Sample records for information outlines key

  1. Solar Energy Plan of Development Outline | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt LtdShawangunk, New York:SiG26588°,SocorromercurySolaireInformationIncLLC

  2. An Outline of the Three-Layer Survivability Analysis Architecture for Strategic Information Warfare Research

    E-Print Network [OSTI]

    Krings, Axel W.

    An Outline of the Three-Layer Survivability Analysis Architecture for Strategic Information Warfare of strategic information warfare. To simplify the research problem, we assume that the information warfare (IW) is conducted in an isolated paradigm, which we call an electronic cosmos (e- cosmos), i.e., independent

  3. INFORMED CONSENT TEMPLATE The following is an outline of required content for informed consent involving human subjects. The

    E-Print Network [OSTI]

    INFORMED CONSENT TEMPLATE The following is an outline of required content for informed consent: Participation in this __ survey, interview, project, etc. ____ is voluntary. You can choose to discontinue.edu. This survey has been approved (IRB #**-**-***) by the Institutional Review Board at Siena College which

  4. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  5. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  6. ABILITYguidance information advice key dates ENGINEERING

    E-Print Network [OSTI]

    Grant, P. W.

    from us, career advice, and useful information on planning your future career whilst at university Department for a Power and Water Utility Company Mechanical Engineering graduate PLANNING YOUR CAREER like to develop their own business. Support is provided with business planning, company registration

  7. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  8. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  9. Key words Science of information, spatio-temporal, semantic and structural information, Darwin channel, noisy constrained capacity.

    E-Print Network [OSTI]

    Szpankowski, Wojciech

    Key words ­ Science of information, spatio-temporal, semantic and structural information, Darwin argue that a new science of information is to rekindle for extraction, comprehension, and manipulation channel, noisy constrained capacity. Wojciech SZPANKOWSKI Department of Computer Science Purdue University

  10. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  11. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  12. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  13. Information-Theoretic Key Agreement of Multiple Terminals -Part II: Channel Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model Amin Aminzadeh the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs

  14. Energy Information: The Key to Cost-Effective Conservation 

    E-Print Network [OSTI]

    McBride, J. R.; Flanagan, D. E.

    1998-01-01T23:59:59.000Z

    , technology assessment and energy savings verification purposes, there is growing interest in the use of permanently installed monitoring systems to provide information and ultimately intelligence related to facility or process energy system optimization, or...

  15. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  16. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

  17. Information-Theoretic Key Agreement of Multiple Terminals -Part I: Source Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model Amin Aminzadeh the widely studied source model. In the source model the terminals wishing to generate a secret key, as well of jointly distributed random variables, after which the terminals are allowed interactive authenticated

  18. Key Factors for Information Dissemination on Communicating Products and Fixed Databases

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Key Factors for Information Dissemination on Communicating Products and Fixed Databases Sylvain, a multitude of informational vectors take place in such environments like fixed databases or manufactured products on which we are able to em- bed significant proportion of data. By considering distributed

  19. Unternehmen und Social Media wie passt das zusammen? Dr. Alexander Stocker, Key Researcher, DIGITAL Institut fr Informations und

    E-Print Network [OSTI]

    Hammerton, James

    Unternehmen und Social Media ­ wie passt das zusammen? Dr. Alexander Stocker, Key Researcher, DIGITAL ­ Institut für Informations und Kommunikationstechnologien, JOANNEUM RESEARCH. DI Harald Mayer, Head of Intelligent Information Systems Group, DIGITAL Institut für Informations und

  20. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  1. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

  2. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13

    E-Print Network [OSTI]

    Oakley, Jeremy

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  3. Faculty & Information Centres Building Car Park Key Facilities Building Car Park

    E-Print Network [OSTI]

    7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car ORANGE Childcare Centre 3 GREEN A GREEN Chinese Garden - adjacent 1 YELLOW A YELLOW Essington House Darwin Reception 1 BROWN F BLUE Post Office 1 RED F BLUE Printery 1 GREEN A GREEN Student Square

  4. GEOSCIENCE INFORMATION: KEYS TO DISCOVERY - Proceedings of the 41st Meeting of the Geoscience Information Society

    E-Print Network [OSTI]

    GeoScience Information Society

    2006-01-01T23:59:59.000Z

    INFORMATION SOCIE1Y ISBN: 978-0-934485-68-5 ISSN: 0072-1409 For information about copies of this proceedings volume or earlier issues, contact: Publications Manager Geoscience Information Society C/0 American Geological Institute 4220 King Street... WHERE ARE GEOLOGIC FIELD TRIP GUIDEBOOKS WHEN YOU NEED THEM? Lura E. Joseph .............................................................................................................................................................. 23 INSTITUTIONAL...

  5. Air Quality Chapter Outline

    E-Print Network [OSTI]

    Wechsler, Risa H.

    Chapter 30 Air Quality Chapter Outline 1 Overview 2 1.1 Hazards / Impacts 2 1.2 Exposure Sources 3 Manual Chapter 30: Air Quality 7 References 20 8 Implementation 21 9 Ownership 22 1 Overview SLAC operations produce a wide range of air emissions. Sources of emissions include standard equipment

  6. Secondary Processing Course Outline

    E-Print Network [OSTI]

    New South Wales, University of

    MATS4001 Secondary Processing of Metals Course Outline Session 1, 2014 School of Materials Science ................................................................................................... 7 Course Objectives To develop an understanding of the principles and practice of secondary Fundamentals of metal working (including hot working, Zener-Hollomon parameter, dynamic recovery

  7. MARQUETTE UNIVERSITY GRADUATE SCHOOL OUTLINE FOR DISSERTATION, THESIS,

    E-Print Network [OSTI]

    Sanders, Matthew

    MARQUETTE UNIVERSITY GRADUATE SCHOOL OUTLINE FOR DISSERTATION, THESIS, PROFESSIONAL PROJECT OR ESSAY STUDENT INFORMATION Dissertation Director: Dissertation Director: TYPED NAMES SIGNATURES Committee Member: Committee Member: Committee Member: Committee Member: The Outline for Dissertation, Thesis

  8. Information-theoretic security proof for quantum-key-distribution protocols

    SciTech Connect (OSTI)

    Renner, Renato [Computer Science Department, ETH Zuerich, CH-8092 Zurich (Switzerland); Gisin, Nicolas; Kraus, Barbara [Group of Applied Physics, University of Geneva, CH-1211 Geneva 4 (Switzerland)

    2005-07-15T23:59:59.000Z

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  9. What is the National Forest Inventory? The National Forest Inventory is a record of key information about forests

    E-Print Network [OSTI]

    What is the National Forest Inventory? The National Forest Inventory is a record of key information is the information gathered? Data for the National Forest Inventory is being collected using ground surveys, aerial representative picture of the state of Britain's forests and woodland. National Forest Inventory #12;Has

  10. MERIT Pump/Probe Data OutlineOutline

    E-Print Network [OSTI]

    McDonald, Kirk

    MERIT Pump/Probe Data Analysis OutlineOutline The pump/probe program Particle detector response correction Pump/probe analysis results NFMCC Collaboration Meeting , LBNL, January 26, 2009 Ilias Efthymiopoulos - CERN #12;The pump/probe program #12;The pump/probe program Use of the CERN PS flexibility

  11. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  12. Outline

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Foundenhancer activity than histone modificationsThe Brave

  13. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and Biofuels Biomass andOtherOttoLBNL-55574 A Review of-N

  14. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and Biofuels Biomass andOtherOttoLBNL-55574 A Review

  15. Outline:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and Biofuels Biomass andOtherOttoLBNL-55574 A Reviewν

  16. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  17. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  18. Outline of the talk Statistics on Graphs, Exponential Formula and

    E-Print Network [OSTI]

    Poinsot, Laurent

    Outline of the talk Statistics on Graphs, Exponential Formula and Combinatorial Physics G and Complexity" Laurent Poinsot Statistics on Graphs, Exponential Formula and Combinatorial Physics #12;Exponential Formula : Informal Version Ingredients for the exponential formula Partial commutative monoids

  19. Statoil outlines MTBE development program

    SciTech Connect (OSTI)

    Not Available

    1991-11-25T23:59:59.000Z

    This paper reports that Norway's state oil company Den Norkse state Oljeselskap AS has outlined plans to become one of the major European producers of methyl tertiary butyl ether in the 1990s. Statoil predicts European demand for MTBE will jump to 4.5 million metric tons/year by 2000 from 2.5 million tons in 1990. Europe currently is a net importer of MTBE, with a productive capacity of 2.2 million tons/year.

  20. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  1. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  2. Microsoft Word - CADD Outline .doc

    National Nuclear Security Administration (NNSA)

    further information."** All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  3. PowerPoints, Video Lessons and Outlines

    E-Print Network [OSTI]

    Lesson 1 Video · Lesson 1 Outline ... Lesson 2 Video · Lesson 2 Outline. 9/1. Labor Day. No Classes. 9/2. 9/3. Lesson 3 PowerPoint · Lesson 3 Video · Lesson 3 ...

  4. EIND 574 Outline Spring 2013

    E-Print Network [OSTI]

    Sobek II, Durward K.

    coordination mechanisms Scott & Davis, Ch. 6a 2/14, 2/19 Technology & Structure, cont. - Informal coordination to Organizations Scott & Davis, Ch. 1 1/17, 1/22 Organizations as Rational Systems - Classical theorists - Rational actor models Scott & Davis, Ch. 2 1/24, 1/29 Organizations as Natural Systems - The informal

  5. Engineering Economy Outline IE 305-Part 2

    E-Print Network [OSTI]

    Vardeman, Stephen B.

    Engineering Economy Outline IE 305-Part 2 Stephen B. Vardeman ISU Fall 2013 Stephen B. Vardeman (ISU) Engineering Economy Outline Fall 2013 1 / 52 #12;Kinds of Production Costs Costs incurred). Stephen B. Vardeman (ISU) Engineering Economy Outline Fall 2013 2 / 52 #12;Costs and Production Volume

  6. Engineering Economy Outline IE 305-Part 1

    E-Print Network [OSTI]

    Vardeman, Stephen B.

    Engineering Economy Outline IE 305-Part 1 Stephen B. Vardeman ISU Fall 2013 Stephen B. Vardeman (ISU) Engineering Economy Outline Fall 2013 1 / 53 #12;THE Basics The very basic notion that governs) Engineering Economy Outline Fall 2013 2 / 53 #12;Solving for P The (N

  7. Policy Flash 2015-11 Implementation of Steps Outlined in OFPP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy Flash 2015-11 Implementation of Steps Outlined in OFPP Memorandum dated July 10, 2014, "Making Better Use of Contractor Performance Information" Policy Flash 2015-11...

  8. Program Information Key Dates |

    E-Print Network [OSTI]

    Hayes, Jane E.

    , International Studies, Sustainability, Sustainable Agriculture, and Textiles. Primary UK Program Director and the complex factors that impact living in a variety of geographic regions. Additionally, students will engage, architecture and environmental landscapes of the countries to be visited, and to be certain that all paperwork

  9. Ash deposit workshop: Class outline

    SciTech Connect (OSTI)

    Hatt, R. [Commercial Testing & Engineering Co., Lexington, KY (United States)

    1996-12-31T23:59:59.000Z

    Ash deposits formed from the combustion of coal and other fuels have plagued the steam production industry from the start. The ash fusion test has been around for over eighty years. As steam plant size increased, so have the problems associated with ash deposits. This workshop is designed to cover: (1) The basic types of deposits. (2) Causes of deposits. (3) Analytical procedures for resolving, or at least providing information about deposits and fuels, and (4) Deposit removal and reduction techniques.

  10. Video Lessons, PowerPoints, and Outlines

    E-Print Network [OSTI]

    POWERPOINT PRESENTATIONS, VIDEO LESSONS AND OUTLINES ... 6/11. Lesson 1 PowerPoint (Part A) · Lesson 1 PowerPoint (Part B) · Lesson 1 Video.

  11. 240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010 Information-Theoretically Secret Key Generation for

    E-Print Network [OSTI]

    Mandayam, Narayan

    -Theoretically Secret Key Generation for Fading Wireless Channels Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah as the basis for building practical secret key gener- ation protocols between two entities. We begin boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate

  12. Presentation Outline 1. 2010 Sponsored Awards

    E-Print Network [OSTI]

    Netoff, Theoden

    #12;Presentation Outline 1. 2010 Sponsored Awards 2. 2010 Sponsored Expenditures 3. 2009 NSF R&D Ranking Data 4. Growth Data 5. Bibliometrics: Citation Frequency 6. Technology Commercialization 7. Impact Expenditures Report Fig. 2.1 · $654M · 6.5% increase #12;2009 NSF R&D Expenditure Data · $741M · 8.5% increase

  13. Sports and Materials Science Course outline

    E-Print Network [OSTI]

    Birmingham, University of

    . Developments like carbon fibre composite bodyshells and suspension systems, hardened titanium alloy gears. The materials themes aim to introduce and develop knowledge in polymers, advanced composites, high performanceSports and Materials Science CF62 Course outline School of Metallurgy and Materials Success

  14. Outline PhD Research Plan D-ERDW PhD Research Plan Outline

    E-Print Network [OSTI]

    Gilli, Adrian

    Outline PhD Research Plan D-ERDW PhD Research Plan ­ Outline Doctoral students compile a research (PhD Research Proposal Defense). Final approval is by the doctoral committee of the department or economic need. 2 PhD thesis Explain the main question you want to answer. Connect it with current state

  15. Microsoft Word - SAFER Outline.doc

    National Nuclear Security Administration (NNSA)

    information."** Other reports or information as appropriate. All FINAL Documents must include an Appendix with the NDEP Comment Response Sheets Library Distribution List **Note...

  16. Microsoft Word - CAIP Outline.doc

    National Nuclear Security Administration (NNSA)

    information."** Other reports or information as appropriate All FINAL Documents must include an Appendix with the NDEP Comment Response Sheets Library Distribution List **Note...

  17. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  18. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  19. City of Anaheim This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    a contract. Back to Top Financing Information Federal Solar Incentives o Residential Renewable Energy TaxCity of Anaheim This page outlines solar PV incentives, financing mechanisms, permitting process | Incentives | Permitting | Interconnection Contact Information City of Anaheim Building Division 200 S

  20. Power Line Plan of Development Outline | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska: EnergyPiratiniEdwards,PoseyPoudre Valley RGenerating Inc Place:Line

  1. Microsoft Word - CAP Outline.doc

    National Nuclear Security Administration (NNSA)

    further information." ** All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  2. Microsoft Word - CADD CAP Outline.doc

    National Nuclear Security Administration (NNSA)

    for further information. All Final Documents must include an Appendix with the Nevada Division of Environmental Protection Comment Response Sheets Library Distribution List ** Note...

  3. Project Information by Key Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70 Hg MercuryProject Final Report: HPC-Colony IIProject

  4. Course Syllabus Outline: ENGR/ECE 501, Foundations of Systems Engineering

    E-Print Network [OSTI]

    of systems engineering to practical problems #12;· Describe the system life-cycle process and the dominant development stage every complex system should go through. The process steps of the engineering developmentCourse Syllabus Outline: ENGR/ECE 501, Foundations of Systems Engineering Instructor Information Dr

  5. City of Los Angeles This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    Incentives o Residential Renewable Energy Tax Credit · A taxpayer may claim a credit of 30% of qualifiedCity of Los Angeles This page outlines solar PV incentives, financing mechanisms, permitting these hyperlinks: Find an Installer | Financing | Incentives | Permitting | Interconnection Contact Information

  6. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  7. Effective Source-to-Source Outlining to Support Whole Program Empirical Optimization

    SciTech Connect (OSTI)

    Liao, C; Quinlan, D J; Vuduc, R; Panas, T

    2009-07-17T23:59:59.000Z

    Although automated empirical performance optimization and tuning is well-studied for kernels and domain-specific libraries, a current research grand challenge is how to extend these methodologies and tools to significantly larger sequential and parallel applications. In this context, we present the ROSE source-to-source outliner, which addresses the problem of extracting tunable kernels out of whole programs, thereby helping to convert the challenging whole-program tuning problem into a set of more manageable kernel tuning tasks. Our outliner aims to handle large scale C/C++, Fortran and OpenMP applications. A set of program analysis and transformation techniques are utilized to enhance the portability, scalability, and interoperability of source-to-source outlining. More importantly, the generated kernels preserve performance characteristics of tuning targets and can be easily handled by other tools. Preliminary evaluations have shown that the ROSE outliner serves as a key component within an end-to-end empirical optimization system and enables a wide range of sequential and parallel optimization opportunities.

  8. Andy DuBois, ajd@lanl.gov and phone A key challenge in IS&T is extraction of information from

    E-Print Network [OSTI]

    for using emerging microparallelism, e.g. Cell processors and GPUs, for real-time and near to respond to key challenges of national interest, including cybersecurity, threat reduction, data from

  9. Nuclear Graphite -Fission Reactor Brief Outline of Experience and

    E-Print Network [OSTI]

    McDonald, Kirk

    Nuclear Graphite - Fission Reactor Brief Outline of Experience and Understanding Professor Barry J · Physical Changes ­ to Polycrystalline Graphite due to Fast Neutron Damage and Radiolytic Oxidation ­ Provided channels for control rods and coolant gas · Neutron Shield ­ Boronated graphite · Thermal columns

  10. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  11. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  12. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  13. Master's programme in Nuclear Energy Engineering Programme outline

    E-Print Network [OSTI]

    Haviland, David

    Master's programme in Nuclear Energy Engineering Programme outline The two-year Master's programme to work abroad. career ProsPects Nuclear power is a significant part of the current energy balance.With advances in science and technology, nuclear energy is increasingly re- garded as an eminent part

  14. Geography 5: People and Earth's Ecosystems Lecture Outline

    E-Print Network [OSTI]

    and biomass many unique species Only 25% of forests retain old-growth characteristics. 10 Forest Products or charcoal for heating and cooking, but demand will be ~2X supply by 2025 12 Forest Management · ~25 200 wolves 3 4 Outline: · Forests: uses, losses and management · Grasslands: uses, losses

  15. Master's programme in Electric Power Engineering Programme outline

    E-Print Network [OSTI]

    Lagergren, Jens

    of a power system with long transmission lines.The thesis defence took place at KTH in 1928.) Thus, afterMaster's programme in Electric Power Engineering Programme outline This programme consists three subject areas, namely: 1. Electric power systems (focusing on power system dynamics, stability

  16. GEOL 2520 IGNEOUS AND METAMORPHIC PETROLOGY COURSE OUTLINE

    E-Print Network [OSTI]

    Chakhmouradian, Anton

    GEOL 2520 IGNEOUS AND METAMORPHIC PETROLOGY COURSE OUTLINE Instructor: Dr. Anton Chakhmouradian (Rm text: Winter, J.D. (2009): "Principles of Igneous and Metamorphic Petrology", 2nd Edition. Prentice of the Earth's mantle and crust. The origin of igneous and metamorphic rocks. IGNEOUS PETROLOGY The origin

  17. Master's programme in Sustainable Energy Engineering Programme outline

    E-Print Network [OSTI]

    Lagergren, Jens

    specialisations - Sustainable Power Genera- tion, Sustainable Energy Utilisation in the Built Enviroment and Solar of the see Programme is to provide state-of-the-art education in the fields of solar energy, power generationMaster's programme in Sustainable Energy Engineering Programme outline The curricula for the three

  18. AUTOMATED EXTRACTION OF LECTURE OUTLINES FROM LECTURE VIDEOS

    E-Print Network [OSTI]

    Weske, Mathias

    AUTOMATED EXTRACTION OF LECTURE OUTLINES FROM LECTURE VIDEOS A Hybrid Solution for Lecture Video}@hpi.uni-potsdam.de Keywords: Recorded Lecture Videos, Tele-teaching, Video Indexing, Multimedia Retrieval. Abstract: Multimedia-based tele-teaching and lecture video portals have become more and more popular in the last few

  19. O'Leary outlines policy views at confirmation hearing

    SciTech Connect (OSTI)

    Simpson, J.

    1993-02-15T23:59:59.000Z

    In her confirmation hearing, Secretary O'Leary outlined her views on various controversial issues. Among these were management of Yucca Mountain and the search for a nuclear waste repository, research on alternative fuels, encouragement of the use of renewable energy sources, and her views on intergrated resource planning.

  20. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  1. An Invitation to Algorithmic Information Theory

    E-Print Network [OSTI]

    G. J. Chaitin

    1996-09-17T23:59:59.000Z

    I'll outline the latest version of my limits of math course. The purpose of this course is to illustrate the proofs of the key information-theoretic incompleteness theorems of algorithmic information theory by means of algorithms written in a specially designed version of LISP. The course is now written in HTML with Java applets, and is available at http://www.research.ibm.com/people/c/chaitin/lm . The LISP now used is much friendlier than before, and because its interpreter is a Java applet it will run in the Netscape browser as you browse my limits of math Web site.

  2. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  3. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  4. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11T23:59:59.000Z

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  5. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  6. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  7. DOE Outlines Research Needed to Improve Solar Energy Technologies |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout »Department of2 DOEDepartment of Energy Outlines

  8. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  9. City of Palm Desert This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    , system sizing, and services offered before signing a contract. Back to Top Financing Information Federal the photovoltaic system, and a host customer agrees to site the system on its property and purchases the system · Qualified contractors are your key to getting the most productive solar energy system for your home

  10. City of Santa Ana This page outlines solar PV incentives, financing mechanisms, permitting process, and

    E-Print Network [OSTI]

    , system sizing, and services offered before signing a contract. Back to Top Financing Information Federal the photovoltaic system, and a host customer agrees to site the system on its property and purchases the system · Qualified contractors are your key to getting the most productive solar energy system for your home

  11. City of Santa Monica This page outlines solar PV incentives, financing mechanisms, permitting process, and interconnection

    E-Print Network [OSTI]

    , system sizing, and services offered before signing a contract. Back to Top Financing Information the photovoltaic system, and a customer agrees to site the system on its property and purchase the system contractors are your key to getting the most productive solar energy system for your home or business. o

  12. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  13. MENINGOCOCCAL DISEASE INFORMATION OVERVIEW/KEY POINTS

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and in the community? You can help prevent the spread of illnesses by: Covering your mouth and nose when coughing or sneezing. Cover your mouth and nose with a tissue when coughing or sneezing. It may prevent those around

  14. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility |

  15. M&V Plan and Savings Calculations Methods Outline (IDIQ Attachment J-8)

    Broader source: Energy.gov [DOE]

    Document outlines measurement and verification (M&V) planning and savings calculation methods for an energy savings performance contract (ESPC).

  16. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  17. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  18. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  19. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  20. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  1. M&V Plan and Savings Calculations Methods Outline (IDIQ Attachment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    planning and savings calculation methods for an energy savings performance contract (ESPC). mvplanoutline.doc More Documents & Publications Post-Installation Report Outline...

  2. Course Outline and General Information Courses: THE DYNAMIC EARTH GEOL1340

    E-Print Network [OSTI]

    Chakhmouradian, Anton

    . Formation and evolution of magmas. Intrusive magmatism. Volcanism and extrusive rocks. Metamorphism and transportation. Types and rate of weathering. Origin and evolution of soils. Types of soils. Sedimentary rocks 9. Earthquakes 3 Causes of earthquakes. Seismic waves. Locating and measuring earthquakes. Tsunami waves

  3. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  4. Outline The Ensemble Kalman Filter Parameter estimation Test example Conclusion History matching via

    E-Print Network [OSTI]

    Mosegaard, Klaus

    Outline The Ensemble Kalman Filter Parameter estimation Test example Conclusion History matching via Ensemble Kalman Filtering for a synthetic test case Jan Frydendall IMM, CERE jf@imm.dtu.dk Jan Frydendall, CERE and IMM 1 #12;Outline The Ensemble Kalman Filter Parameter estimation Test example

  5. Sample Dissertation Proposal Outlines (Should Be Confirmed with Advisor) by Mark Warschauer, 11 January 2010

    E-Print Network [OSTI]

    Loudon, Catherine

    1 Sample Dissertation Proposal Outlines (Should Be Confirmed with Advisor) by Mark Warschauer, 11 January 2010 These two sample dissertation proposal outlines ­ one for a standard dissertation and one for a three-article dissertation ­ are being provided as examples only. There is no standard dissertation

  6. Course Outline Page 1 of 4 August 22, 2013 ECE 4240 Microprocessor Interfacing

    E-Print Network [OSTI]

    Major, Arkady

    Outline Page 1 of 4 August 22, 2013 ECE 4240 Microprocessor Interfacing Course Outline ­ Fall Term 2013, microprocessors, and microcomputers to the external world, including interfacing of I/O devices with minimum hardware and software, data acquisition with and without microprocessors, data communications, transmission

  7. School of Architecture Strategic Plan Outline page 1 School of Architecture

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    School of Architecture Strategic Plan Outline ­ page 1 School of Architecture Montana State University Strategic Planning Document Condensed Outline May 24, 2013 School of Architecture Vision Recognizing that architecture is a basic human need, we strive to play an essential and innovative role

  8. What is Concurrent Programming? Course Outline (Approximate) Evaluation & Deadlines Engineering 9869

    E-Print Network [OSTI]

    Peters, Dennis

    What is Concurrent Programming? Course Outline (Approximate) Evaluation & Deadlines Engineering 9869 Advanced Concurrent Programming Introduction Dennis Peters1 Fall 2007 1 Throughout this course I will be borrowing from Dr. Theo Norvell #12;What is Concurrent Programming? Course Outline (Approximate) Evaluation

  9. Outline Layout Ion Sources Acceleration Accumulation Collision Detectors References Brief Overview of Particle

    E-Print Network [OSTI]

    Budker, Dmitry

    of Particle Accelerators Eugene S. Evans1 February 17, 2010 1 University of California, Berkeley Eugene S. Evans Brief Overview of Particle Accelerators #12;Outline Layout Ion Sources Acceleration Accumulation Collider at CERN Eugene S. Evans Brief Overview of Particle Accelerators #12;Outline Layout Ion Sources

  10. NEURAL PCA NETWORK FOR LUNG OUTLINE RECONSTRUCTION IN VQ SCAN IMAGES

    E-Print Network [OSTI]

    Serpen, Gursel

    NEURAL PCA NETWORK FOR LUNG OUTLINE RECONSTRUCTION IN VQ SCAN IMAGES G. Serpen1 , Ph. D., R. Iyer1 system takes the digitized ventilation-perfusion scan images of lungs as input, identify a template according to the size and shape of the lungs and thereby approximate and reconstruct the outline of the lung

  11. Projected refined product balances in key Latin American countries: A preliminary examination

    SciTech Connect (OSTI)

    NONE

    1996-06-01T23:59:59.000Z

    Over the years, the East-West Center (EWC) has developed considerable expertise in refinery modeling, especially in the area of forecasting product balances for countries, given planned capacity changes, changes in product demand, changes in crude slates, and changes in product specifications. This expertise has been applied on an ongoing basis to the major refiners in the Middle East and the Asia-Pacific region, along with the US West Coast as region in its own right. Refinery modeling in these three areas has been ongoing for nearly 15 years at the Center, and the tools and information sources are now well developed. To date, the EWC has not applied these tools to Latin America. Although research on Latin America has been an ongoing area of concern at the Center in recent years, the information gathered to date is still not of the level of detail nor quality available for other areas. The modeling efforts undertaken in this report are of a ``baseline`` nature, designed to outline the major issues, attempt a first cut at emerging product balances, and, above all, to elicit commentary from those directly involved in the oil industry in the key countries modeled. Our experience in other regions has shown that it takes a few years dialogue with refiners and government planner in individual countries to develop a reliable database, as well as the insights into operational constraints and practices that make accurate modeling possible. This report is no more than a first step down the road.

  12. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  13. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  14. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  15. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  16. DRAFT OUTLINE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and analyzes the conseque nces of Western' s P roposed Action and Inve nergy' s Wray Wind Energy P roject on the human and natural environme nt and sugge sts mitigation...

  17. Plan Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomassPPPOPetroleum ReservesThrustBonneville Power Administration

  18. Plan Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomassPPPOPetroleum ReservesThrustBonneville Power

  19. CLASIC OUTLINE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced. C o w l i t z C o . C l a r k C o'IUHopper3CHOS2,2,CIMEL2ACRF

  20. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  1. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  2. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  3. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  4. College of Communication and Information LIS Library and Information Science

    E-Print Network [OSTI]

    MacAdam, Keith

    College of Communication and Information LIS Library and Information Science KEY: # = new course IN LIBRARY AND INFORMATION SCIENCE. (3 OF RESEARCH IN LIBRARY AND INFORMATION SCIENCE. (3) Basic tools, techniques and methods of research

  5. Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy Considerations At Microsoft, we see information technology (IT) as a key tool to help address the daunting en-

    E-Print Network [OSTI]

    Narasayya, Vivek

    Energy Efficient IT IT for Energy Efficiency Clean Energy Generation Emissions Accounting Policy in energy conservation and integration of more renewable and zero-carbon energy sources into our economy. Microsoft envisions a clean energy ecosystem where information technology: · Empowers people

  6. Use the Guiding Questions in the Teaching in the Exhibition section as a springboard for discussion, which may go in many directions. The answers below summarize key concepts of the exhibition. For more information, visit the exhibition web-

    E-Print Network [OSTI]

    . Green- house gases in the atmosphere -- carbon dioxide (CO2), water vapor, methane, and nitrous oxide the burning of fossil fuels, creates greenhouse gases. Burning coal to generate electricity is the most information, visit the exhibition web- site at amnh.org/climatechange. 1. Introduction Why is atmospheric CO2

  7. New and Underutilized Technology: High Bay LED Lighting

    Broader source: Energy.gov [DOE]

    The following information outlines key deployment considerations for high bay LED lighting within the Federal sector.

  8. Outline of the talk Algorithm Application Conclusion Fast computation of wavelet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Outline of the talk Algorithm Application Conclusion Fast computation of wavelet coefficients propose a new iterative algorithm for the computation of the covariance matrix of the wavelet coefficients: Since the process is not stationary, it is not true that any wavelet functions will provide stationary

  9. 1. Scope and Applicability This document outlines guidelines for research space allocation and management within

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    1. Scope and Applicability This document outlines guidelines for research space allocation and management within the Wayne State University School of Medicine (SOM) and applies to wet-bench laboratory and therefore must be allocated and managed to ensure its productivity as a capital asset. 3. Responsibility

  10. Outline Phonon spectra of graphene Raman spectra of graphene Crystal lattice dynamics

    E-Print Network [OSTI]

    Seminar Heng Wang University of Konstanz July 11, 2013 Heng Wang University of Konstanz () Crystal lattice Raman spectra of graphene What is Raman scattering Applications of Raman spectroscopy of graphene Heng (2013). Heng Wang University of Konstanz () Crystal lattice dynamics July 11, 2013 3 / 19 #12;Outline

  11. Chemical Hygiene Plan The purpose of the Chemical Hygiene Plan (CHP) is to outline laboratory work

    E-Print Network [OSTI]

    de Lijser, Peter

    Chemical Hygiene Plan I. Policy The purpose of the Chemical Hygiene Plan (CHP) is to outline The Chemical Hygiene Plan, required to comply with provisions of CCR Title 8 §5191 et al: A. Standard Operating engineering controls, the use of personnel protective equipment and hygiene practices. C. A requirement

  12. Preventative Maintenance (PM) Policy Outline the policy regarding preventative vehicle maintenance on University of Michigan (U-

    E-Print Network [OSTI]

    Kirschner, Denise

    Preventative Maintenance (PM) Policy Objective Outline the policy regarding preventative vehicle maintenance on University of Michigan (U- M) vehicles. Policy 1. All maintenance performed on U-M vehicles their own campus maintenance facility to repair their fleet vehicles. 2. To ensure proper stewardship of U

  13. Session 4: Creating a Successful and Productive Lab Environment DISCUSSION OUTLINE: SESSION 4

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Session 4: Creating a Successful and Productive Lab Environment DISCUSSION OUTLINE: SESSION 4 Topics: Themes at the core of creating a successful lab environment Groups ­ needs and development Teams and Productive Lab Environment ­ FACILITATOR GUIDELINES Timeline ­ 1.5 Hours Total 10 minutes Themes at the core

  14. Applied Mathematics 4611F page 1 of 2 Course Outline 2012-13 Prof. Z. Krougly

    E-Print Network [OSTI]

    Krougly, Zinovi

    -13 ­ Prof. Z. Krougly 5% Assignment 4 ­ November 16, 2012 40% Programming project 2 ­ December 3, 2012 10 Scientific Programming Course Outline Fall 2012 Instructor: Prof. Zinovi Krougly, MC 214, Email: zkrougly methods applicable to problems in linear algebra and differential equations, introduction to the concept

  15. Outline for the next couple of lectures -Magnetism and the Ising Model (today's lecture)

    E-Print Network [OSTI]

    Ceder, Gerbrand

    Outline for the next couple of lectures -Magnetism and the Ising Model (today's lecture) -Liquid-field solution to magnetism are equivalent. -Thermodynamic results in magnetism, such as the critical (or Curie) temperature below which spontaneous magnetization occurs. #12;Magnetism: The Ising Model 1) Spins can be only

  16. Vehicle Signage Policy Outline the policy regarding signage on University of Michigan (U-M) vehicles.

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Signage Policy Objective Outline the policy regarding signage on University of Michigan (U-M) vehicles. Policy 1. All vehicles owned by U-M will be identified by a vehicle number, U-M decal and special municipal license plate issued by Fleet Services. 2. All signage on vehicles owned by U-M must be approved

  17. Vehicle Maintenance Policy Outline the policy regarding vehicle maintenance at University of Michigan (U-M).

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Maintenance Policy Objective Outline the policy regarding vehicle maintenance at University of Michigan (U-M). Policy 1. All maintenance performed on U-M vehicles must be coordinated through Garage to repair their fleet vehicles. 2. U-M vehicles leased through Fleet Services include routine maintenance

  18. Vehicle Maintenance Procedure Outline the procedure for vehicle maintenance at University of Michigan (U-M).

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Maintenance Procedure Objective Outline the procedure for vehicle maintenance at University of Michigan (U-M). Procedure 1. Your U-M vehicle has a mechanical and/or safety issue. 2. Contact Garage of the vehicle or if needed, have the vehicle towed to the maintenance facility. 4. If a loaner is needed while

  19. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  20. Introduction to Information Theory

    E-Print Network [OSTI]

    Belohlavek, Radim

    Introduction to Information Theory and Its Applications Radim Belohl´avek Dept. Computer Science providing introduction to Information Theory. Radim Belohl´avek, Introduction to Information Theory and Its Applications 1 #12;Information Theory: What and Why · information: one of key terms in our society

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  3. Key Blog Distillation: Ranking Aggregates

    E-Print Network [OSTI]

    Macdonald, C.; Ounis, I.

    Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

  4. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  5. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  6. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  7. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  8. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  9. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  10. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  11. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  12. Outline Introduction Literature Review Electric Power Supply Chains Empirical Examples Conclusions An Integrated Electric Power Supply Chain and Fuel

    E-Print Network [OSTI]

    Nagurney, Anna

    .S., electric power generation accounts for significant portions of fuel demands 30% of the natural gas demand (over 50% in the summer) 90% of the coal demand over 45% of the residual fuel oil demand #12;OutlineOutline Introduction Literature Review Electric Power Supply Chains Empirical Examples Conclusions

  13. Outline Directed polymers Log-gamma polymer KPZ equation Fluctuation exponents for certain 1+1 dimensional

    E-Print Network [OSTI]

    Seppäläinen, Timo

    Outline Directed polymers Log-gamma polymer KPZ equation Fluctuation exponents for certain 1+1 dimensional directed polymers Timo Sepp¨al¨ainen Department of Mathematics University of Wisconsin-Madison MSRI December 2010 Fluctuation exponents for polymers 1/36 #12;Outline Directed polymers Log

  14. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  15. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  16. Main objectives of this course Some practical contributions of information theory

    E-Print Network [OSTI]

    Wehenkel, Louis

    of the way of thinking for this course Course organization Introduction to information theory and coding of information theory Outline of the way of thinking for this course Course organization Main objectives of information theory Outline of the way of thinking for this course Course organization IT contribution 5

  17. Energy Information: The Key to Cost-Effective Conservation

    E-Print Network [OSTI]

    McBride, J. R.; Flanagan, D. E.

    This paper analyzes the cost-effectiveness- simple payback, Net Present Value (NPV) and Return on Investment (ROI) -of permanently installed energy consumption monitoring equipment used as the basis for applying value-added engineering services...

  18. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGermanFife Energy Park atFisia BabcockFlexColorado:

  19. Key Biscayne, Florida: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne, Florida:

  20. Key Mobility Challenges in Indian Cities | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,

  1. Key West, Florida: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West, Florida:

  2. Key World Energy Statistics-2010 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,

  3. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, search GEOTHERMALTexas:KujuBiographysourceContacts for the

  4. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOf Kilauea Volcano, Hawaii9969995°,I JumpJump to:

  5. City of Key West, Florida (Utility Company) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationin Urban Transport |CityCityCity ofCity of Johnson,City ofCity

  6. Outline of a proposal responding to E.U. and U.S. calls for trustworthy globalscale IdM and CKM designs

    E-Print Network [OSTI]

    on Cyber Security and Information Intelligence Research (April 21­23, 2010) c # ACM, 2010. 1. INTRODUCTION distribution nodes (aka key distri­ bution centers) [10] that was secure against a collusion of up to m­1@pqs.io ABSTRACT In 2007, the E.U. FP6 SecurIST called [31] for trustworthy international identity management (Id

  7. Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs

    E-Print Network [OSTI]

    on Cyber Security and Information Intelligence Research (April 21-23, 2010) c ACM, 2010. 1. INTRODUCTION distribution nodes (aka key distri- bution centers) [10] that was secure against a collusion of up to m-1@pqs.io ABSTRACT In 2007, the E.U. FP6 SecurIST called [31] for trustworthy international identity management (Id

  8. Material Issues for the US ITER-TBM Program Part I: US Strategy and Outline of Suggested Material EffortPart I: US Strategy and Outline of Suggested Material Effort

    E-Print Network [OSTI]

    Abdou, Mohamed

    EffortPart I: US Strategy and Outline of Suggested Material Effort Presented by: Mohamed Abdou With input from the US ITER-TBM Team, including M. Abdou, D. Sze, M. Sawan, A. Ying, C. Wong, N. Morley, S. Malang

  9. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  10. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  11. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  12. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  13. Data Management Plan (outline) The Data Management Plan (DMP) for a proposal is a two-page document that

    E-Print Network [OSTI]

    Data Management Plan (outline) The Data Management Plan (DMP) for a proposal is a two-page document that describes (1) the investigator's commitment to the funder's Data Policy and (2) how the investigator plans to manage the data

  14. Aanbevolen achtergrondliteratuur met veel opgaven (en oplossingen): Frank Ayres: (Schaum's Outline of Theory and Problems of) Calculus.

    E-Print Network [OSTI]

    Batina, Lejla

    : (Schaum's Outline of Theory and Problems of) Calculus. McGraw-Hill Companies, 1999, 578 p., ISBN rationale getallen Q) een deelverzameling van R waar tussen elk paar van punten uit D overaftelbaar veel

  15. X-ray server : an outline resource for simulations of x-ray diffraction and scattering.

    SciTech Connect (OSTI)

    Stepanov, S.; Biosciences Division

    2004-01-01T23:59:59.000Z

    X-ray Server is a public project operational at the APS since 1997 with the goals to explore novel network technologies for providing wide scientific community with access to personal research results, establishing scientific collaborations, and refining scientific software. The Server provides Web-based access to a number of programs developed by the author in the field of X-ray diffraction and scattering. The software code operates directly on the Server available for use without downloading. Currently seven programs are accessible that have been used more than 85,000 times. This report discusses the Server philosophy, provides an overview of the physical models and algorithms beneath the codes and demonstrates some applications of the programs. It is shown with examples and statistics how the Server goals are achieved. The plans for further X-ray Server development are outlined.

  16. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  17. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  18. Cryptographic security of the quantum key distribution from the triangle inequality

    E-Print Network [OSTI]

    Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

    2014-09-22T23:59:59.000Z

    We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

  19. Tight bound on the coherent-state quantum key distribution with heterodyne detection

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France)

    2007-08-15T23:59:59.000Z

    We propose an upper bound for the eavesdropper's information in the direct and reverse reconciliated coherent states quantum key distribution protocols with heterodyne detection. This bound is derived by maximizing the leaked information over the symplectic group of transformations that spans every physical Gaussian attack on individual pulses. We exhibit four different attacks that reach this bound, which shows that this bound is tight. Finally, we compare the secret key rate obtained with this bound to the homodyne rate.

  20. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  1. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  2. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  3. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  4. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  5. Physics 5B General Information Winter 2009 Instructor: Howard Haber

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Physics 5B General Information Winter 2009 Instructor: Howard Haber O#ce: ISB, Room 326 Phone to Physics II Winter 2009 Brief Course Outline for Physics 5B Topic Reading 1. Fluids Giancoli, Chapter 13 2

  6. Web Information Retrieval Author Preprint for Web

    E-Print Network [OSTI]

    Hawking, David

    Web Information Retrieval Author Preprint for Web Nick Craswell and David Hawking 18 April 2009 1 Introduction This chapter outlines some distinctive characteristics of web information re- trieval, starting with a broad description of web data and the needs of web searching users, then working through ranking

  7. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  8. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  9. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  12. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  13. Performance agreements for Utrecht University In further elaboration of the outline agreement between the State Secretary for

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Performance agreements for Utrecht University In further elaboration of the outline agreement between the State Secretary for Education, Culture and Science and the Dutch universities, Utrecht to a projected 12% in 2016. Quality: Utrecht University will manage to retain 3rd place in the top six

  14. Abstract --This panel session paper outlines one of the re-search thrust areas in the Power System Engineering Research

    E-Print Network [OSTI]

    Oren, Shmuel S.

    1 Abstract -- This panel session paper outlines one of the re- search thrust areas in the Power- tential of harnessing the inherent flexibility of certain load types such as heating and cooling and PHEV for massive penetration of renewable resources such as wind and solar power into the mix of elec- tricity

  15. Seat Belt Use Policy Outline the policy regarding use of seat belt in University of Michigan (U-M) vehicles.

    E-Print Network [OSTI]

    Kirschner, Denise

    Seat Belt Use Policy Objective Outline the policy regarding use of seat belt in University of Michigan (U-M) vehicles. Vehicle Use Policy 1. Staff members are responsible to operate U-M vehicles are adhering to the seat belt use laws when operating a U-M vehicle. 3. State of Michigan seat belt laws

  16. Power Systems Analysis Final Project Report UNI: tdp2114 1 Abstract--This document outlines the importance of, process

    E-Print Network [OSTI]

    Lavaei, Javad

    Power Systems Analysis Final Project Report UNI: tdp2114 1 Abstract--This document outlines of large scale power systems. The maintenance of such power systems is no small affair. Every moment systems maintenance in the most optimized and efficient manner. Keywords--Power Systems, Power Generation

  17. Vehicle Rental Procedure Outline the procedure for renting motor pool vehicles at University of Michigan (U-M).

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Rental Procedure Objective Outline the procedure for renting motor pool vehicles at University of Michigan (U-M). Procedure 1. All policies pertaining to U-M vehicles also pertain to motor pool rental vehicles. 2. Motor pool vehicles can be reserved for a period of a few hours up to one year. 3

  18. Vehicle Use Policy Outline the policy regarding vehicle use at the University of Michigan (U-M).

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Use Policy Objective Outline the policy regarding vehicle use at the University of Michigan (U-M). Policy 1. Vehicles owned or leased and furnished by the U-M are to be used exclusively the direct supervision of a U-M staff member. 3. All vehicles must be parked on U-M property (owned or leased

  19. Vehicle Operator Policy Outline the requirements for vehicle operators at the University of Michigan (U-M).

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Operator Policy Objective Outline the requirements for vehicle operators at the University be authorized by the using department and adhere to the vehicle use and licensing policies. 4. Operators must have a valid driver license with no more than 6 points on their motor vehicle record (MVR). A valid

  20. Vehicle Repair Policy Outline the policy regarding vehicle repair on University of Michigan (U-M) vehicles.

    E-Print Network [OSTI]

    Kirschner, Denise

    Vehicle Repair Policy Objective Outline the policy regarding vehicle repair on University of Michigan (U-M) vehicles. Policy 1. All vehicle repairs performed on U-M vehicles must be coordinated facility to repair their fleet vehicles. 2. U-M vehicles leased through Fleet Services include routine

  1. Loaner Vehicle Policy Outline the policy regarding issuance of loaner vehicles for University of Michigan (U-M)

    E-Print Network [OSTI]

    Kirschner, Denise

    Loaner Vehicle Policy Objective Outline the policy regarding issuance of loaner vehicles for University of Michigan (U-M) vehicles in the garage for maintenance. Vehicle Maintenance Policy 1. All maintenance performed on U-M vehicles must be coordinated through Garage Services. Exception: Both U

  2. INSE 6300/4-UU Winter 2011 1 Course Outline Concordia University

    E-Print Network [OSTI]

    Bentahar, Jamal

    inventory management, supply chain integration, and decision support systems for supply chain management.Quality Engineering INSE 6300/4/UU - Quality Assurance in Supply Chain Management (Winter 2011) (4 credits) 1. General Information Course: INSE 6300/4/UU ­ Quality Assurance in Supply Chain Management (4 credits) Lectures

  3. Understanding information seeking behavior through network traffic analysis

    E-Print Network [OSTI]

    Weaver, Cyrus-Charles

    2008-01-01T23:59:59.000Z

    Many of today's information workers use the Internet as a valuable first-choice source for new knowledge. As such, Internet based information seeking is a key part of how information workers find information. This study ...

  4. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  6. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  7. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  8. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  9. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  10. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  11. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  12. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  13. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  16. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  17. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  18. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  19. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  20. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  1. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  2. Monitoring solar-thermal systems: An outline of methods and procedures

    SciTech Connect (OSTI)

    Rosenthal, A. [New Mexico State Univ., Las Cruces, NM (United States). Southwest Technology Development Inst.

    1994-04-01T23:59:59.000Z

    This manual discusses the technical issues associated with monitoring solar-thermal systems. It discusses some successful monitoring programs that have been implemented in the past. It gives the rationale for selecting a program of monitoring and gives guidelines for the design of new programs. In this report, solar thermal monitoring systems are classified into three levels. For each level, the report discusses the kinds of information obtained by monitoring, the effort needed to support the monitoring program, the hardware required, and the costs involved. Ultimately, all monitoring programs share one common requirement: the collection of accurate data that characterize some aspect or aspects of the system under study. This report addresses most of the issues involved with monitoring solar thermal systems. It does not address such topics as design fundamentals of thermal systems or the relative merits of the many different technologies employed for collection of solar energy.

  3. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    SciTech Connect (OSTI)

    NONE

    1997-01-01T23:59:59.000Z

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual`s performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program.

  4. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  5. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  6. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  7. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  8. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  9. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  10. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  11. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  12. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  13. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  14. 3196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 11, NOVEMBER 2010 Space Shift Keying (SSK) Modulation with Partial

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    information for optimal receiver design. This latter result highlights the importance of accurate and reliable Terms--Spatial modulation (SM), space shift keying (SSK) modulation, multiple-input-single-output (MISO

  15. Managing agile information technology infrastructure

    E-Print Network [OSTI]

    Kalissery, Biju

    2007-01-01T23:59:59.000Z

    Information technology (IT) can be a key contributor for the successful implementation of business strategies. However, companies normally find it hard to synchronize their evolving business strategies with the capabilities ...

  16. Using Energy Information Systems (EIS): A Guidebook for the U.S. Postal Service

    SciTech Connect (OSTI)

    Foster, Dale; Hough, Ben; Barbose, Galen; Golove, William; Goldman, Charles

    2004-10-11T23:59:59.000Z

    The U.S. Postal Service (Postal Service) recently installed Energy Information Systems (EIS) at 30 facilities in California. These systems integrate electric utility meter data acquisition hardware, software, and communication systems to collect, archive, analyze, and display whole-facility energy consumption data. At some point in the future, these systems could also be integrated with sub-meters that measure the electricity consumption of key end-use equipment. The purpose of this guidebook is to help Postal Service facility managers interpret and act upon energy data available from their EIS, translating the abundance of information these systems provide into knowledge that can be used to reduce energy use and costs. The guidebook first describes basic EIS capabilities and explains the data and reports that Postal Service EIS provide. It outlines a set of strategies for utilizing this information to improve operations and maintenance of building energy use equipment and for facilitating demand response. Finally, the guidebook offers suggestions on creating a routine for tracking and analyzing energy data and integrating this information into regular energy management activities.

  17. Definition and Validation of the Key

    E-Print Network [OSTI]

    Utrecht, Universiteit

    of information and computing sciences, utrecht university technical report UU-CS-2005-041 www.cs.uu.nl #12 Sciences Utrecht University Utrecht, The Netherlands slinger.jansen@cs.uu.nl Sjaak Brinkkemper Institute for Information and Computing Sciences Utrecht University Utrecht, The Netherlands s.brinkkemper@cs.uu.nl ABSTRACT

  18. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  19. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  20. Value of Information spreadsheet

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Trainor-Guitton, Whitney

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Júlíusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  1. Value of Information spreadsheet

    SciTech Connect (OSTI)

    Trainor-Guitton, Whitney

    2014-05-12T23:59:59.000Z

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Júlíusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  2. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  3. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  4. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  5. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  6. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  7. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  8. Campus Computer Store Information Technology Services

    E-Print Network [OSTI]

    Saskatchewan, University of

    Campus Computer Store Information Technology Services 20 Place Riel, 1 Campus Drive 966-8375 ccs Computer Store is administering a license for SAS. It is licensed on a yearly pro-rated basis as outlined: _____________________________________________________ Student Number (if applicable): _______________________________________________ Location of Computer

  9. A Review of Loss Mechanisms and Key Design Choices for High Intensity Hadron Rings

    SciTech Connect (OSTI)

    Warsop, C.M. [Rutherford Appleton Laboratory, Oxfordshire (United Kingdom)

    2005-06-08T23:59:59.000Z

    The peak performance reached in a high intensity ring is closely related to the ability to minimise and control beam loss. The need to increase intensity has to be balanced against possible increased induction of radioactivity and the risk of interrupted operations. Losses are dependent on many factors and influence most aspects of machine design. In principle, only one aspect of low loss design needs to be sub-optimal to impose severe intensity limitations. Here, an outline is given of the key factors that need to be considered, focussing primarily on low to medium energy proton machines. Topics include space charge, instabilities, electron effects, injection and main lattice choices. Finally, we note that major progress has been made in refining low loss designs but there is still important work to be done in predicting loss levels and distributions in detail.

  10. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  11. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  12. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20T23:59:59.000Z

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  13. PublicKey LocallyDecodable Codes Brett Hemenway # Rafail Ostrovsky +

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically­Secure Public Key En­ cryption (SS­PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  14. Growing Green As part of its strategic plan to foster growth and development in key

    E-Print Network [OSTI]

    Denham, Graham

    reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key remediation technologies for hazardous industrial pollutants in soil and groundwater · Geotechnical Research contamination and remediation, and management of mine wastes For more information, please visit: www.uwo.ca/enviro

  15. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  16. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  17. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  18. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  19. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  20. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  1. Why is the church so cold? Informal observation of energy use in a volunteer-managed shared

    E-Print Network [OSTI]

    Carletta, Jean

    heat completely informal volunteer work #12;Outline Essential Background: Domestic Boiler Controls Background: Domestic Boiler Controls The Setting - Premises Warm Centre Cold Hall Cold Church, High Bills;Outline Essential Background: Domestic Boiler Controls The Setting - Premises Warm Centre Cold Hall Cold

  2. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  3. Greater Caribbean Energy and Environment Future. Ad hoc working group report, Key Biscayne, Florida, October 26-28, 1980

    SciTech Connect (OSTI)

    Thorhaug, A. (ed.)

    1980-01-01T23:59:59.000Z

    This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)

  4. Information Information for students

    E-Print Network [OSTI]

    Wright, Francis

    Disability & Dyslexia Information Guidance Support Information for students with disabilities the Disability and Dyslexia Service · Accessing your curriculum · Specialist examination arrangements · Dyslexia and Dyslexia Service for more information. Our contact details can be found on the back page. 03 #12

  5. Process Metallurgy Course Outline

    E-Print Network [OSTI]

    New South Wales, University of

    ................................................................................................... 7 Course Objective To develop an understanding of principles of metallurgical processes, reactor-mixed reactors. Tracer additions. Chemical performance of a metallurgical reactor. Principles of metallurgical of metallurgical reactors, batch and continuous, plug flow and well-mixed ideal reactors. Tracer additions. 4 6

  6. Outline Sim econometric

    E-Print Network [OSTI]

    Siegen, Universität

    econometric e at some ra ate static pa ation of DPD ond (1991) (Event Stud s survival a ormatting nary summ

  7. DOCS SCMP (ANNOTATED OUTLINE)

    Broader source: Energy.gov (indexed) [DOE]

    NMMSS PROJECT NMMSS UPGRADE SOFTWARE CONFIGURATION MANAGEMENT PLAN September 2001 Doc No: 135-PL-300A Revision: 1 REVIEWS AND APPROVALS Prepared by: ...

  8. Contract Management Plan Outline

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1.SpaceFluor FederalEnergy Contract Awarded toTABLE OF

  9. Individual Report Outline

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found TheHot electron dynamics in graphene byI _ImprovedIII.1

  10. poster40outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires mayYuan T.External LinksDoug

  11. poster50outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires mayYuan T.External LinksDoug

  12. poster70outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires mayYuan T.External LinksDoug

  13. poster90outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires mayYuan T.External LinksDoug

  14. DRAFT OUTLINE of UPDATED

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2AO 474.2 Chg U.S. S,/ DOFJNV/10845-16U

  15. Individual Report Outline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link to facebook link to

  16. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department ofU.S. Offshore U.S.Market ModuleLiquids Reserve Class

  17. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Åke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  18. University of Hawai`i Strategic Plan for Information Technology 2000

    E-Print Network [OSTI]

    Olsen, Stephen L.

    of information technology as recurring costs that include stable budgets for computers, software, maintenanceUniversity of Hawai`i Strategic Plan for Information Technology 2000 Executive Summary This Strategic Plan for Information Technology outlines the vision and planning context for moving forward

  19. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  20. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  1. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  2. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  3. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  4. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  5. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  6. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  7. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  8. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  9. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  10. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  11. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  12. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  13. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  14. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  15. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  16. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  17. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  18. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  19. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  20. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew York:GovernorCommons Capital*Competition

  1. Professional Staff Position Description Form This form outlines the information that should be included in a position description. An accurate and up to date description of

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    to each activity) · Duties · Lead Responsibilities · Supervisory Responsibilities 4. Qualifications Vendors, Suppliers General Public Others (specify): pspdf form.doc REV 11/3/03 #12;pspdf form.doc REV 11

  2. Coexistence of high-bit-rate quantum key distribution and data on optical fiber

    E-Print Network [OSTI]

    K. A. Patel; J. F. Dynes; I. Choi; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

    2012-11-30T23:59:59.000Z

    Quantum key distribution (QKD) uniquely allows distribution of cryptographic keys with security verified by quantum mechanical limits. Both protocol execution and subsequent applications require the assistance of classical data communication channels. While using separate fibers is one option, it is economically more viable if data and quantum signals are simultaneously transmitted through a single fiber. However, noise-photon contamination arising from the intense data signal has severely restricted both the QKD distances and secure key rates. Here, we exploit a novel temporal-filtering effect for noise-photon rejection. This allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb/s data communications. With high-bit rate and range sufficient for important information infrastructures, such as smart cities and 10 Gbit Ethernet, QKD is a significant step closer towards wide-scale deployment in fiber networks.

  3. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  4. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18T23:59:59.000Z

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  5. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  6. EMPLOYMENT INFORMATION AND DATA COLLECTION ISSUES

    E-Print Network [OSTI]

    Toronto, University of

    EMPLOYMENT INFORMATION AND DATA COLLECTION ISSUES Data Management Group Joint Program .................................................................................... 16 #12;Employment Information and Data Collection Issues ii Table of Figures Table 1 ­ Person use of the municipal property assessment file as a starting source of employer information. The key

  7. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  8. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  9. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code for and the underlying principles of information security. By introducing students to key information security concepts to the administration, design, development, evaluation and management of secure information systems. Module Learning

  10. Two-Party secret key distribution via a modified quantum secret sharing protocol

    SciTech Connect (OSTI)

    Grice, Warren P [ORNL; Evans, Philip G [ORNL; Lawrie, Benjamin J [ORNL; Legre, Matthieu [ID Quantique, Inc.; Lougovski, Pavel [ORNL; Qi, Bing [ORNL; Ray, William R [ORNL; Williams, Brian P [ORNL; Smith IV, Amos M [ORNL

    2015-01-01T23:59:59.000Z

    We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (single photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.

  11. Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system

    E-Print Network [OSTI]

    Li Yang; Bing Zhu

    2013-05-24T23:59:59.000Z

    We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

  12. Building commissioning: The key to quality assurance

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

  13. Maintaining secrecy when information leakage is unavoidable

    E-Print Network [OSTI]

    Smith, Adam (Adam Davidson), 1977-

    2004-01-01T23:59:59.000Z

    (cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate ...

  14. Energy Information Administration / Annual Energy Outlook 2011

    Gasoline and Diesel Fuel Update (EIA)

    23.60 28.73 28.99 28.68 27.92 27.22 0.6% Energy Information Administration Annual Energy Outlook 2011 1 4 Table A6. Industrial Sector Key Indicators and Consumption...

  15. Accessing graphic information: Challenges of tomorrow

    SciTech Connect (OSTI)

    Frazer, G. Jr. [Power System Engineering, Inc., Madison, WI (United States). AM/FM Service Div.

    1995-12-31T23:59:59.000Z

    During the justification process of AM/FM projects, utilities seek to find as many benefits as possible using AM/FM technology. In many cases the ultimate benefit of simply providing users the ability to access the digital information is overlooked. This paper outlines why access may be overlooked, why providing access is important and what kind of tool is needed in the long term.

  16. Satisfactory Academic Progress Appeal and Personal Statement Medical students who do not fulfill Satisfactory Academic Progress standards as outlined by the WSU School of

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    Satisfactory Academic Progress standards as outlined by the WSU School of Medicine Promotions CommitteeSatisfactory Academic Progress Appeal and Personal Statement Medical students who do not fulfill Academic Progress Standards but have been reviewed and approved by the Promotions Committee to continue

  17. Disposing of Waste in ICCBL/NSRB Screening Facility The rules outlined below are applicable for most projects, but the screening facility

    E-Print Network [OSTI]

    Mitchison, Tim

    or at iccb_screen@hms.harvard.edu Solid Biological Waste Small sharps container (located on benchtop of here after proper treatment (see below). When box is 2/3 full, please notify staff. BSL2 waste binsDisposing of Waste in ICCBL/NSRB Screening Facility The rules outlined below are applicable

  18. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  20. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  1. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  2. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  3. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  4. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  5. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  6. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  7. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  8. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  9. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  10. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  11. SCHOOL OF LAW ASSISTANT DEAN FOR INFORMATION TECHNOLOGY

    E-Print Network [OSTI]

    Almor, Amit

    SCHOOL OF LAW ASSISTANT DEAN FOR INFORMATION TECHNOLOGY University of South Carolina $ Columbia, South Carolina 29208 $ 803/777-8296 An Equal Opportunity Institution School of Law Computer Support Policy I. Purpose: This policy outlines the support provided for law school computers by the School

  12. A practical method for proactive information exchange within multi-agent teams 

    E-Print Network [OSTI]

    Rozich, Ryan Timothy

    2004-11-15T23:59:59.000Z

    Psychological studies have shown that information exchange is a key component of effective teamwork. In addition to requesting information that they need for their tasks, members of effective teams often proactively forward information...

  13. Environmental Quality Information Analysis Center multi-year plan

    SciTech Connect (OSTI)

    Rivera, R.G. [RDG, Inc. (United States); Das, S. [Oak Ridge National Lab., TN (United States); Walsh, T.E. [Florida Univ., Gainesville, FL (United States)

    1992-09-01T23:59:59.000Z

    An information analysis center (IAC) is a federal resource that provides technical information for a specific technology field. An IAC links an expert technical staff with an experienced information specialist group, supported by in-house or external data bases to provide technical information and maintain a corporate knowledge in a technical area. An IAC promotes the rapid transfer of technology among its users and provides assistance in adopting new technology and predicting and assessing emerging technology. This document outlines the concept, requirements, and proposed development of an Environmental Quality IAC (EQIAC). An EQIAC network is composed of several nodes, each of which has specific technology capabilities. This document outlines strategic and operational objectives for the phased development of one such node of an EQIAC network.

  14. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  15. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  16. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  17. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  18. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  19. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  20. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  1. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  2. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  3. 1. Primary Contact Information 1. Primary Contact Information*

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Description: What is the overall plan for your project? Describe your project's key stakeholders (community Responsibility & Budget 1. Please include a detailed budget for this project. How will the Morgridge Center grant provide us information about your project through (1) writing an overall organization and project 4. Have

  4. Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution

    SciTech Connect (OSTI)

    Liu Weitao; Sun Shihai; Liang Linmei; Yuan Jianmin [Department of Physics, College of Science, National University of Defense Technology, Changsha, 410073 (China)

    2011-04-15T23:59:59.000Z

    Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper to collect information about the key without being discovered. We propose a modified photon-number-splitting attack scheme against QKD systems based on weak laser pulses taking advantage of possible multiphoton pulses. Proof-of-principle experiments are demonstrated. The results show that the eavesdropper can get information about the key generated between the legitimate parties without being detected. Since the equivalent attenuation introduced by the eavesdropper for pulses of different average photon numbers are different, the decoy-state method is effective in fighting against this kind of attack. This has also been proven in our experiments.

  5. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  6. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  7. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  8. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  9. NIST ITL Participation in Voluntary Standards Developing Organizations (Key: Highlighted activities represent areas, which are international in scope.

    E-Print Network [OSTI]

    1 NIST ITL Participation in Voluntary Standards Developing Organizations (Key: Highlighted Quality and Statistics C.M. Wang 898 ASTM E-21 Color and Appearance A. Aviles 898 BioAPI Consortium Biometric Application Programming Interface (API) Consortium F. Podio 893 HIMSS/IHE Healthcare Information

  10. Remote State Preparation of Mental Information

    E-Print Network [OSTI]

    Patrizio E. Tressoldi; Andrei Khrennikov

    2012-07-26T23:59:59.000Z

    The aim of this paper is to define in theoretical terms and summarise the available experimental evidence that physical and mental "objects", if considered "information units", may present similar classical and quantum models of communication beyond their specific characteristics. Starting with the Remote State Preparation protocol, a variant of the Teleportation protocol, for which formal models and experimental evidence are already available in quantum mechanics, we outline a formal model applied to mental information we defined Remote State Preparation of Mental Information (RSPMI), and we summarise the experimental evidence supporting the feasibility of a RSPMI protocol. The available experimental evidence offers strong support to the possibility of real communication at distance of mental information promoting the integration between disciplines that have as their object of knowledge different aspects of reality, both physical and the mental, leading to a significant paradigm shift in cognitive and information science.

  11. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  12. Controlling excess noise in fiber optics continuous variables quantum key distribution

    E-Print Network [OSTI]

    Jérôme Lodewyck; Thierry Debuisschert; Rosa Tualle-Brouri; Philippe Grangier

    2005-12-01T23:59:59.000Z

    We describe a continuous variables coherent states quantum key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecom components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mb/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber set-up is studied as a function of the line transmission and excess noise.

  13. Multiplexing scheme for simplified entanglement-based large-alphabet quantum key distribution

    E-Print Network [OSTI]

    Dada, Adetunmise C

    2015-01-01T23:59:59.000Z

    We propose a practical quantum cryptographic scheme which combines high information capacity, such as provided by high-dimensional quantum entanglement, with the simplicity of a two-dimensional Clauser-Horne-Shimony-Holt (CHSH) Bell test for security verification. By applying a state combining entanglement in a two-dimensional degree of freedom, such as photon polarization, with high-dimensional correlations in another degree of freedom, such as photon orbital angular momentum (OAM) or path, the scheme provides a considerably simplified route towards security verification in quantum key distribution (QKD) aimed at exploiting high-dimensional quantum systems for increased secure key rates. It also benefits from security against collective attacks and is feasible using currently available technologies.

  14. Dense-coding quantum key distribution based on continuous-variable entanglement

    SciTech Connect (OSTI)

    Su Xiaolong; Jing Jietai; Pan Qing; Xie Changde [State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan, 030006 (China)

    2006-12-15T23:59:59.000Z

    We proposed a scheme of continuous-variable quantum key distribution, in which the bright Einstein-Podolsky-Rosen entangled optical beams are utilized. The source of the entangled beams is placed inside the receiving station, where half of the entangled beams are transmitted with round trip and the other half are retained by the receiver. The amplitude and phase signals modulated on the signal beam by the sender are simultaneously extracted by the authorized receiver with the scheme of the dense-coding correlation measurement for continuous quantum variables, thus the channel capacity is significantly improved. Two kinds of possible eavesdropping are discussed. The mutual information and the secret key rates are calculated and compared with those of unidirectional transmission schemes.

  15. Controlling excess noise in fiber-optics continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France)

    2005-11-15T23:59:59.000Z

    We describe a continuous-variable coherent-states quantum-key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecommunications components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot-noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mbit/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber setup is studied as a function of the line transmission and excess noise.

  16. NATIONAL CENTER FOR GEOGRAPHIC INFORMATION AND ANALYSIS

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    played a key role in the award of funding for the Alexandria Digital Library at UC Santa Barbara, one NATIONAL CENTER FOR GEOGRAPHIC INFORMATION AND ANALYSIS ANNUAL REPORT Year 6 (December 1, 1993 University of Maine 14 May 1995 #12; NATIONAL CENTER FOR GEOGRAPHIC INFORMATION AND ANALYSIS ANNUAL REPORT

  17. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  18. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  19. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  20. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  1. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  2. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  3. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  4. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  5. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  6. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  7. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection, Privacy & Records Troy...

  8. Road Blocks Yield Key Information about a Catalyst | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection TechnicalResonantNovember 15 to March 15ARiskSands Jim

  9. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  10. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  11. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  12. Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Ranade, Kedar S.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2006-03-15T23:59:59.000Z

    We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration. The difference between the tolerable error rate and its theoretical upper bound tends slowly to zero for sufficiently large dimensions of the information carriers.

  13. C:\\Users\\gpike1\\Documents\\Dyslexia Information Pack.docx This pack is for students who think they may be dyslexic. It has

    E-Print Network [OSTI]

    Miranda, Eduardo Reck

    C:\\Users\\gpike1\\Documents\\Dyslexia Information Pack.docx This pack is for students who think assessment for dyslexia. It includes: A. Financing your dyslexia assessment B. A flowchart outlining the whole process C. An information sheet `What next?' D. Information on finding a private dyslexia assessor

  14. Mercury Information Clearinghouse

    SciTech Connect (OSTI)

    Chad A. Wocken; Michael J. Holmes; Dennis L. Laudal; Debra F. Pflughoeft-Hassett; Greg F. Weber; Nicholas V. C. Ralston; Stanley J. Miller; Grant E. Dunham; Edwin S. Olson; Laura J. Raymond; John H. Pavlish; Everett A. Sondreal; Steven A. Benson

    2006-03-31T23:59:59.000Z

    The Canadian Electricity Association (CEA) identified a need and contracted the Energy & Environmental Research Center (EERC) to create and maintain an information clearinghouse on global research and development activities related to mercury emissions from coal-fired electric utilities. With the support of CEA, the Center for Air Toxic Metals{reg_sign} (CATM{reg_sign}) Affiliates, and the U.S. Department of Energy (DOE), the EERC developed comprehensive quarterly information updates that provide a detailed assessment of developments in the various areas of mercury monitoring, control, policy, and research. A total of eight topical reports were completed and are summarized and updated in this final CEA quarterly report. The original quarterly reports can be viewed at the CEA Web site (www.ceamercuryprogram.ca). In addition to a comprehensive update of previous mercury-related topics, a review of results from the CEA Mercury Program is provided. Members of Canada's coal-fired electricity generation sector (ATCO Power, EPCOR, Manitoba Hydro, New Brunswick Power, Nova Scotia Power Inc., Ontario Power Generation, SaskPower, and TransAlta) and CEA, have compiled an extensive database of information from stack-, coal-, and ash-sampling activities. Data from this effort are also available at the CEA Web site and have provided critical information for establishing and reviewing a mercury standard for Canada that is protective of environment and public health and is cost-effective. Specific goals outlined for the CEA mercury program included the following: (1) Improve emission inventories and develop management options through an intensive 2-year coal-, ash-, and stack-sampling program; (2) Promote effective stack testing through the development of guidance material and the support of on-site training on the Ontario Hydro method for employees, government representatives, and contractors on an as-needed basis; (3) Strengthen laboratory analytical capabilities through analysis and quality assurance programs; and (4) Create and maintain an information clearinghouse to ensure that all parties can keep informed on global mercury research and development activities.

  15. Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

    SciTech Connect (OSTI)

    Tamaki, Kiyoshi; Koashi, Masato; Imoto, Nobuyuki [CREST Research Team for Interacting Carrier Electronics, School of Advanced Sciences, Graduate University for Advanced Studies (SOKENDAI), Hayama, Kanagawa 240-0193 (Japan)

    2003-03-01T23:59:59.000Z

    The security of two-state quantum-key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results, and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices, or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counterintuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate, Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain, which is the net growth of the secret key per pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.

  16. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05T23:59:59.000Z

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  17. Community-oriented information integration

    E-Print Network [OSTI]

    Katsis, Ioannis

    2009-01-01T23:59:59.000Z

    objects share the same primary key values and thereforecorrespond to (composite) primary keys. Owners of sourcesconstraints, such as primary keys (PKs) and foreign keys (

  18. SCHOLARSHIP INFORMATION

    E-Print Network [OSTI]

    STUDENT LEADERSHIP SCHOLARSHIP INFORMATION & APPLICATION #12;Sentry Insurance is pleased, creativity and dedication to lead all sectors of society. Sentry believes that by supporting the education for providing scholarship information to school counselors, for actively recruiting students who meet

  19. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  20. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  1. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    SciTech Connect (OSTI)

    Li, Hong-Wei [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China); Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Bao, Wan-Su [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China)

    2011-12-15T23:59:59.000Z

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  2. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  3. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30T23:59:59.000Z

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  4. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  5. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  6. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  7. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  8. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  9. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  10. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  11. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  12. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  13. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  14. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  15. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  16. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  17. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  18. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  19. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  20. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  1. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  2. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  3. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  4. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  5. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  6. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  7. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  8. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  9. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  10. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  11. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01T23:59:59.000Z

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  12. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  13. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  14. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format-271 Information Technology: American National Standard for Information Systems-- Data Format for the Interchange Sponsored by Information Access Division Information Technology Laboratory National Institute of Standards

  15. Information Technology: American National Standard for Information

    E-Print Network [OSTI]

    Information Technology: American National Standard for Information Systems-- Data Format 500-275 Information Technology: American National Standard for Information Systems-- Data Format Coleman, and Patrice Yuh, Editors Sponsored by Information Access Division Information Technology

  16. Item 4, Attachment 1: Pulse Outline Pulse Outline for 2013

    E-Print Network [OSTI]

    , Sedlak - Water Board Strategies (R2 policy, State Strategy), Green Chemistry, etc. Management Update Microcystin in the Bay ­ Kudela SPATT data Mercury: 4 pages MeHg in water, MeHg in sediment, Hg in sediment, coastal fish, rail feathers? PCBs: 2 pages Sum of PCBs in sediment, PCBs in small fish PAHs: 4 pages Sum

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  18. Public Engagement and Forestry: Key Lessons for Working in

    E-Print Network [OSTI]

    by more focused involvement with smaller groups of people. 5. Experience shows that a variety of methods of raising the profile of a site and providing information to large numbers of people; · it is not easy the importance of communication, ranging from information to participation/power sharing between stakeholders

  19. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08T23:59:59.000Z

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  20. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  1. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  6. Superactivation, unlockability, and secrecy distribution of bound information

    SciTech Connect (OSTI)

    Prettico, Giuseppe [Institut de Ciencies Fotoniques, E-08860 Castelldefels, Barcelona (Spain); Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2011-04-15T23:59:59.000Z

    Bound information, a cryptographic classical analog of bound entanglement, is defined as classical secret correlations from which no secret key can be extracted. Its existence was conjectured and shown in a multipartite case. In this work, we provide an example of bound information in a four-partite scenario. Later, using this example, we prove that bound information can be superactivated and moreover unlockable in a finite-copy scenario. We also show that bound entangled states (bound information) can be used to distribute multipartite pure-state entanglements (secret keys).

  7. DOE outlines complex cleanup options

    SciTech Connect (OSTI)

    Lobsenz, G.

    1994-02-25T23:59:59.000Z

    The Energy Department said last week it will consider four different strategies for cleanup of its nuclear weapons complex in a draft programmatic environmental impact statement due for release this summer. In an implementation plan released for public comment February 17, DOE also said the EIS would look at centralized, decentralized and regional approaches to management of six types of radioactive and hazardous wastes. Other issues to be addressed in the EIS are development of innovative cleanup technology, budgeting and prioritization, job cutbacks and worker retraining, waste minimization and community involvement in cleanup decisions. However, DOE said it had decided not to address spent nuclear fuel storage in the EIS, as had been previously planned. Instead, spent fuel storage options will be reviewed in another environmental study being done under court order for DOE's Idaho National Engineering Laboratory. Findings from the INEL study will be incorporated in the department-wide EIS for environmental restoration and waste management.

  8. Microsoft Word - CADD Outline .doc

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input Options Gary L. Hirsch Project LeadAOutline Corrective Action

  9. Outline.CAIP.UGTA.pdf

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input Options Gary L. Hirsch SNL 2001a,Summary; i-C C lKansas City

  10. Error-Control and Digitalization Concepts for Chemical and Biomolecular Information Processing Systems

    E-Print Network [OSTI]

    Vladimir Privman

    2010-04-26T23:59:59.000Z

    We consider approaches for controlling the buildup of noise by design of gates for chemical and biomolecular computing, in order to realize stable, scalable networks for multi-step information processing. Solvable rate-equation models are introduced and used to illustrate several recently developed concepts and methodologies. We also outline future challenges and possible research directions.

  11. for ISMIS91 The Roles of Artificial Intelligence in Information Systems

    E-Print Network [OSTI]

    Wiederhold, Gio

    1 for ISMIS­91 The Roles of Artificial Intelligence in Information Systems Gio Wiederhold Stanford are suitable for artificial intelligence approaches we outline an architectural structure for large systems simulations, databases, and design­systems routinely deal with millions of elements, major artificial

  12. Rangeland Drought Management for Texans: Planning: The Key to Surviving Drought

    E-Print Network [OSTI]

    Hart, Charles R.; Carpenter, Bruce B.

    2001-05-02T23:59:59.000Z

    This publication outlines the steps that ranchers should take to survive a drought. Those steps include developing a plan for each enterprise of the operation, ranking strategic ranch goals, planning for resource flow, implementing and monitoring...

  13. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  14. Broken Information Feedback Loops Prevent Good Building Energy Performance—Integrated Technological and Sociological Fixes Are Needed

    E-Print Network [OSTI]

    Arens, Edward; Brown, Karl

    2012-01-01T23:59:59.000Z

    available from building automation systems (i.e. , controls)information. Building automation systems have emphasizedfrom typical building automation systems—a key feature for

  15. Information Records Information Management (RIM)

    E-Print Network [OSTI]

    Alpay, S. Pamir

    10/2012 Records & Information Management (RIM) Records Information Management (RIM) encompasses all, and properly manage all records from creation to disposition. Record Management Strategies Lock your offices, and properly destroy when the record retention period is met. Establish a plan for how to manage and protect

  16. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

    2011-04-20T23:59:59.000Z

    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

  17. PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    E-Print Network [OSTI]

    Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou

    2011-01-01T23:59:59.000Z

    In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...

  18. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada...

  19. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01T23:59:59.000Z

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  20. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  1. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity University of Warwick Statement on the Regulation of Investigatory Powers

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity 1 University of Warwick Statement on the Regulation of Investigatory Powers Act 2000: E Powers (RIP) Act as outlined below. The RIP Act statement is part of the strategic Information Security

  2. Computing Information

    E-Print Network [OSTI]

    There is also an older FAQ, but the information there may be out of date. ... and you have previously set your security challenge questions, you can set a new ...

  3. Technical Information 

    E-Print Network [OSTI]

    Unknown

    2011-08-17T23:59:59.000Z

    Research shows that people have difficulty forgetting inferences they make after reading a passage, even when the information that the inferences are based on is later known to be untrue. This dissertation examined the effects of these inferences...

  4. Keys to Effective FatherChild Communication What is communication, and why is it such an integral part of family life? Communication, in the context

    E-Print Network [OSTI]

    Keys to Effective Father­Child Communication What is communication, and why is it such an integral part of family life? Communication, in the context of the family, simply refers to the exchange of verbal and non-verbal information between two or more family members. It is through communication

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  7. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  8. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  9. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  10. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  11. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  12. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  13. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  14. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  15. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  16. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  17. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  1. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  2. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  3. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  4. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  5. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  6. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  7. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  8. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  9. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  10. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  11. INFO 4990: Information Technology Research Methods

    E-Print Network [OSTI]

    Koprinska, Irena

    ;3 Mathematical Models · Often key aspects of a computational or engineering problems can be captured1 INFO 4990: Information Technology Research Methods Mathematical Methods Lecture by A. Fekete Mathematical Approaches to Engineering & IT Research · The nature of mathematics · How mathematical work

  12. Energy Information Administration / Annual Energy Outlook 2011

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    . 0.03 0.03 0.03 0.03 0.02 0.02 0.02 -1.4% Energy Information Administration Annual Energy Outlook 2011 1 0 Table A4. Residential Sector Key Indicators and Consumption...

  13. Energy Information Administration / Annual Energy Outlook 2011

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    . 8.60 8.49 8.98 9.48 9.93 10.47 11.03 1.0% Energy Information Administration Annual Energy Outlook 2011 1 2 Table A5. Commercial Sector Key Indicators and Consumption...

  14. Quantum Information: Opportunities and Challenges

    SciTech Connect (OSTI)

    Bennink, Ryan S [ORNL

    2008-01-01T23:59:59.000Z

    Modern society is shaped by the ability to transmit, manipulate, and store large amounts of information. Although we tend to think of information as abstract, information is physical, and computing is a physical process. How then should we understand information in a quantum world, in which physical systems may exist in multiple states at once and are altered by the very act of observation? This question has evolved into an exciting new field of research called Quantum Information (QI). QI challenges many accepted rules and practices in computer science. For example, a quantum computer would turn certain hard problems into soft problems, and would render common computationally-secure encryption methods (such as RSA) insecure. At the same time, quantum communication would provide an unprecedented kind of intrinsic information security at the level of the smallest physical objects used to store or transmit the information. This talk provides a general introduction to the subject of quantum information and its relevance to cyber security. In the first part, two of the stranger aspects of quantum physics namely, superposition and uncertainty are explained, along with their relation to the concept of information. These ideas are illustrated with a few examples: quantum ID cards, quantum key distribution, and Grover s quantum search algorithm. The state-of-the-art in quantum computing and communication hardware is then discussed, along with the daunting technological challenges that must be overcome. Relevant experimental and theoretical efforts at ORNL are highlighted. The talk concludes with speculations on the short- and long-term impact of quantum information on cyber security.

  15. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  16. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10T23:59:59.000Z

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  17. Complex Networks - A Key to Understanding Brain Function

    SciTech Connect (OSTI)

    Olaf Sporns

    2008-01-23T23:59:59.000Z

    The brain is a complex network of neurons, engaging in spontaneous and evoked activity that is thought to be the main substrate of mental life.  How this complex system works together to process information and generate coherent cognitive states, even consciousness, is not yet well understood.  In my talk I will review recent studies that have revealed characteristic structural and functional attributes of brain networks, and discuss efforts to build computational models of the brain that are informed by our growing knowledge of brain anatomy and physiology.

  18. Complex Networks - A Key to Understanding Brain Function

    ScienceCinema (OSTI)

    Olaf Sporns

    2010-01-08T23:59:59.000Z

    The brain is a complex network of neurons, engaging in spontaneous and evoked activity that is thought to be the main substrate of mental life.  How this complex system works together to process information and generate coherent cognitive states, even consciousness, is not yet well understood.  In my talk I will review recent studies that have revealed characteristic structural and functional attributes of brain networks, and discuss efforts to build computational models of the brain that are informed by our growing knowledge of brain anatomy and physiology.

  19. Thailand-Key Results and Policy Recommendations for Future Bioenergy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with formSoutheasternInformation TengchongTex-LaInformation(CTI PFAN)

  20. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  1. SERI photovoltaic subcontract reports: Abstracts and document control information, January 1--July 31, 1991

    SciTech Connect (OSTI)

    Not Available

    1991-10-01T23:59:59.000Z

    This report contains the document control information and abstracts for SERI Photovoltaic (PV) Program publications resulting from SERI`s subcontracted PV research. The information is presented for reports published or distributed from January 1 through July 31, 1991. This report will outline these publications, organized by technology, on a regular basis. A list of additional publications and sources is included herein to provide the photovoltaic community with other sources of information. All of the documents represented here are available from the National Technical Information Service.

  2. Towards a Grid Information Knowledge Base , Marios D. Dikaiakos1

    E-Print Network [OSTI]

    Pallis, George

    Towards a Grid Information Knowledge Base Wei Xing1 , Marios D. Dikaiakos1 , and Rizos Sakellariou2 present our work on building a Grid infor- mation knowledge base, which is a key component of a semantic Grid information system. A Core Grid Ontology (CGO) is developed for build- ing a Grid knowledge base

  3. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  4. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  5. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  6. Information Technology Standards Program management plan

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This document presents a logical and realistic plan to implement the Information Technology (IT) Standards Program throughout the Department of Energy (DOE). It was developed by DOE Chief Information Officer (CIO) staff, with participation from many other individuals throughout the DOE complex. The DOE IT Standards Program coordinates IT standards activities Department-wide, including implementation of standards to support the DOE Information Architecture. The Program is voluntary, participatory, and consensus-based. The intent is to enable accomplishment of the DOE mission, and the Program is applicable to all DOE elements, both Federal and contractor. The purpose of this document is to describe the key elements of the DOE IT Standards Program.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  8. CORPORATETECHNOLOGY Information &

    E-Print Network [OSTI]

    Popeea, Corneliu - Chair for Foundations of Software Reliability and Theoretical Computer Science

    s CORPORATETECHNOLOGY Information & Communications Neural Computation SIEMENS Structural Equation Modelling of fMRI-Data Norbert Galm CT IC 4 11.11.2003 #12;SIEMENS © Siemens AG, CT IC 4 - all rights in fMRI experiments the BOLD signal (blood oxygen level dependent) is measured: #12;SIEMENS © Siemens

  9. LEARNING... INFORMATION

    E-Print Network [OSTI]

    Strathclyde, University of

    in black and white/ double-sided. To set up a Google Cloud Printer to connect to printers in the LibraryYOUR LIBRARY YOUR LEARNING... YOUR INFORMATION SERVICES YOUR RESOURCES... GOOGLE CLOUD PRINT You can use Google Cloud Print to print from your Chromebook, phone, tablet and Google Apps. PLEASE NOTE

  10. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect (OSTI)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02T23:59:59.000Z

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  11. Financial Management: The Key to Farm-Firm Business Management 

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17T23:59:59.000Z

    and resources, should be prepared for each commodity and for the whole farm/ ranch. A long-term strategic assessment based ? on both historical data and current outlook information. This should include an assessment of government farm programs, the general... economic outlook (e.g., inflation, interest rates, taxes), specific industry/commodity outlook (trends and cycles), and technological developments. Individual enterprise budgets and a ? consolidated whole farm/ranch cash flow projection by month...

  12. Stock, O. and Zancanaro, M. (eds.), Intelligent Information Presentation, 1--6. 2003 Kluwer Academic Publishers. Printed in the Netherlands.

    E-Print Network [OSTI]

    Wahlster, Wolfgang - Deutsche Forschungszentrum für Künstliche Intelligenz & FR 6.2

    INFORMATION PRESENTATION Roadmap, Architecture, Tools, Semantics Harry Bunt1 , Michael Kipp2 , Mark T. Maybury Dagstuhl in Germany October 27 through November 2, 20011 . We first outline a research roadmap in the near conclude with a recommended action plan for forward progress in the community. 1. 0 ROADMAP Figure 1

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  14. DOE Geothermal Data Repository - Tethering Data to Information: Preprint

    SciTech Connect (OSTI)

    Weers, J.; Anderson, A.

    2014-02-01T23:59:59.000Z

    Data are not inherently information. Without context, data are just numbers, figures, names, or points on a line. By assigning context to data, we can validate ideas, form opinions, and generate knowledge. This is an important distinction to information scientists, as we recognize that the context in which we keep our data plays a big part in generating its value. The mechanisms used to assign this context often include their own data, supplemental to the data being described and defining semantic relationships, commonly referred to as metadata. This paper provides the status of the DOE Geothermal Data Repository (DOE GDR), including recent efforts to tether data submissions to information, discusses the important distinction between data and information, outlines a path to generate useful knowledge from raw data, and details the steps taken in order to become a node on the National Geothermal Data System (NGDS).

  15. Outline c and b Production in pp c and b Production in DIS Photoproduction of c and b b Production at HERA Conclusions Heavy Flavor Production at HERA and the

    E-Print Network [OSTI]

    Outline c and b Production in p¯p c and b Production in DIS Photoproduction of c and b b Production at HERA Conclusions Heavy Flavor Production at HERA and the Tevatron Bruce Straub, University of Oxford Physics in Collision, Buzios, Brazil , 5-9 July 2006 Heavy Flavor Production at HERA and the Tevatron

  16. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  17. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  18. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  19. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  20. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.