improvement. Outline of a possible antimonyl sulfate cycle with separate evolution of sulfur dioxide and oxygen  

DOE Green Energy (OSTI)

Two bismuth sulfate cycles are made possible by the stepwise decomposition of the sulfate-oxysulfate system. Omitting statement of the steps for decomposition of SO/sub 3/ and the electrochemical formation of H/sub 2/ and H/sub 2/SO/sub 4/ from SO/sub 2/ and H/sub 2/O, the key reactions are: Cycle I - Bi/sub 2/(SO/sub 4/)/sub 3/ = Bi/sub 2/O/sub 2/ /sub 3/(SO/sub 4/)/sub 0/ /sub 7/ + 2.3 SO/sub 3/; Bi/sub 2/O/sub 2/ /sub 3/(SO/sub 4/)/sub 0/ /sub 7/ + 2.3 H/sub 2/SO/sub 4/ = Bi/sub 2/(SO/sub 4/)/sub 3/ + 2.3 H/sub 2/O; Cycle II - Bi/sub 2/O(SO/sub 4/)/sub 2/ = Bi/sub 2/O/sub 2/ /sub 3/(SO/sub 4/)/sub 0/ /sub 7/ + 1.3 SO/sub 3/; Bi/sub 2/O/sub 2/ /sub 3/(SO/sub 4/)/sub 0/ /sub 7/ + 1.3 H/sub 2/SO/sub 4/ = Bi/sub 2/O(SO/sub 4/)/sub 2/ + 1.3 H/sub 2/O. Cycle I proceeds through the intermediate oxysulfates Bi/sub 2/O(SO/sub 4/)/sub 2/ and Bi/sub 2/O/sub 2/SO/sub 4/ and Cycle II through Bi/sub 2/O/sub 2/SO/sub 4/. Cycle I has the advantage of generating 2.3 moles of H/sub 2/ per mole of Bi/sub 2/O/sub 3/, compared with 1.3 for Cycle II. Published work on the Bi/sub 2/O/sub 3/-SO/sub 3/-H/sub 2/O system shows that Bi/sub 2/(SO/sub 4/)/sub 3/ is the stable solid in contact with H/sub 2/SO/sub 4/ solutions above 52.7 wt%, so that acid of at least this strength would have to be used in Cycle I. Concentrations between about 3 wt% and 52.7 wt% could be used for Cycle II. The efficiency for electrochemical formation of H/sub 2/SO/sub 4/ and H/sub 2/ seems at present to be a maximum at around 30 wt% H/sub 2/SO/sub 4/. Some thermodynamic data obtained for the decomposition reactions are presented. A possible improvement in these cycles is also discussed which may provide a solution to a problem of sorption of H/sub 2/SO/sub 4/ solution by the solids and might allow use of a more dilute acid than in Cycle I above. A brief discussion on the possible simplification of the SO/sub 3/-SO/sub 2/-O/sub 2/ separation problem with a sulfuric acid-antimonyl sulfate hybrid cycle is presented. The principal reactions are: (1) Sb/sub 2/O/sub 2/SO/sub 4/ = Sb/sub 2/O/sub 4/ + SO/sub 2/ at 900 K; (2) Sb/sub 2/O/sub 4/ = Sb/sub 2/O/sub 3/ + 1/2 O/sub 2/ at 1300 K; (3) Sb/sub 2/O/sub 3/ + H/sub 2/SO/sub 4/ = Sb/sub 2/O/sub 2/SO/sub 4/ + H/sub 2/O.

Jones, W.M.

1981-01-01T23:59:59.000Z

472

General Information  

NLE Websites -- All DOE Office Websites (Extended Search)

ASD General Information ASD General Information APS Resources & Information A list of useful links for APS staff and users. APS Technical Publications Links to APS technical publications. APS Publications Database The official and comprehensive source of references for APS-related journal articles, conference papers, book chapters, dissertations, abstracts, awards, invited talks, etc. Image Library A collection of APS images. Responsibilities & Interfaces for APS Technical Systems Descriptions of the responsibilities of APS technical groups and how they interface with one another. APS Procedures Operational procedures for the APS. APS Specifications Specifications and approvals for upgrades or changes to existing APS hardware and software. APS Radiation Safety Policy & Procedures Committee Minutes

473

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting  

E-Print Network (OSTI)

We propose a family of sifting-less quantum-key-distribution protocols which use reverse-reconciliation, and are based on weak coherent pulses (WCPs) polarized along m different directions. When m=4, the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing. We compute their total keyrate as function of the channel transmission T, using general information theoretical arguments and we show that they have a higher keyrate than the more standard protocols, both for fixed and optimized average photon number of the WCPs. When no decoy-state protocols (DSPs) are applied, the scaling of the keyrate with transmission is improved from T2 for BB84 to T^(1+1/(m-2)). If a DSP is applied, we show how the keyrates scale linearly with T, with an improvement of the prefactor by 75.96 % for m=4. High values of $ m $ allow to asymptotically approach the keyrate obtained with ideal single photon pulses. The fact that the keyrates of these sifting-less protocols are higher compared to those of the aforementioned more standard protocols show that the latter are not optimal, since they do not extract all the available secret key from the experimental correlations.

Fabio Grazioso; Frdric Grosshans

2013-06-25T23:59:59.000Z

474

The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results  

E-Print Network (OSTI)

This paper summarizes the findings of the U. S. Industrial Electric Motor Systems Market Opportunities Assessment. The Market Assessment was sponsored by the U. S. Department of Energy. The project's principal objectives were to create a detailed portrait of the inventory of motor systems currently in use in US industrial facilities, estimate motor system energy use and potential for energy savings. The research and analysis to support these objectives consisted primarily of on-site motor system inventories of a probability sample of 254 manufacturing facilities nationwide. In addition to characterizing the motor systems in use, the research effort also gathered detailed information on motor system management and purchasing practices. This paper presents key findings from the Market Assessment in regard to patterns of motor energy use, saturation of energy efficiency measures such as efficient motors and adjustable speed drives, and motor system purchase and maintenance practices.

Rosenberg, M.

1999-05-01T23:59:59.000Z

475

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect

This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

Phillip Mills

2012-02-01T23:59:59.000Z

476

Performance of Quantum Key Distribution Protocol with Dual-Rail Displaced Photon States  

E-Print Network (OSTI)

We propose a scheme for quantum key distribution (QKD) protocol with dual-rail displaced photon states. Displaced single photon states carry bit value of code which may be extracted while coherent states carry nothing and they only provide inconclusive outcome. Developed QKD protocol works with experimental attendant noise to observe presence of malicious Eve. Pulses with large amplitudes unlike conventional QKD relying on faint laser pulses are used that may approximate it to standard telecommunication communication and may show resistance to eavesdropping even in settings with high attenuation. Information leakage to the eavesdropper is determined from comparison of output distribution of the outcomes with ideal one that is defined by two additional inaccessible to nobody, saving for who sends the pulses, parameters. Robustness to some possible eavesdropping attacks is shown.

Sergey A. Podoshvedov

2009-05-13T23:59:59.000Z

477

Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)  

Science Conference Proceedings (OSTI)

The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

Not Available

2012-12-01T23:59:59.000Z

478

FEDERAL INFORMATION PROCESSING STANDARDS ...  

Science Conference Proceedings (OSTI)

... This Standard specifies use of a symmetric-key encryption ... definition of "escrow", the key component holders provide the components of a ...

2012-12-20T23:59:59.000Z

479

Information Extraction  

Science Conference Proceedings (OSTI)

The automatic extraction of information from unstructured sources has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of structured databases and the abundance of unstructured data. The field of ...

Sunita Sarawagi

2008-03-01T23:59:59.000Z

480

Information Causality  

E-Print Network (OSTI)

We review the literature on Information Causality. Since it's for a book, we don't think an abstract will be needed at all, so we have written this one just for the sake of the arXiv.

Marcin Paw?owski; Valerio Scarani

2011-12-06T23:59:59.000Z

Note: This page contains sample records for the topic "information outlines key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Written Information Equipment TECHNOLOGY: Oral Information  

SCIENTIFIC OR TECHNOLOGICAL Equipment TECHNOLOGY: DEVELOPMENTAL RESOURCES Written Information Oral Information Hardware Facilities Data

482

Information engineering  

SciTech Connect

The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.

Hunt, D.N.

1997-02-01T23:59:59.000Z

483

IntelliGrid Common Information Model Primer: Second Edition  

Science Conference Proceedings (OSTI)

The Common Information Model (CIM) Primer explains the basics of the CIM (IEC 61970, IEC 61968, and IEC 62325). Starting with a historical perspective, it describes how the CIM originated and grew through the years. The functions of various working groups of Technical Committee 57 of the International Electrotechnical Commission (IEC) are described. The process of how an IEC standard is created is also outlined.The basics of the Unified Modeling Language (UML) are detailed to introduce ...

2013-10-16T23:59:59.000Z

484

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network (OSTI)

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

485

The Structural Context of Executive Information Systems Adoption  

Science Conference Proceedings (OSTI)

While some firms are developing computer-based Executive Information Systems EIS to support key executives and managers, a large number of organizations are presently not using EIS. Our focus here is on structural factors associated with the adoption ...

Arun Rai; Arkalgud Ramaprasad; Deepinder S. Bajwa

1998-07-01T23:59:59.000Z

486

U.S. Energy Information Administration | Annual Energy Outlook...  

Gasoline and Diesel Fuel Update (EIA)

D Results from side cases Table D1. Key results for demand sector technology cases 187 U.S. Energy Information Administration | Annual Energy Outlook 2013 Results from side...

487

The Impact of Information Technologies on Air Transportation  

E-Print Network (OSTI)

The Air Transportation System and several key subsystems including the Aircraft, Airline, and Air Traffic Management are modeled as interacting control loops. The impact of Information Technologies on each of these subsystems ...

Hansman, R. John

488

Engineering coherent control of quantum information in spin systems  

E-Print Network (OSTI)

Quantum Information Processing (QIP) promises increased efficiency in computation. A key step in QIP is implementing quantum logic gates by engineering the dynamics of a quantum system. This thesis explores the requirements ...

Hodges, Jonathan Stuart

2007-01-01T23:59:59.000Z

489

LANL breaks ground on key sediment control project  

NLE Websites -- All DOE Office Websites (Extended Search)

Sediment control project Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately $2 million features are up to eight feet high and made of rocks packed tightly into wire enclosures. November 5, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

490

Investing in Oil and Natural Gas A Few Key Issues  

U.S. Energy Information Administration (EIA) Indexed Site

Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Investing in Oil and Natural Gas: A Few Key Issues Prepared for EIA Conference Susan Farrell, Senior Director PFC Energy April 8, 2009 Investing in Oil and Gas| PFC Energy| Page 2 The Top 20 IOCs and Top 20 NOCs Account for Over Half of E&P Spend Source: PFC Energy, Global E&P Surveys Investing in Oil and Gas| PFC Energy| Page 3 Oil Prices Rose, But So Did Costs + 52% $0 $20 $40 $60 $80 $100 $120 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 WTI $/barrel Annual averages Large Gulf of Mexico Facility Costs by Segment Avg $28.31 Avg $59.13 Source: PFC Energy Investing in Oil and Gas| PFC Energy| Page 4 Near term Spending Cuts will be Significant

491

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 9, 2009 - 12:00am December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about real change for the American people. I look forward to working with them in

492

Nano Changes Have Macro Importance for a Key Electronics Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Squeezing an Old Material Could Yield "Instant-On" Memory Squeezing an Old Material Could Yield "Instant-On" Memory A Metal That Becomes Transparent under Pressure Under Pressure, Atoms Make Unlikely Alloys Slowing Down Near the Glass Transition New Light on Improving Engine Efficiencies Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Nano Changes Have Macro Importance for a Key Electronics Material APRIL 23, 2009 Bookmark and Share Original image courtesy of http://www.freefoto.com By combining the results from several powerful techniques for studying materials structure at the nanoscale, including work at the U.S. Department of Energy's Advanced Photon Source (APS) at Argonne National Laboratory,

493

LANL to play key role in biofuel development  

NLE Websites -- All DOE Office Websites (Extended Search)

Biofuel development Biofuel development LANL to play key role in biofuel development LANL to create a proof-of-concept system for commercializing algae-based biofuels or other advanced biofuels that can be transported and sold using the nation's existing fueling infrastructure. January 14, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

494

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

495

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 10, 2010 - 12:00am December 10, 2010 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Peter B. Lyons, Assistant Secretary for Nuclear Energy, Department of Energy Denise E. O'Donnell, Director of the Bureau of Justice Assistance, Department of Justice Stephanie O'Sullivan, Principal Deputy Director of National Intelligence, Directorate of National Intelligence David Shear, Ambassador to the Socialist Republic of Vietnam, Department of State The President also announced his intent to appoint Harvey S. Wineberg as a Member of the President's Advisory Council on Financial Capability. His biography is below. President Obama said, "The American people will be greatly served by the

496

Potential Benefits from Improved Energy Efficiency of Key Electrical Products:  

NLE Websites -- All DOE Office Websites (Extended Search)

8254 8254 Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India Michael McNeil, Maithili Iyer, Stephen Meyers, Virginie Letschert, James E. McMahon Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California, Berkeley Berkeley, CA December 2005 This work was supported by the International Copper Association through the U.S. Department of Energy under Contract No. DE-AC03-76SF00098. 2 ABSTRACT The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These

497

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 8, 2009 - 12:00am July 8, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joe Garcia, Director of the Office of Minority Economic Impact, Department of Energy Michael H. Posner, Assistant Secretary of State for Democracy, Human Rights, and Labor, Department of State Stephen J. Rapp, Ambassador at Large for War Crimes Issues, Department of State Alexander G. Garza, Assistant Secretary for Health Affairs and Chief Medical Officer, Department of Homeland Security Susan L. Kurland, Assistant Secretary for Aviation and International Affairs, Department of Transportation Kenneth A. Spearman, Member of the Board of Directors, Farm Credit Administration Rolena Adorno, Member of the National Council on the Humanities

498

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2009 - 12:00am 4, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Daniel B. Poneman, Deputy Secretary, Department of Energy; Fred P. Hochberg, President and Chairman of the Export-Import Bank of the United States; Francisco "Frank" J. Sánchez, Under Secretary for International Trade, Department of Commerce; Miriam E. Sapiro, Deputy Trade Representative; Judith A. McHale, Under Secretary for Public Diplomacy and Public Affairs, Department of State; Philip J. "P.J." Crowley, Assistant Secretary of State for Public Affairs, Department of State; Bonnie D. Jenkins, Coordinator for Threat Reduction Programs (with the Rank of Ambassador), Department of

499

A Key Target for Diabetes Drugs | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Molten Metal Solidifies into a New Kind of Glass Molten Metal Solidifies into a New Kind of Glass Organic Polymers Show Sunny Potential A New Family of Quasicrystals Cool Muscles: Storing Elastic Energy for Flight A Further Understanding of Superconductivity Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor, which could help scientists design new drugs for type 2 diabetes. (Image courtesy of Katya Kadyshevskaya, The Scripps Research Institute) The three-dimensional (3-D) atomic structure of the human glucagon receptor has been identified by an international team of researchers carrying out

500

Key parameters influencing the performance of photocatalytic oxidation  

NLE Websites -- All DOE Office Websites (Extended Search)

Key parameters influencing the performance of photocatalytic oxidation Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Title Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Publication Type Journal Article Year of Publication 2012 Authors Destaillats, Hugo, Mohamad Sleiman, Douglas P. Sullivan, Catherine Jacquiod, Jean Sablayrolles, and Laurent Molins Journal Applied Catalysis B: Environmental Volume 128 Pagination 159-170 Date Published 11/30/2012 Abstract Photocatalytic oxidation (PCO) air cleaning is a promising technology suitable for the elimination of a broad range of volatile organic compounds (VOCs). However, performance of poorly designed PCO systems may be affected by the formation of volatile aldehydes and other partially oxidized byproducts. This study explored the role of key design and dimensioning parameters that influence the effective removal of primary pollutants and can help reduce or eliminate the formation of secondary byproducts. A model pollutant mixture containing benzene, toluene, o-xylene, undecane, 1-butanol, formaldehyde and acetaldehyde was introduced at a constant rate in a 20-m3 environmental chamber operating at an air exchange rate of 1 h-1. Individual pollutant concentrations were kept at realistically low levels, between 2 and 40 μg m-3. A prototype air cleaner provided with flat or pleated PCO filtering media was operated in an external ductwork loop that recirculated chamber air at flow rates in the range 178-878 m3 h-1, corresponding to recycle ratios between 8.5 and 38. Air samples were collected upstream and downstream of the air cleaner and analyzed off-line to determine single-pass removal efficiency. The final-to-initial chamber concentration ratio was used to determine the global chamber removal efficiency for each pollutant. In the flat filter configuration, longer dwelling times of compounds on the TiO2 surface were attained by reducing the recirculation airflow by a factor of ∼5, leading to increasing total pollutant removal efficiency from 5% to 44%. Net acetaldehyde and formaldehyde removal was achieved, the later at airflow rates below 300 m3 h-1, illustrating the critical importance of controlling the contact time of primary and secondary pollutants with the TiO2 surface. The use of pleated media was shown to increase significantly the system performance by extending the dwelling time of pollutants on the irradiated surface of the PCO media, with a 70% degradation of target pollutants. With the pleated media, formaldehyde removal efficiency increased to 60%. Irradiation using either a UVC or a UVA lamp under identical flow conditions produced similar pollutant elimination. A simple correlation between the steady-state single pass removal efficiency and the global chamber removal efficiency was used to rationalize these experimental results and identify optimal operating conditions.