National Library of Energy BETA

Sample records for internet protocol ip

  1. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  2. Acquisition Letter/Financial Assistance Letter (ALIFAL) 201 0-06, Acquiring Information Technology, Requirement to Comply With Internet Protocol Version 6 (IPv6)

    Office of Energy Efficiency and Renewable Energy (EERE)

    AL/FAL 201 0-06 provides notice that the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council are issuing a final rule amending the Federal Acquisition Regulation (FAR) to require that Internet Protocol Version 6 (IPv6) compliant products be included in all new information technology (IT) acquisitions using Internet Protocol (IP). ALIFAL 2010-06, accordingly, updates the IPv6 guidance provided in AL-2006-04.

  3. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6...

    Broader source: Energy.gov (indexed) [DOE]

    H-35 DOE-H- Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information Technology (July 2011) Prescription: Use as appropriate. Consider using in solicitations...

  4. IP address management : augmenting Sandia's capabilities through open source tools.

    SciTech Connect (OSTI)

    Nayar, R. Daniel

    2005-08-01

    Internet Protocol (IP) address management is an increasingly growing concern at Sandia National Laboratories (SNL) and the networking community as a whole. The current state of the available IP addresses indicates that they are nearly exhausted. Currently SNL doesn't have the justification to obtain more IP address space from Internet Assigned Numbers Authority (IANA). There must exist a local entity to manage and allocate IP assignments efficiently. Ongoing efforts at Sandia have been in the form of a multifunctional database application notably known as Network Information System (NWIS). NWIS is a database responsible for a multitude of network administrative services including IP address management. This study will explore the feasibility of augmenting NWIS's IP management capabilities utilizing open source tools. Modifications of existing capabilities to better allocate available IP address space are studied.

  5. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    ScienceCinema (OSTI)

    Tsoukalas, Lefteri [Purdue University, Purdue, Indiana, United States

    2010-01-08

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  6. Inventing an Energy Internet: Concepts, Architectures, and Protocols for Smart Energy Utilization

    SciTech Connect (OSTI)

    Tsoukalas, Lefteri

    2009-04-29

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  7. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    SciTech Connect (OSTI)

    Tsoukalas, Lefteri

    2009-04-29

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  8. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  9. IP-Based Video Modem Extender Requirements

    SciTech Connect (OSTI)

    Pierson, L G; Boorman, T M; Howe, R E

    2003-12-16

    Visualization is one of the keys to understanding large complex data sets such as those generated by the large computing resources purchased and developed by the Advanced Simulation and Computing program (aka ASCI). In order to be convenient to researchers, visualization data must be distributed to offices and large complex visualization theaters. Currently, local distribution of the visual data is accomplished by distance limited modems and RGB switches that simply do not scale to hundreds of users across the local, metropolitan, and WAN distances without incurring large costs in fiber plant installation and maintenance. Wide Area application over the DOE Complex is infeasible using these limited distance RGB extenders. On the other hand, Internet Protocols (IP) over Ethernet is a scalable well-proven technology that can distribute large volumes of data over these distances. Visual data has been distributed at lower resolutions over IP in industrial applications. This document describes requirements of the ASCI program in visual signal distribution for the purpose of identifying industrial partners willing to develop products to meet ASCI's needs.

  10. Internet protocol network mapper

    DOE Patents [OSTI]

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  11. PVM and IP multicast

    SciTech Connect (OSTI)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  12. Intellectual Property (IP) Service Providers for Acquisition...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Intellectual Property Provides ACQ and Assistance More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions Microsoft ...

  13. Intellectual Property (IP) Service Providers for Acquisition...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEIPCounselforDOELaboratories 2015 More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions ...

  14. InterGroup Protocols

    Energy Science and Technology Software Center (OSTI)

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  15. Audit Report: DOE/IG-0915 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Internet Protocol Telecommunications Networks Advancements in the telecommunications ... Internet Protocol (VoIP) networks at more than 14 locations at a cost of over 56 million. ...

  16. Energy Internet

    Broader source: Energy.gov [DOE]

    Energy Internet is commercializing a software platform for decentralized scheduling of energy-producing or consuming assets on the electricity grid. This scalable system will revolutionize the control of distributed solar generation, electric vehicle charging, intelligent appliances and other smart grid technologies.

  17. The Department of Energys Implementation of Voice over Internet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Voice over Internet Protocol Telecommunications Networks DOEIG-0915 June 2014 U.S. Department of Energy Office of Inspector General Office of Audits and...

  18. IP-1 Certification of Cargo Containers

    SciTech Connect (OSTI)

    Hagler, Lisle

    2010-10-05

    The purpose and scope of this engineering note is to demonstrate that the structural design of the cargo container complies with the IP-1 container requirements of 49 CFR 173.410 as required by CFR 173.411.

  19. Internet strategies for engineers

    SciTech Connect (OSTI)

    Hill, K.; Beruvides, M.G.

    1997-11-01

    This report contains viewgraphs on using internet strategies for engineers. How the internet is being used and what problems are being encountered are being considered.

  20. Voice and Data Network of Convergence and the Application of Voice over IP

    SciTech Connect (OSTI)

    Eldridge, J.M.

    2000-11-01

    This paper looks at emerging technologies for converging voice and data networks and telephony transport over a data network using Internet Protocols. Considered are the benefits and drivers for this convergence. The paper describes these new technologies, how they are being used, and their application to Sandia.

  1. A Network Client Using the Gopher Information Discovery Protocol

    Energy Science and Technology Software Center (OSTI)

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  2. Privacy Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    certain information automatically. What we collect and store automatically is: the Internet Protocol (IP) address of the domain from which you access the Internet (i.e....

  3. ATR NSUF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy Notice NSUF collects and stores the following information automatically: Internet Protocol (IP) address of the domain from which you access the Internet (e.g.,...

  4. Privacy Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    certain information automatically. What we collect and store automatically is: the Internet Protocol (IP) address of the domain from which you access the Internet (i.e....

  5. Entanglement percolation on a quantum internet with scale-free and clustering characters

    SciTech Connect (OSTI)

    Wu Liang; Zhu Shiqun

    2011-11-15

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  6. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  7. Lessons Learned in the Design and Use of IP1 / IP2 Flexible Packaging - 13621

    SciTech Connect (OSTI)

    Sanchez, Mike; Reeves, Wendall; Smart, Bill

    2013-07-01

    For many years in the USA, Low Level Radioactive Waste (LLW), contaminated soils and construction debris, have been transported, interim stored, and disposed of, using IP1 / IP2 metal containers. The performance of these containers has been more than adequate, with few safety occurrences. The containers are used under the regulatory oversight of the US Department of Transportation (DOT), 49 Code of Federal Regulations (CFR). In the late 90's the introduction of flexible packaging for the transport, storage, and disposal of low level contaminated soils and construction debris was introduced. The development of flexible packaging came out of a need for a more cost effective package, for the large volumes of waste generated by the decommissioning of many of the US Department of Energy (DOE) legacy sites across the US. Flexible packaging had to be designed to handle a wide array of waste streams, including soil, gravel, construction debris, and fine particulate dust migration. The design also had to meet all of the IP1 requirements under 49CFR 173.410, and be robust enough to pass the IP2 testing 49 CFR 173.465 required for many LLW shipments. Tens of thousands of flexible packages have been safely deployed and used across the US nuclear industry as well as for hazardous non-radioactive applications, with no recorded release of radioactive materials. To ensure that flexible packages are designed properly, the manufacturer must use lessons learned over the years, and the tests performed to provide evidence that these packages are suitable for transporting low level radioactive wastes. The design and testing of flexible packaging for LLW, VLLW and other hazardous waste streams must be as strict and stringent as the design and testing of metal containers. The design should take into consideration the materials being loaded into the package, and should incorporate the right materials, and manufacturing methods, to provide a quality, safe product. Flexible packaging can be

  8. Intellectual Property (IP) Service Providers for Acquisition and Assistance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactions | Department of Energy DOE_IP_Counsel_for_DOE_Laboratories 2015 (8.17 KB) More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions WA_05_056_IBM_WATSON_RESEARCH_CENTER_Waiver_of_Domestic_and_.pdf Need to Consider Intentional Destructive Acts in NEPA Documents (CEQ, 2006)

  9. Geography-based structural analysis of the Internet

    SciTech Connect (OSTI)

    Kasiviswanathan, Shiva; Eidenbenz, Stephan; Yan, Guanhua

    2010-01-01

    In this paper, we study some geographic aspects of the Internet. We base our analysis on a large set of geolocated IP hop-level session data (including about 300,000 backbone routers, 150 million end hosts, and 1 billion sessions) that we synthesized from a variety of different input sources such as US census data, computer usage statistics, Internet market share data, IP geolocation data sets, CAJDA's Skitter data set for backbone connectivity, and BGP routing tables. We use this model to perform a nationwide and statewide geographic analysis of the Internet. Our main observations are: (1) There is a dominant coast-to-coast pattern in the US Internet traffic. In fact, in many instances even if the end-devices are not near either coast, still the traffic between them takes a long detour through the coasts. (2) More than half of the Internet paths are inflated by 100% or more compared to their corresponding geometric straight-line distance. This circuitousness makes the average ratio between the routing distance and geometric distance big (around 10). (3) The weighted mean hop count is around 5, but the hop counts are very loosely correlated with the distances. The weighted mean AS count (number of ASes traversed) is around 3. (4) The AS size and the AS location number distributions are heavy-tailed and strongly correlated. Most of the ASes are medium sized and there is a wide variability in the geographic dispersion size (measured in terms of the convex hull area) of these ASes.

  10. Intellectual Property (IP) Service Providers for Acquisition and Assistance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactions | Department of Energy Intellectual Property Provides ACQ and Assistance (67.65 KB) More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions Microsoft Word - FAL2004-03.doc Guidance Documents

  11. Internet Performance to Africa

    SciTech Connect (OSTI)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  12. July 2014 Cybersecurity Awareness Campaign - Internet Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July 2014 Cybersecurity Awareness Campaign - Internet Safety July 2014 Cybersecurity Awareness Campaign - Internet Safety More Documents & Publications January 2015 Cybersecurity ...

  13. ENERGY EFFICIENCY TECHNOLOGY ROADMAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IP v.6 - Internet protocol version 6 Emergence of component level standards addressing energy use optimization Networking communication data compression speed bandwidth...

  14. Internet Fuel Cells Forum

    SciTech Connect (OSTI)

    Sudhoff, Frederick A.

    1996-08-01

    The rapid development and integration of the Internet into the mainstream of professional life provides the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy's (DOE's) Morgantown Energy Technology Center (METC) has undertaken the task to maintain a Fuel Cell Forum on the Internet. Here, members can exchange ideas and information pertaining to fuel cell technologies. The purpose of this forum is to promote a better understanding of fuel cell concepts, terminology, processes, and issues relating to commercialization of fuel cell power technology. The Forum was developed by METC to provide those interested with fuel cell conference information for its current concept of exchanging ideas and information pertaining to fuel cells. Last August, the Forum expanded to an on-line and world-wide network. There are 250 members, and membership is growing at a rate of several new subscribers per week. The forum currently provides updated conference information and interactive information exchange. Forum membership is encouraged from utilities, industry, universities, and government. Because of the public nature of the internet, business sensitive, confidential, or proprietary information should not be placed on this system. The Forum is unmoderated; therefore, the views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. government or METC.

  15. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps

  16. Appraisal Process Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS December 2015 Office of Enterprise Assessments U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface December 2015 i Preface The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) is responsible for implementing an Independent Oversight Program for safety and security within the Department in accordance with DOE Policy 226.1B, Department of Energy Oversight Policy, and DOE Orders

  17. Seismicity Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Seismicity Protocol Seismicity Protocol Project objectives: Develop an updated protocolbest engineering practices to address public and industry issues associated with induced ...

  18. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  19. Internet of Things | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Internet of Things The Internet of Things is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries. The Internet of Things is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries. While possibly creating efficiencies in areas such as advanced manufacturing and infrastructure design, production and resilience, the Internet of Things (IOT) also creates new and unknown

  20. SLCA/IP power alternative screening method (SPASM)

    SciTech Connect (OSTI)

    Palmer, S.C. |; Ancrile, J.D.

    1995-03-01

    This report describes the SLCA/IP Power Alternative Screening Method (SPASM), which was used to screen 784 possible combinations of electric power marketing alternatives and dam operational scenarios to provide a representative range for analysis in the Western Area Power Administration Salt Lake City Area Integrated Projects (SLCA/IP) Electric Power Marketing Environmental Impact Statement (EIS). Each combination consists of one energy and capacity commitment level and one operational scenario for each of the hydroelectric facilities at Glen Canyon Dam, Flaming Gorge Dam, and the Aspinall Unit. The total annual cost to the SLCA/IP firm power customers of each of the 784 combinations is estimated and included in a relative frequency distribution. A relative frequency distribution is also generated for each marketing alternative. The number of combinations is reduced to 12 by taking the mean value and endpoint value for each of four marketing alternatives. Some minor deviations from this procedure, which are made for political purposes, are explained. 9 figs., 14 tabs.

  1. Sandia National Laboratories: Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    collect and store the following information automatically and through the use of: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e.,...

  2. An Overview of Internet biosurveillance

    SciTech Connect (OSTI)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  3. Linear Collider Test Facility: Twiss Parameter Analysis at the IP/Post-IP Location of the ATF2 Beam Line

    SciTech Connect (OSTI)

    Bolzon, Benoit; Jeremie, Andrea; Bai, Sha; Bambade, Philip; White, Glen; /SLAC

    2012-07-02

    At the first stage of the ATF2 beam tuning, vertical beam size is usually bigger than 3 {micro}m at the IP. Beam waist measurements using wire scanners and a laser wire are usually performed to check the initial matching of the beam through to the IP. These measurements are described in this paper for the optics currently used ({beta}{sub x} = 4cm and {beta}{sub y} = 1mm). Software implemented in the control room to automate these measurements with integrated analysis is also described. Measurements showed that {beta} functions and emittances were within errors of measurements when no rematching and coupling corrections were done. However, it was observed that the waist in the horizontal (X) and vertical (Y) plane was abnormally shifted and simulations were performed to try to understand these shifts. They also showed that multiknobs are needed in the current optics to correct simultaneously {alpha}{sub x}, {alpha}{sub y} and the horizontal dispersion (D{sub x}). Such multiknobs were found and their linearity and orthogonality were successfully checked using MAD optics code. The software for these multiknobs was implemented in the control room and waist scan measurements using the {alpha}{sub y} knob were successfully performed.

  4. House Simulation Protocols (Building America Benchmark) - Building...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols (Building America Benchmark) - Building America Top Innovation House Simulation Protocols (Building America Benchmark) - Building America Top Innovation ...

  5. MHK ISDB/Instruments/CDL MiniSense 2-IPS | Open Energy Information

    Open Energy Info (EERE)

    CDL MiniSense 2-IPS < MHK ISDB Jump to: navigation, search MHK Instrumentation & Sensor Database Menu Home Search Add Instrument Add Sensor Add Company Community FAQ Help...

  6. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2015 Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015 April 24, 2015 Office of Environment, Safety and Health...

  7. Geo-Engineering through Internet Informatics (GEMINI)

    SciTech Connect (OSTI)

    Doveton, John H.; Watney, W. Lynn

    2003-03-06

    The program, for development and methodologies, was a 3-year interdisciplinary effort to develop an interactive, integrated Internet Website named GEMINI (Geo-Engineering Modeling through Internet Informatics) that would build real-time geo-engineering reservoir models for the Internet using the latest technology in Web applications.

  8. Next Generation Integrated Environment for Collaborative Work Across Internets

    SciTech Connect (OSTI)

    Harvey B. Newman

    2009-02-24

    We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

  9. Appraisal Process Protocols, Independent Oversight - December 2015 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Appraisal Process Protocols, Independent Oversight - December 2015 Appraisal Process Protocols, Independent Oversight - December 2015 December 2015 Independent Oversight Appraisal Process Protocols These appraisal process protocols provide an overview of the general process that applies to all independent oversight appraisal activities. The subordinate oversight offices maintain more detailed program plans, guides, procedures, and protocols as necessary to assist in

  10. Field Monitoring Protocol: Heat Pump Water Heaters

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. ... 2013 Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. ...

  11. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  12. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  13. Quantitative Visualization of ChIP-chip Data by Using Linked...

    Office of Scientific and Technical Information (OSTI)

    Most analyses of ChIP-chip in vivo DNA binding have focused on qualitative descriptions of ... analyze and explore in vivo DNA binding data of multiple transcription factors. ...

  14. Summary Protocol: Identification, Characterization, Designation, Remedial

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Action, Certification | Department of Energy Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) (2.36 MB) More Documents &

  15. U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected application to crash.

  16. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  17. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  18. DOE Site Facility Management Contracts Internet Posting | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting PDF icon DOE NNSA Site Facility Management Contracts - November 2015.pdf ...

  19. DOE Site Facility Management Contracts Internet Posting | Department...

    Energy Savers [EERE]

    DOE Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting PDF icon DOE NNSA Site Facility Management Contracts - November...

  20. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    SciTech Connect (OSTI)

    Paul, Nathanael R; Shue, Craig; Taylor, Curtis

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  1. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  2. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  3. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  4. Supplement No. 2 to the FUSRAP Summary Protocol - Verification and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Certification Protocol | Department of Energy 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol (November 1985, Rev. 1) Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol (November 1985, Rev. 1) (1.14 MB) More Documents & Publications Supplement

  5. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  6. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    SciTech Connect (OSTI)

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  7. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  8. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  9. DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11(1).pdf...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf PDF icon DOEsitefacilitymgtcontractsInternetPo...

  10. Cryptography and the Internet: lessons and challenges

    SciTech Connect (OSTI)

    McCurley, K.S.

    1996-12-31

    The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

  11. Webinar: Hydrogen Refueling Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Refueling Protocols Webinar: Hydrogen Refueling Protocols Below is the text version of the webinar titled "Hydrogen Refueling Protocols," originally presented on February 22, 2013. In addition to this text version of the audio, you can access the presentation slides. Moderator: Hi. Thank you so much for attending today's webinar. Just to go through a few housekeeping items before I turn it over to today's speakers. Everyone is on mute, so if you have a question throughout the webinar,

  12. ESPC ENABLE Measurement and Verification Protocol

    Broader source: Energy.gov [DOE]

    Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

  13. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Energy Savers [EERE]

    1: Residential Lighting Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with ...

  14. Superior Energy Performance Measurement and Verification Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance logo This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance ...

  15. The Internet of Things Helping Utilities | OpenEI Community

    Open Energy Info (EERE)

    The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(266) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

  16. National Clean Energy Business Plan Competition: Energy Internet Wins ACC

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clean Energy Challenge | Department of Energy Energy Internet Wins ACC Clean Energy Challenge National Clean Energy Business Plan Competition: Energy Internet Wins ACC Clean Energy Challenge March 27, 2014 - 4:54pm Addthis Energy Internet, the Southeast regional winner of the Department of Energy's National Clean Energy Business Plan Competition, demonstrates its platform. | Courtesy of Georgia Institute of Technology Energy Internet, the Southeast regional winner of the Department of

  17. DOE Releases Updated Induced Seismicity Protocol

    Broader source: Energy.gov [DOE]

    At the 37th Stanford Geothermal Workshop in Stanford, California, the Geothermal Technologies Program at the U.S. Department of Energy (DOE) released an updated Induced Seismicity Protocol. This document supplements the existing International Energy Agency (IEA) protocol of 2009, and is intended to be a living document kept up-to-date with state-of-the-art knowledge and practices.

  18. TEC Working Group Topic Groups Archives Protocols | Department of Energy

    Office of Environmental Management (EM)

    Protocols TEC Working Group Topic Groups Archives Protocols The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  19. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  20. Clues to the nature of SN 2009ip from photometric and spectroscopic evolution to late times

    SciTech Connect (OSTI)

    Graham, M. L. [Astronomy Department, University of California, Berkeley, CA 94720 (United States); Sand, D. J. [Physics Department, Texas Tech University, Lubbock, TX 79409 (United States); Valenti, S.; Howell, D. A.; Parrent, J. [Las Cumbres Observatory Global Telescope Network, Goleta, CA 93117 (United States); Halford, M.; Zaritsky, D. [Astronomy Department, University of Arizona, Tucson, AZ 85721 (United States); Bianco, F. [Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States); Rest, A. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Dilday, B., E-mail: melissagraham@berkeley.edu [North Idaho College, 1000 W. Garden Avenue, Coeur d'Alene, ID 83814 (United States)

    2014-06-01

    We present time series photometric and spectroscopic data for the transient SN 2009ip from the start of its outburst in 2012 September until 2013 November. These data were collected primarily with the new robotic capabilities of the Las Cumbres Observatory Global Telescope Network, a specialized facility for time domain astrophysics, and includes supporting high-resolution spectroscopy from the Southern Astrophysical Research Telescope, Kitt Peak National Observatory, and Gemini Observatory. Based on our nightly photometric monitoring, we interpret the strength and timing of fluctuations in the light curve as interactions between fast-moving ejecta and an inhomogeneous circumstellar material (CSM) produced by past eruptions of this massive luminous blue variable (LBV) star. Our time series of spectroscopy in 2012 reveals that, as the continuum and narrow H? flux from CSM interactions declines, the broad component of H? persists with supernova (SN)-like velocities that are not typically seen in LBVs or SN impostor events. At late times, we find that SN 2009ip continues to decline slowly, at ? 0.01 mag day{sup 1}, with small fluctuations in slope similar to Type IIn supernovae (SNe IIn) or SN impostors but no further LBV-like activity. The late-time spectrum features broad calcium lines similar to both late-time SNe and SN impostors. In general, we find that the photometric and spectroscopic evolution of SN 2009ip is more similar to SNe IIn than either continued eruptions of an LBV star or SN impostors but we cannot rule out a nonterminal explosion. In this context, we discuss the implications for episodic mass loss during the late stages of massive star evolution.

  1. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  2. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  3. Sandia Inverter Performance Test Protocol Efficiency Weighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inverter Performance Test Protocol Efficiency Weighting Alternatives Jeff Newmiller ∗ , William Erdman † , Joshua S. Stein ‡ , Sigifredo Gonzalez ‡ ∗ DNV GL, San Ramon, CA, US; † Cinch, Lafayette, CA, US; ‡ Sandia National Laboratories, Albuquerque, NM, US Abstract-The Sandia Inverter Performance Test Protocol defined two possible weighted-average efficiency values for use in comparing inverter performance, of which one definition was selected by the California Energy Commission

  4. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  5. Protocol for communications in potentially noisy environments

    DOE Patents [OSTI]

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  6. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Energy Savers [EERE]

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design ...

  7. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015 December 2015 Office of Environment, Safety and Health Assessments Protocol ...

  8. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 April 2015 Office of Environment, Safety and Health ...

  9. Accelerated Stress Test and Polarization Curve Protocols for...

    Office of Environmental Management (EM)

    Team Cell Component Accelerated Stress Test and Polarization Curve Protocols for PEM ... This document describes test protocols to assess the performance and durability of fuel ...

  10. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - ...

  11. Protocol, Inspection Criteria - April 23, 2008 | Department of...

    Energy Savers [EERE]

    Protocol, Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008...

  12. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  13. File Transfer Protocol (FTP) Site Instructions | Open Energy...

    Open Energy Info (EERE)

    Transfer Protocol (FTP) Site Instructions Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: File Transfer Protocol...

  14. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  15. Protective Force Protocols for ESS Supported Performance Tests...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, ...

  16. Security incidents on the Internet, 1989--1995

    SciTech Connect (OSTI)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  17. 2013-04-12 1.1 H-FM&T Mod 020 (Admin)(EditedForInternet Posting).pdf

    National Nuclear Security Administration (NNSA)

    Intentionally left blank for Internet posting purposes.

  18. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  19. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  20. Former Worker Program Medical Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Medical Protocol Former Worker Program Medical Protocol October 7, 2015 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants. The protocol is intended to ensure consistency of approach in the medical evaluation of participants. Former Worker Program Medical Protocol (36.47 KB) More Documents & Publications 2014 Former Worker

  1. TEC Working Group Topic Groups Archives Protocols Meeting Summaries |

    Office of Environmental Management (EM)

    Department of Energy Protocols Meeting Summaries TEC Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 (110.63 KB) Jacksonville TEC Meeting, Protocols Topic Group Summary - January 1999 (102.04 KB) More Documents & Publications TEC Working Group Topic Groups Archives Protocols Conference Call Summaries TEC Meeting Summaries - July 1997 TEC Meeting Summaries - January 1997

  2. Packet flow monitoring tool and method

    DOE Patents [OSTI]

    Thiede, David R [Richland, WA

    2009-07-14

    A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

  3. ChIP-seq Mapping of Distant-Acting Enhancers and Their In Vivo Activities

    SciTech Connect (OSTI)

    Visel, Axel; Pennacchio, Len A.

    2011-06-01

    The genomic location and function of most distant-acting transcriptional enhancers in the human genome remains unknown We performed ChIP-seq for various transcriptional coactivator proteins (such as p300) directly from different embryonic mouse tissues, identifying thousands of binding sitesTransgenic mouse experiments show that p300 and other co-activator peaks are highly predictive of genomic location AND tissue-specific activity patterns of distant-acting enhancersMost enhancers are active only in one or very few tissues Genomic location of tissue-specific p300 peaks correlates with tissue-specific expression of nearby genes Most binding sites are conserved, but the global degree of conservation varies between tissues

  4. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP). Technology summary

    SciTech Connect (OSTI)

    Not Available

    1994-04-01

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors.

  5. p{sub x}+ip{sub y} Superfluid from s-Wave Interactions of Fermionic Cold Atoms

    SciTech Connect (OSTI)

    Zhang Chuanwei; Tewari, Sumanta; Lutchyn, Roman M.; Das Sarma, S.

    2008-10-17

    Two-dimensional (p{sub x}+ip{sub y}) superfluids or superconductors offer a playground for studying intriguing physics such as quantum teleportation, non-Abelian statistics, and topological quantum computation. Creating such a superfluid in cold fermionic atom optical traps using p-wave Feshbach resonance is turning out to be challenging. Here we propose a method to create a p{sub x}+ip{sub y} superfluid directly from an s-wave interaction making use of a topological Berry phase, which can be artificially generated. We discuss ways to detect the spontaneous Hall mass current, which acts as a diagnostic for the chiral p-wave superfluid.

  6. Network Upgrade for the SLC: Control System Modifications

    SciTech Connect (OSTI)

    Crane, M.; Mackenzie, R.; Sass, R.; Himel, T.; /SLAC

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  7. DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx PDF icon DOE site facility mgt contracts Internet Posting ...

  8. Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol | Department of Energy 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol (January 1986) Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol (January 1986) (747.7 KB) More Documents & Publications Summary Protocol: Identification, Characterization, Designation,

  9. Developmental issues in environmental reporting protocols

    SciTech Connect (OSTI)

    Schrock, D.W.; Stoops, J.L.; Meier, A.K.; Vine, E.L.; Solomon, B.D.

    1994-08-01

    In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

  10. Next-gen RF MEMS Switch for a Smarter, Faster Internet of Things...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RF MEMS Switch for a Smarter, Faster Internet of Things Karen Lightman 2014.03.28 Big Data. Internet of Things. Quantified Self. Connected Home. Connected City. These...

  11. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. ... Battelle Contract No. DE-AC36-99-GO10337 Test Protocol Document, Hydrogen Safety Sensor ...

  12. BLM - State Protocol Agreement with Nevada | Open Energy Information

    Open Energy Info (EERE)

    State Protocol Agreement with Nevada Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: BLM - State Protocol Agreement with NevadaLegal...

  13. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. ... DE-AC36-99-GO10337 Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: ...

  14. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601, ...

  15. Vermont Agency of Transportation EPSC Protocol | Open Energy...

    Open Energy Info (EERE)

    of Transportation EPSC Protocol. Vermont Agency of Transportation. VTrans EPSC Protocol. 4p. GuideHandbook sent to Retrieved from "http:en.openei.orgwindex.php?titleVermontA...

  16. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficient Wide Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of Informatics and Computing Indiana University Bloomington, IN 47405 ezkissel@indiana.edu Martin Swany School of Informatics and Computing Indiana University Bloomington, IN 47405 swany@iu.edu Brian Tierney Lawrence Berkeley National Laboratory Berkeley, CA 94720 bltierney@lbl.gov Eric Pouyoul Lawrence Berkeley National Laboratory Berkeley, CA 94720 epouyoul@lbl.gov Due to a number of recent

  17. 3510T1 Emergency Response Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    510 Appendix T1 Emergency Response Protocol 1.0 Purpose This emergency response procedure is used by everyone at Jefferson Lab as the basis for response during an emergency situation in the absence of management direction. By their very nature, emergencies pose unique challenges, Jefferson Lab recognizes that listing the requirements for every possible emergency is prohibitive, but has used identified plausible situations to produce this guidance. For general lab-wide emergency procedures: 2.0

  18. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  20. Building America 2014 House Simulation Protocols

    Broader source: Energy.gov [DOE]

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  1. 2014 Building America House Simulation Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 Building America House Simulation Protocols E. Wilson, C. Engebrecht Metzger, S. Horowitz, and R. Hendron National Renewable Energy Laboratory Technical Report NREL/TP-5500-60988 March 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance for Sustainable Energy, LLC This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. Contract No.

  2. Avian study protocols and wind energy development

    SciTech Connect (OSTI)

    Fisher, K.

    1995-12-01

    This paper identifies the need to develop and use standardized avian study protocols to determine avian impacts at new and existing wind energy facilities. This will allow data collected from various sites to be correlated for better understanding wind energy related avian impacts. Factors contributing to an increased interest in wind energy facilities by electric utilities include: (1) Increased demand for electricity;(2) increased constraints on traditional electrical generating facilities (i.e. hydroelectric and nuclear power plants);(3) improved wind turbine technology. During the 1980`s generous tax credits spawned the development of wind energy facilities, known as wind farms, in California. Commercial scale wind farm proposals are being actively considered in states across the country - Washington, Oregon, Wyoming, Wisconsin, Texas, and Vermont to name a few. From the wind farms in California the unexpected issue of avian impacts, especially to birds-of-prey, or raptor, surfaced and continues to plague the wind industry. However, most of the avian studies did not followed a standardized protocol or methodology and, therefore, data is unavailable to analyze and compare impacts at different sites or with differing technologies and configurations. Effective mitigation can not be designed and applied until these differences are understood. The Bonneville Power Administration is using comparable avian study protocols to collect data for two environmental impact statements being prepared for two separate wind farm proposals. Similar protocol will be required for any other avian impact analysis performed by the agency on proposed or existing wind farms. The knowledge gained from these studies should contribute to a better understanding of avian interactions with wind energy facilities and the identification of effective mitigation measures.

  3. Identification of genes directly regulated by the oncogene ZNF217using ChIP-chip assays.

    SciTech Connect (OSTI)

    Krig, S.R.; Jin, V.X.; Bieda, M.C.; O'geen, H.; Yaswen, P.; Green, R.; Farnham, P.J.

    2007-01-26

    It has been proposed that ZNF217, which is amplified at 20q13 in various tumors, plays a key role during neoplastic transformation. ZNF217 has been purified in complexes that contain repressor proteins such as CtBP2, suggesting that it acts as a transcriptional repressor. However, the function of ZNF217 has not been well characterized due to a lack of known target genes. Using a global chromatin immunoprecipitation (ChIP)-chip approach, we identified thousands of ZNF217 binding sites in three tumor cell lines (MCF7, SW480, and Ntera2). Further analysis of ZNF217 in Ntera2 cells showed that many promoters are bound by ZNF217 and CtBP2 and that a subset of these promoters are activated upon removal of ZNF217. Thus, our in vivo studies corroborate the in vitro biochemical analyses of ZNF217-containing complexes and support the hypothesis that ZNF217 functions as a transcriptional repressor. Gene ontology analysis showed that ZNF217 targets in Ntera2 cells are involved in organ development, suggesting that one function of ZNF217 may be to repress differentiation. Accordingly we show that differentiation of Ntera2 cells with retinoic acid led to down-regulation of ZNF217. Our identification of thousands of ZNF217 target genes will enable further studies of the consequences of aberrant expression of ZNF217 during neoplastic transformation.

  4. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013. Hydrogen Refueling Protocols Webinar Slides (3.49 MB) More Documents & Publications Introduction to SAE Hydrogen Fueling Standardization Developing SAE Safety Standards for Hydrogen and

  5. Membrane and MEA Accelerated Stress Test Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007. htmwg_benjamin.pdf (395.65 KB) More Documents & Publications HTMWG, May 18, 2009, Welcome! Automotive Perspective on PEM Evaluation Fuel Cell Tech Team Accelerated Stress Test and Polarization Curve Protocols for PEM Fuel Cells

  6. Superior Energy Performance Certification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Certification Protocol Superior Energy Performance Certification Protocol Superior Energy Performance logo The Superior Energy Performance® (SEP(tm)) Certification Protocol describes the purpose of the SEP program and defines the steps required for participation-from initial application through certification by an ANSI-ANAB accredited Verification Body. Superior Energy Performance Certification Protocol (December 2012) (1.2 MB) More Documents & Publications Becoming a Certified Practitioner

  7. Assessment C-Site Visit Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    C-Site Visit Protocol Assessment C-Site Visit Protocol Assessment C- Site Visit Protocol.pdf (201.4 KB) More Documents & Publications Assessment B - Program Criteria ATTACHMENT A - CHECKLIST FOR SELF ASSESSMENT CX-000791: Categorical Exclusion Determination

  8. An Open Source project building the framework for the Internet...

    Broader source: Energy.gov (indexed) [DOE]

    with the Internet of Things Today NOW PLAYING: Artist: Flowers Song: Daisy Fridge Cloud Laundry Cloud Lighting B Cloud Speaker B Cloud Speaker A Cloud TV Cloud Lighting A...

  9. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  10. Ars Technica: Analyzing the Internet of Things in San Ramon ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Analyzing the Internet of Things Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share...

  11. My First Gamble With Internet Based Currency | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    My First Gamble With Internet Based Currency Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window)...

  12. GE Scientist Stephan Biller Discusses the Industrial Internet | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Manufacturing Scientist Stephan Biller Discusses the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Manufacturing Scientist Stephan Biller Discusses the Industrial Internet Stephan Biller, Chief Manufacturing Scientist at GE Global Research, talked with the Farstuff Podcast about the

  13. Industrial Dojo Program Fosters Industrial Internet Development | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Launches Cloud Foundry 'Industrial Dojo,' Contributes to Open Source to Foster Continued Development of the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Launches Cloud Foundry 'Industrial Dojo,' Contributes to Open Source to Foster Continued Development of the Industrial Internet

  14. Zephyr: A secure Internet process to streamline engineering

    SciTech Connect (OSTI)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E.

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  15. Operational Experiences Tuning the ATF2 Final Focus Optics Towards Obtaining a 37nm Electron Beam IP Spot Size

    SciTech Connect (OSTI)

    White, Glen; Seryi, Andrei; Woodley, Mark; Bai, Sha; Bambade, Philip; Renier, Yves; Bolzon, Benoit; Kamiya, Yoshio; Komamiya, Sachio; Oroku, Masahiro; Yamaguchi, Yohei; Yamanaka, Takashi; Kubo, Kiyoshi; Kuroda, Shigeru; Okugi, Toshiyuki; Tauchi, Toshiaki; Marin, Eduardo; /CERN

    2012-07-06

    The primary aim of the ATF2 research accelerator is to test a scaled version of the final focus optics planned for use in next-generation linear lepton colliders. ATF2 consists of a 1.3 GeV linac, damping ring providing low-emittance electron beams (< 12pm in the vertical plane), extraction line and final focus optics. The design details of the final focus optics and implementation at ATF2 are presented elsewhere. The ATF2 accelerator is currently being commissioned, with a staged approach to achieving the design IP spot size. It is expected that as we implement more demanding optics and reduce the vertical beta function at the IP, the tuning becomes more difficult and takes longer. We present here a description of the implementation of the tuning procedures and describe operational experiences and performances.

  16. SN 2009ip: CONSTRAINTS ON THE PROGENITOR MASS-LOSS RATE

    SciTech Connect (OSTI)

    Ofek, E. O.; Lin, L.; Goegues, E.; Kouveliotou, C.; Kasliwal, M. M.; Cao, Y.

    2013-05-01

    Some supernovae (SNe) show evidence for mass-loss events taking place prior to their explosions. Measuring their pre-outburst mass-loss rates provides essential information regarding the mechanisms that are responsible for these events. Here we present XMM-Newton and Swift X-ray observations taken after the latest, and presumably the final, outburst of SN 2009ip. We use these observations as well as new near-infrared and visible-light spectra and published radio and visible-light observations to put six independent order-of-magnitude constraints on the mass-loss rate of the SN progenitor prior to the explosion. Our methods utilize the X-ray luminosity, the bound-free absorption, the H{alpha} luminosity, the SN rise time, free-free absorption, and the bolometric luminosity of the outburst detected prior to the explosion. Assuming spherical mass loss with a wind-density profile, we estimate that the effective mass-loss rate from the progenitor was between 10{sup -3} and 10{sup -2} M{sub Sun} yr{sup -1}, over a few years prior to the explosion, with a velocity of {approx}10{sup 3} km s{sup -1}. This mass-loss rate corresponds to a total circumstellar matter (CSM) mass of {approx}0.04 M{sub Sun }, within 6 Multiplication-Sign 10{sup 15} cm of the SN. We note that the mass-loss rate estimate based on the H{alpha} luminosity is higher by an order of magnitude. This can be explained if the narrow-line H{alpha} component is generated at radii larger than the shock radius, or if the CSM has an aspherical geometry. We discuss simple geometries which are consistent with our results.

  17. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  18. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  19. Assessing Internet energy intensity: A review of methods and results

    SciTech Connect (OSTI)

    Coroama, Vlad C.; Hilty, Lorenz M.; Empa, Swiss Federal Laboratories for Materials Science and Technology, Lerchenfeldstr. 5, 9014 St. Gallen; Centre for Sustainable Communications, KTH Royal Institute of Technology, Lindstedtsvgen 5, 100 44 Stockholm

    2014-02-15

    Assessing the average energy intensity of Internet transmissions is a complex task that has been a controversial subject of discussion. Estimates published over the last decade diverge by up to four orders of magnitude from 0.0064 kilowatt-hours per gigabyte (kWh/GB) to 136 kWh/GB. This article presents a review of the methodological approaches used so far in such assessments: i) topdown analyses based on estimates of the overall Internet energy consumption and the overall Internet traffic, whereby average energy intensity is calculated by dividing energy by traffic for a given period of time, ii) model-based approaches that model all components needed to sustain an amount of Internet traffic, and iii) bottomup approaches based on case studies and generalization of the results. Our analysis of the existing studies shows that the large spread of results is mainly caused by two factors: a) the year of reference of the analysis, which has significant influence due to efficiency gains in electronic equipment, and b) whether end devices such as personal computers or servers are included within the system boundary or not. For an overall assessment of the energy needed to perform a specific task involving the Internet, it is necessary to account for the types of end devices needed for the task, while the energy needed for data transmission can be added based on a generic estimate of Internet energy intensity for a given year. Separating the Internet as a data transmission system from the end devices leads to more accurate models and to results that are more informative for decision makers, because end devices and the networking equipment of the Internet usually belong to different spheres of control. -- Highlights: Assessments of the energy intensity of the Internet differ by a factor of 20,000. We review topdown, model-based, and bottomup estimates from literature. Main divergence factors are the year studied and the inclusion of end devices. We argue

  20. Advantages of a leveled commitment contracting protocol

    SciTech Connect (OSTI)

    Sandholm, T.W.; Lesser, V.R.

    1996-12-31

    In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Such contracts do not allow agents to efficiently accommodate future events. Game theory has proposed contingency contracts to solve this problem. Among computational agents, contingency contracts are often impractical due to large numbers of interdependent and unanticipated future events to be conditioned on, and because some events are not mutually observable. This paper proposes a leveled commitment contracting protocol that allows self-interested agents to efficiently accommodate future events by having the possibility of unilaterally decommitting from a contract based on local reasoning. A decommitment penalty is assigned to both agents in a contract: to be freed from the contract, an agent only pays this penalty to the other party. It is shown through formal analysis of several contracting settings that this leveled commitment feature in a contracting protocol increases Pareto efficiency of deals and can make contracts individually rational when no full commitment contract can. This advantage holds even if the agents decommit manipulatively.

  1. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  2. A Discussion of Testing Protocols and LANL's Contribution to High

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Temperature Membranes | Department of Energy A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003 htmwg_test_lanl_contrib.pdf (730.2 KB) More Documents & Publications A Discussion of Conductivity Testing in High Temperature Membranes

  3. Addendum to the Building America House Simulation Protocols | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Addendum to the Building America House Simulation Protocols Addendum to the Building America House Simulation Protocols The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  4. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication

  5. Protective Force Protocols for ESS Supported Performance Tests and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Exercises, March 12, 2007 | Department of Energy Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 March 12, 2008 The DOE/NNSA has an established process for determining the effectiveness of a site's overall protection system, and a vital part of this process is the use of performance testing. This document - Protective Force Protocols for Engagement

  6. Protocol for Addressing Induced Seismicity Associated with Enhanced

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal Systems (EGS) | Department of Energy Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) This document is intended to assist industry and regulators identify important issues and parameters that may be necessary for the evaluation and mitigation of adverse effects of induced seismicity. egs-is-protocol-final-draft-20110531.pdf (218.87 KB) More

  7. Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Operating Experience Report 2013-01 | Department of Energy Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 April, 2013 Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 To support the

  8. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER ...

  9. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER ...

  10. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  11. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing ...

  12. Protocol, Test Inspectors Guide - March 2008 | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide This Emergency...

  13. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Required ... the Office of Environment, Safety and Health Assessments required reading program. ...

  14. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for the Development and ... (CRADs) used by the Office of Environment, Safety and Health Assessments (EA-30). ...

  15. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This initial protocol included simple planning steps that ... an Outreach and Communication Program ... Speech interference is not likely, as seismicity usually ...

  16. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  17. Protocol, Qualification Standard for the Site Lead Program -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead...

  18. Standard Hydrogen Test Protocols for the NREL Sensor Testing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a ... Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for ...

  19. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Download the webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013. Hydrogen Refueling ...

  20. A Protocol for Estimating and Mapping Global EGS Potential |...

    Open Energy Info (EERE)

    with public Reporting Codes * Present results using common visualization and data architecture The goal of the Protocol is the production of regional estimates and maps of EGS...

  1. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    Interface: Spreadsheet Website: www.ghgprotocol.orgcalculation-toolsall-tools Cost: Free References: Stationary Combustion Guidance1 The Greenhouse Gas Protocol tool for...

  2. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    Interface: Spreadsheet Website: www.ghgprotocol.orgcalculation-toolsall-tools Cost: Free References: Refrigerant Guide1 The Greenhouse Gas Protocol tool for refrigeration is...

  3. Chapter 17: Residential Behavior Protocol. The Uniform Methods...

    Broader source: Energy.gov (indexed) [DOE]

    17: Residential Behavior Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of ...

  4. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Nevada State Protocol Agreement for Implementing the National Historic Preservation...

  5. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  6. Internet-Based Calibration of a Multifunction Calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-12-19

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multijunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  7. Internet-based calibration of a multifunction calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-04-17

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  8. GE Showcases Industrial Internet Innovations and Promotes Win-Win

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cooperation at 2015 TECHfest | GE Global Research Showcases Industrial Internet Innovations and Promotes Win-Win Cooperation at 2015 TECHfest Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Showcases Industrial Internet Innovations and Promotes Win-Win Cooperation at 2015 TECHfest GE China Technology Center teams

  9. High-Speed Network Enables Industrial Internet | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Unveils High-Speed Network Infrastructure to Connect Machines, Data and People at Light Speed to the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Unveils High-Speed Network Infrastructure to Connect Machines, Data and People at Light Speed to the Industrial Internet New fiber optic network

  10. Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) – PROTOCOL – EA-31-01

    Broader source: Energy.gov [DOE]

    Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) – PROTOCOL – EA-31-01

  11. Development of an Updated Induced Seismicity Protocol for the Application

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Microearthquake (MEQ) Monitoring for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report | Department of Energy Updated Induced Seismicity Protocol for the Application of Microearthquake (MEQ) Monitoring for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report Development of an Updated Induced Seismicity Protocol for the Application of Microearthquake (MEQ) Monitoring for Characterizing Enhanced

  12. Protocol, Appraisal Process Guide - April 2008 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide This process guide provides information about the Department of Energy's (DOE) Independent Oversight process implemented by the DOE Office of Emergency Management Oversight in conducting independent oversight appraisals of DOE emergency management programs. The Office of Emergency Management Oversight Appraisal Process Guide is a

  13. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  14. A closer look at the fluctuations in the brightness of SN 2009IP during its late 2012 eruption

    SciTech Connect (OSTI)

    Martin, J. C. [Barber Observatory, University of Illinois Springfield, Springfield, IL 62704 (United States); Hambsch, F.-J. [Remote Observatory, Atacama Desert, Chile Vereniging Voor Sterrenkunde (VVS), Oude Bleken 12, B-2400 Mol (Belgium); Margutti, R.; Soderberg, A. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02318 (United States); Tan, T. G. [Perth Exoplanet Survey Telescope, Perth (Australia); Curtis, I., E-mail: jmart5@uis.edu [Adelaide (Australia)

    2015-01-01

    The supernova (SN) impostor SN 2009ip has re-brightened several times since its initial discovery in 2009 August. During its last outburst in late 2012 September, it reached a peak brightness of m{sub v} ?13.5 (M{sub v} brighter than ?18), causing some to speculate that it had undergone a terminal core-collapse SN. Relatively high-cadence multi-wavelength photometry of the post-peak decline revealed bumps in brightness infrequently observed in other SNe IIn. These bumps occurred synchronously in all ultraviolet (UV) and optical bands with amplitudes of 0.10.4 mag at intervals of 1030 days. Episodic continuum brightening and dimming in the UV and optical with these characteristics is not easily explained within the context of models that have been proposed for the late September 2012 outburst of SN 2009ip. We also present evidence that the post-peak fluctuations in brightness occur at regular intervals and raise more questions about their origin.

  15. ACCELERATING VERY FAST GAS IN THE SUPERNOVA IMPOSTOR SN 2009ip WITH JETS FROM A STELLAR COMPANION

    SciTech Connect (OSTI)

    Tsebrenko, Danny; Soker, Noam E-mail: soker@physics.technion.ac.il

    2013-11-10

    Using hydrodynamic numerical simulations we show that high-velocity ejecta with v ? 10{sup 4} km s{sup 1} in the outbursts of the supernova impostor SN 2009ip and similar luminous blue variable (LBV) stars can be explained by the interaction of fast jets, having v {sub jet} ? 2000-3000 km s{sup 1}, with a circumbinary shell (extended envelope). The density profile in the shell is very steep such that the shock wave, that is excited by the jets' interaction with the shell, accelerates to high velocities as it propagates outward. The amount of very fast ejecta is small, but sufficient to account for some absorption lines. Such an extended envelope can be formed from the binary interaction and/or the unstable phase of the LBV primary star. The jets themselves are launched by the more compact secondary star near periastron passages.

  16. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    SciTech Connect (OSTI)

    Shue, Craig A; Kalafut, Prof. Andrew; Gupta, Prof. Minaxi

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  17. Subfreezing Start/Stop Protocol for and Advanced Metallic Open...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Subfreezing StartStop Protocol for and Advanced Metallic Open-Flowfield Fuel Cell Stack Part of a 100 million fuel cell award announced by DOE Secretary Bodman on Oct. 25, 2006. ...

  18. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Broader source: Energy.gov [DOE]

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  19. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  20. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  1. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  2. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Catalysts | Department of Energy Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER 2007). 13-16 August, 2007, Detroit, Michigan. Sponsored by the U.S. Department of Energy's (DOE) Office of FreedomCAR and Vehicle Technologies (OFCVT). deer07_bunting_1.pdf (1.08 MB) More Documents

  3. High-Performance Computing Data Center Metering Protocol | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy High-Performance Computing Data Center Metering Protocol High-Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High-Performance Computing (HPC) data center facilities and documents system strategies that have been used in Department of Energy data centers to increase data center energy efficiency. Download the guide. (1.34 MB) More Documents & Publications Liquid Cooling v. Air Cooling Evaluation in the Maui High-Performance

  4. House Simulation Protocols (Building America Benchmark) - Building America

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top Innovation | Department of Energy House Simulation Protocols (Building America Benchmark) - Building America Top Innovation House Simulation Protocols (Building America Benchmark) - Building America Top Innovation Photo of a house prototype. As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals.

  5. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems by Ernie Majer, James Nelson, Ann Robertson-Tait, Jean Savy, and Ivan Wong January 2012 | DOE/EE-0662 Cover Image Courtesy of Katie L. Boyle, Lawrence Berkeley National Laboratory i i Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Preface In June 2009, the New York Times published an article about the public fear of geothermal development causing earthquakes. The article

  6. The Development of Rapid Aging and Poisoning Protocols for Diesel

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aftertreatment Devices | Department of Energy The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices Presentation given at DEER 2006, August 20-24, 2006, Detroit, Michigan. Sponsored by the U.S. DOE's EERE FreedomCar and Fuel Partnership and 21st Century Truck Programs. 2006_deer_bunting.pdf (769.94 KB) More Documents & Publications CLEERS Aftertreatment Modeling and

  7. Self-referenced continuous-variable quantum key distribution protocol

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration ofmore » the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  8. Self-referenced continuous-variable quantum key distribution protocol

    SciTech Connect (OSTI)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  9. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  10. Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015

    Broader source: Energy.gov [DOE]

    Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015

  11. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  12. Development of characterization protocol for mixed liquid radioactive waste classification

    SciTech Connect (OSTI)

    Zakaria, Norasalwa; Wafa, Syed Asraf; Wo, Yii Mei; Mahat, Sarimah

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as problematic waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  13. How To Setup EA Landing Page As Default Home Page For Internet Explorer |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http://energy.gov/iea/. Once the EA site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 1: In Internet Explorer enter the URL http://energy.gov/iea/. Once the EA site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 2: Choose “Add or

  14. How To Setup EHSS Landing Page As Default Home Page For Internet Explorer |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http://energy.gov/ehss/. Once the EHSS site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 1: In Internet Explorer enter the URL http://energy.gov/ehss/. Once the EHSS site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 2: Choose “Add

  15. Controls: The unsung hero of the industrial internet revolution | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Controls: The Unsung Hero of The Industrial Internet Revolution Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Controls: The Unsung Hero of The Industrial Internet Revolution Vince Epperson 2015.08.03 You've probably heard about Big Data, the Industrial Internet and the (Industrial) Internet of Things.

  16. DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11.pdf...

    Broader source: Energy.gov (indexed) [DOE]

    .pdf More Documents & Publications DOEMajorSiteFacilityContracts2-2011.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1)...

  17. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  18. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  19. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing

  20. CSEP Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tobin Richardson President & CEO, ZigBee Alliance Board Alternate, CSEP BoD Smart Energy Profile 2.0 * A conversion of ZigBee Smart Energy 1.x to IP * MAC/PHY (link layer) independent (internetworking) - intended to run over generic Internet Protocol stack * Mainstream protocols profiled * Focus on communications related to efficiency, usage, price communication, demand response and load control, and messaging * Secure * Optimized for embedded and battery-powered devices * Range of backhaul

  1. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  2. Control room envelope unfiltered air inleakage test protocols

    SciTech Connect (OSTI)

    Lagus, P.L.; Grot, R.A.

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  3. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L.; Robertson, Perry J.; Pierson, Lyndon G.

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  4. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  5. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  6. Superior Energy Performance Measurement and Verification Protocol for Industry

    Broader source: Energy.gov [DOE]

    This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance level requirements of the Superior Energy Performance® (SEP™) Program. The Program has two paths. This document is structured to reflect those different paths.

  7. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of

  8. ip_11.indd

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... which may be a new or improved machine, material, or process; a unique ... threat materials by matching the proton signals from the scanned items to those in a ...

  9. THE DIVERSITY OF MASSIVE STAR OUTBURSTS. I. OBSERVATIONS OF SN2009ip, UGC 2773 OT2009-1, AND THEIR PROGENITORS

    SciTech Connect (OSTI)

    Foley, Ryan J.; Berger, Edo; Challis, Peter J.; Soderberg, Alicia M.; Fox, Ori; Levesque, Emily M.; Ivans, Inese I.; Rhoads, James E.

    2011-05-01

    Despite both being outbursts of luminous blue variables (LBVs), SN 2009ip and UGC 2773 OT2009-1 have very different progenitors, spectra, circumstellar environments, and possibly physical mechanisms that generated the outbursts. From pre-eruption Hubble Space Telescope images, we determine that SN 2009ip and UGC 2773 OT2009-1 have initial masses of {approx}> 60 and {approx}> 25 M{sub sun}, respectively. Optical spectroscopy shows that at peak, SN 2009ip had a 10,000 K photosphere and its spectrum was dominated by narrow H Balmer emission, similar to classical LBV giant outbursts, also known as 'supernova impostors'. The spectra of UGC 2773 OT2009-1, which also have narrow H{alpha} emission, are dominated by a forest of absorption lines, similar to an F-type supergiant. Blueshifted absorption lines corresponding to ejecta at a velocity of 2000-7000 km s{sup -1} are present in later spectra of SN 2009ip-an unprecedented observation for LBV outbursts, indicating that the event was the result of a supersonic explosion rather than a subsonic outburst. The velocity of the absorption lines increases between two epochs, suggesting that there were two explosions in rapid succession. A rapid fading and rebrightening event concurrent with the onset of the high-velocity absorption lines is consistent with the double-explosion model. A near-infrared excess is present in the spectra and photometry of UGC 2773 OT2009-1 that is consistent with {approx}2100 K dust emission. We compare the properties of these two events and place them in the context of other known massive star outbursts such as {eta} Car, NGC 300 OT2008-1, and SN 2008S. This qualitative analysis suggests that massive star outbursts have many physical differences that can manifest as the different observables seen in these two interesting objects.

  10. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    SciTech Connect (OSTI)

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  11. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  12. Practical Physiological Monitoring Protocol for Heat Strain Control

    SciTech Connect (OSTI)

    Anderson, R B; Johnson, J S; Burastero, S R; Gilmore, O

    2003-07-01

    This protocol is indicated when employees are: (1) Exposed to Heat Stress above the TLV; (2) Performing low to moderate work rates with rare excursions to heavy rates; NOT for heavy and very heavy work rates or requiring peak outputs for extended periods; and, (3) Determined to need physiological heat strain monitoring by the cognizant Industrial Hygienist. The requirements are: (1) A work/rest regimen must be established at outset and adjusted as needed during operations (see Appendix A); (2) On-going data collection and review; (3) Rest times must be increased if indicated; (4) Intended for normal, healthy adults. Seasonal medical screening is recommended; and (5) Training for affected employees regarding this protocol, hydration, self-limitation, lifestyle effects and signs, symptoms and treatment of heat related illnesses. This protocol is to aid industrial hygienists in assessing individual physiological response to employee heat exposures, and provides guidance to identify and reduce heat strain as needed. Physiological monitoring is recommended when heat exposure exceeds the TLV by {ge} 2 C and/or when evaporative cooling is limited or eliminated. Typically, this occurs when the use of personal protective equipment includes impermeable or water vapor restrictive outer garments. This protocol is used to identify when heat strain may be excessive. This is determined through measurements taken during each rest period. If decision criteria are exceeded, changes in work practices shall be implemented immediately to reduce employee heat strain and prevent heat related illnesses up to and including heat stroke, a life threatening condition. This protocol may not be appropriate under all conditions. Sound Industrial Hygiene professional judgment is required. Because the measurements for this protocol occur during the rest phase of the work/rest regimen, the conditions affecting employee heat strain during the work phase must be carefully weighed. Work rate

  13. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  14. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  15. A Resource assessment protocol for GEO-ELEC | Open Energy Information

    Open Energy Info (EERE)

    Resource assessment protocol for GEO-ELEC Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: A Resource assessment protocol for GEO-ELEC Authors...

  16. Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR Requirements for Cycling Testing and Its Effects on Type 3 and 4 Containers Test Protocol for Hydrogen Storage ...

  17. Microsoft Word - Assessment-C-SiteVisitProtocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for

  18. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    SciTech Connect (OSTI)

    O`Connell, L.J.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  19. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  20. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect (OSTI)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  1. Everything you might want to know about the Internet but are afraid to ask!. A new users resource

    SciTech Connect (OSTI)

    Thiel, E.

    1993-09-01

    This document is a guide to accessing the Internet and the services available on Internet. The document contains a short explanation of the Internet by E. Kroll and E. Hoffman, brief descriptions of the primary access tools, a glossary, answers to frequently asked questions about the Internet, J. Martin`s `Search for Internet Treasure` and other helpful information. The data access tools discussed in this document include Gopher, World Wide Web, WAIS, ASTRA, ARCHIE, WHOIS, NETSERV, and TRICKLE. The file transfer tool discussed is BITFTP. The two communication services discussed are NETNEWS and LISTSERV.

  2. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  3. SBIR Phase II Final Report - Multi-Protocol Energy Management Gateway for Home-Area Networks

    SciTech Connect (OSTI)

    Hanna, Jason

    2015-02-06

    Significant amounts of electricity, natural gas, and heating oil are wasted by homeowners due to inefficient operation and inadequate maintenance of heating, ventilation, and air conditioning (HVAC) equipment. Coincident’s work under this award reduces energy waste, saves consumers money, and reduces carbon emissions. It does so in three ways: First, Coincident’s approach replaces the traditional thermostat with a wireless network of sensors and controllers that measure temperature, humidity and occupancy in multiple rooms in the house. The “Internet of Things” is a technology trend holding the promise of ubiquitous inexpensive sensors. The reality, however, is that energy and HVAC monitoring and management is a patchwork of incompatible protocols and expensive proprietary technologies. Coincident’s multi-protocol architecture, developed in part under this award tackles this problem and brings low cost interoperable sensor and control devices to market. Second, the Coincident system eliminates hard-to-program and rigid thermostat schedules and instead provides automatic operation of heating and cooling by combining individual temperature and comfort preferences with energy-saving targets, real-time utility use information, weather data, and room utilization patterns. Energy efficiency technology must be appealing to consumers otherwise it will not be used. The Coincident user interface has engaging features such as remote control from any smart phone or web browser and per-room performance breakdowns. Expected energy savings resulting from more efficient operation of heating and air conditioning equipment are in the range of 10-20%. Third, the Coincident system provides heating and air-conditioning contractors with fine-grained performance data for every residence they support (subject to customer privacy controls). This data is integrated from diverse networks within the residence and includes HVAC performance and fuel use data. This information allows

  4. The Internet Café of the Nuclear World | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Internet Café of the Nuclear World The Internet Café of the Nuclear World July 19, 2012 - 12:25pm Addthis Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Karissa Marcum

  5. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  6. Non-PGM Catalyst Performance Targets and Test Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wednesday, January 21, 2015, 9:30 AM - 5:00 PM MST Los Alamos National Laboratory Los Alamos, New Mexico Non-PGM Catalyst Performance Targets Los Alamos National Laboratory Non-PGM Catalyst Performance Targets and Test Protocols Catalysis Working Group, January 21 st , 2015 5 Discussion of Non-PGM ORR Catalyst Targets Already addressed three times at CWG meetings in Arlington, VA on May 15, 2013; Golden, CO on December 18 th , 2013 (update); and Washington, D.C. on June 16, 2014 * Areal current

  7. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht, C. Metzger; Wilson, E.; Horowitz, S.

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program’s goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  8. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  9. Verifying a Simplified Fuel Oil Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, Hugh; Dentz, Jordan; Doty, Chris

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  10. Proposals for Non-PGM Catalyst Target and Test Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark Mehall, Jim Waldecker, Anusorn Kongkanand* and Patrick Pietrasz* *OEM Contributor June 16, 2014 2 Fuel Cell Tech Team 1. Non-PGM ORR catalyst is expected to be an opportunity to enable further cost reduction of fuel cell system beyond an achievement of the low PGM loading ORR catalyst. 2. Therefore, target should be to

  11. Superior Energy Performance Measurement and Verification Protocol for Industry

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance Measurement and Verification Protocol for Industry November 19, 2012 Table of Contents ©2012, The Regents of the University of California Notice: this manuscript has been authored by employees of the Regents of the University of California, and others, under Contract No DE-AC02-05CH11231 with the U.S. Department of Energy, for the management and operation of the Lawrence Berkeley National Laboratory. The United State Government retains a non-exclusive, paid-up,

  12. NIST cooperative laboratory for OSI routing technology

    SciTech Connect (OSTI)

    Montgomery, D.

    1994-05-23

    This document is one of two reports on the Integrated ISIS protocol. Required by the IAB/IESG in order for an Internet routing protocol to advance to Draft Standard Status. Integrated ISIS is an Interior Gateway Protocol and is designed to carry both IP and ISO CLNP routing information. Integrated ISIS is currently designated as a Proposed Standard. The protocol was first published in RFC 1195. Internet Draft was published subsequently to RFC 1195 and documents the current version of the protocol. This report documents experience with Integrated ISIS. This includes reports on interoperability testing, field experience and the current state of Integrated ISIS implementations. It also presents a summary of the Integrated ISIS Management Information Base (MIB), and a summary of the Integrated ISIS authentication mechanism.

  13. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  14. The Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Metzger, C.; Norton, Paul

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every four years, the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the "average occupant" in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  15. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  16. GEO-ENGINEERING MODELING THROUGH INTERNET INFORMATICS (GEMINI)

    SciTech Connect (OSTI)

    W. Lynn Watney; John H. Doveton

    2004-05-13

    GEMINI (Geo-Engineering Modeling through Internet Informatics) is a public-domain web application focused on analysis and modeling of petroleum reservoirs and plays (http://www.kgs.ukans.edu/Gemini/index.html). GEMINI creates a virtual project by ''on-the-fly'' assembly and analysis of on-line data either from the Kansas Geological Survey or uploaded from the user. GEMINI's suite of geological and engineering web applications for reservoir analysis include: (1) petrofacies-based core and log modeling using an interactive relational rock catalog and log analysis modules; (2) a well profile module; (3) interactive cross sections to display ''marked'' wireline logs; (4) deterministic gridding and mapping of petrophysical data; (5) calculation and mapping of layer volumetrics; (6) material balance calculations; (7) PVT calculator; (8) DST analyst, (9) automated hydrocarbon association navigator (KHAN) for database mining, and (10) tutorial and help functions. The Kansas Hydrocarbon Association Navigator (KHAN) utilizes petrophysical databases to estimate hydrocarbon pay or other constituent at a play- or field-scale. Databases analyzed and displayed include digital logs, core analysis and photos, DST, and production data. GEMINI accommodates distant collaborations using secure password protection and authorized access. Assembled data, analyses, charts, and maps can readily be moved to other applications. GEMINI's target audience includes small independents and consultants seeking to find, quantitatively characterize, and develop subtle and bypassed pays by leveraging the growing base of digital data resources. Participating companies involved in the testing and evaluation of GEMINI included Anadarko, BP, Conoco-Phillips, Lario, Mull, Murfin, and Pioneer Resources.

  17. Connecting to the Internet Securely: Windows 2000 CIAC-2321

    SciTech Connect (OSTI)

    Orvis, W; Call, K; Dias, J

    2002-03-12

    As the threat to computer systems increases with the increasing use of computers as a tool in daily business activities, the need to securely configure those systems becomes more important. There are far too many intruders with access to the Internet and the skills and time to spend compromising systems to not spend the time necessary to securely configure a system. Hand-in-hand with the increased need for security are an increased number of items that need to be securely configured. Windows 2000 has about seven hundred security related policy settings, up from seventy two in Windows NT. While Windows 2000 systems are an extension of the Windows NT 4 architecture, there are considerable differences between these two systems, especially in terms of system and security administration. Operational policy, system security, and file security are other areas where Windows 2000 has expanded considerably beyond the domain model of Windows NT 4. The Windows NT 4 Domain model consists of domains of workstations that, with a single login, share resources and are administered together. The database of user settings and credentials resides in the domain server. Domains can trust other domains to expand the sharing of resources between users of multiple domains. On Windows 2000, the domains still exist but multiple domains that share trust are combined into Domain Trees and Domain Forests depending on how the logical namespace is divided. These trees and forests are combined under a new object called Active Directory. Domains themselves are broken down into Organizational Units. As such, there are more levels at which security policies can be set and for which information sharing can be controlled.

  18. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  19. Protocol for EM Review/Field Self-Assessment of Site Specific Quality

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assurance Programs/Quality Implementation Plans | Department of Energy Services » Program Management » Quality Assurance » Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans Review protocol and lines of inquiry that are used as basis for technical review and approval of site-specific quality assurance

  20. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  1. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Supersedes DOE O 142.2. Admin Chg 1, dated 6-27-13, Supersedes DOE O 142.1A. Certified 12-3-14.

  2. Standard Hydrogen Test Protocols for the NREL Sensor Testing Laboratory (Brochure), NREL (National Renewable Energy Laboratory)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Photo by Robert Burgess, NREL/PIX 18420 0 1 Standard Test Protocols for the NREL Hydrogen Sensor Test Laboratory Researchers at the NREL Hydrogen Safety Sensor Test Laboratory 1 developed a variety of test protocols to quantitatively assess critical

  3. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  4. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  5. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  6. Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR

    SciTech Connect (OSTI)

    Bernal, SM

    2004-10-11

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated

  7. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  8. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  9. Sandia to Discuss Energy-Storage Test Protocols at the European...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Discuss Energy-Storage Test Protocols at the European PV Solar Energy Conference - Sandia ... distributed energy resource (DER) operation and communication within the power system. ...

  10. The Development of a Small Engine Based Accelerated Ash Loading Protocol |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Accelerated Ash Loading Protocol The Development of a Small Engine Based Accelerated Ash Loading Protocol Presentation given at DEER 2006, August 20-24, 2006, Detroit, Michigan. Sponsored by the U.S. DOE's EERE FreedomCar and Fuel Partnership and 21st Century Truck Programs. 2006_deer_bunting.pdf (371.89 KB) More Documents & Publications The Development of a Small Engine Based Ash Loading Protocol Development of an Accelerated Ash-Loading Protocol for Diesel

  11. BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers

    SciTech Connect (OSTI)

    Borges, Raymond; Patton, Robert M; Kettani, Houssain; Masalmah, Yahya

    2011-01-01

    There is a large amount of illegal content being replicated through peer-to-peer (P2P) networks where BitTorrent is dominant; therefore, a framework to profile and police it is needed. The goal of this work is to explore the behavior of initial seeds and highly active peers to develop techniques to correctly identify them. We intend to establish a new methodology and software framework for profiling BitTorrent peers. This involves three steps: crawling torrent indexers for keywords in recently added torrents using Really Simple Syndication protocol (RSS), querying torrent trackers for peer list data and verifying Internet Protocol (IP) addresses from peer lists. We verify IPs using active monitoring methods. Peer behavior is evaluated and modeled using bitfield message responses. We also design a tool to profile worldwide file distribution by mapping IP-to-geolocation and linking to WHOIS server information in Google Earth.

  12. iTOUGH2 Universal Optimization Using the PEST Protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.

    2010-07-01

    , the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  13. inet

    Energy Science and Technology Software Center (OSTI)

    2006-03-10

    INET's was developed in the 80's when the Internet was in it's infancy and various vendors were attempting to get into the ball game with half baked code that indicated a lack of understanding about basic IP standards in the area of IP and ICMP. Various test applications were written to test conformance to the early Internet RFC's especially ICMP. The INET program allows the user to exercise various minor internet services provided by amore » specified service host. See the DDN Protocol Handbook, Volume Two, Section 8 for a detailed description of various minor applications which one might attempt to exercise. The unix network daemon "inetd" was the inspiration for the name "inet". A simple C library generated at the time was recently used to build a program called 'dp' shich GROK uses to transfer BAG session information to some backend data collector such as DISARM (LA-CC number 05-D47)« less

  14. ANTFARM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Toolkit for Assessments and Remote Mapping Control System Assessment Tool The Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM) application is a passive tool capable of safely mapping Internet Protocol (IP) networks used in industrial control systems. Such activities are required for identifying and documenting the critical cyber assets and access control modules that make up an electronic security perimeter. Traditional information technology (IT) network mapping

  15. Microsoft Word - DOE-ID-INL-16-089.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    9 SECTION A. Project Title: Multimedia Gateway Hardware and Software Upgrade SECTION B. Project Description and Purpose: This project upgrades the current Multimedia Gateway (MGW) to Open MGW Rel 1 in the Wireless Test Bed (WTB). This includes both hardware (HW) and software (SW) changes of the MGW. The IuCS interface of the Radio Network Controller (RNC) also changes to Internet Protocol (IP) from Asynchronous Transfer Mode (ATM). The upgrade will replace one electronic rack and associated

  16. A general protocol for restoration of entire river catchments

    SciTech Connect (OSTI)

    Stanford, J.A.; Frissell, C.A.; Ward, J.V.; Coutant, C.C.; Williams, R.N.; Lichatowich, J.A.

    1996-05-28

    Large catchment basins may be viewed as ecosystems with interactive natural and cultural attributes. Stream regulation severs ecological connectivity between channels and flood plains by reducing the range of natural flow and temperature variation, reduces the capacity of the ecosystem to sustain native biodiversity and bioproduction and promotes proliferation of non-native biota. However, regulated rivers regain normative attributes, which promote recovery of native biota, as distance from the dam increases and in relation to the mode of regulation. Therefore, reregulation of flow and temperature to normative pattern, coupled with elimination of pollutants and constrainment of nonnative biota, can naturally restore damaged habitats from headwaters to mouth. The expectation is rapid recovery of depressed populations of native species. The protocol requires: restoration of seasonal temperature patterns; restoration of peak flows needed to reconnect and periodically reconfigure channel and floodplain habitats; stabilization of base flows to revitalize the shallow water habitats; maximization of dam passage to allow restoration of metapopulation structure; change in the management belief system to rely on natural habitat restoration as opposed to artificial propagation, installation of artificial instream structures (river engineering) and artificial food web control; and, practice of adaptive ecosystem management.

  17. Developments in Assisting Countries in Implementing the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Hansen, Linda H.; Cain, Ronald A.; Kovacic, Don N.; Apt, Kenneth E.; VanSickle, Matthew

    2010-08-11

    In 2008, the U.S. Department of Energy (DOE) began assisting selected non-nuclear weapon states in planning and preparing for implementation of the International Atomic Energy Agency’s Additional Protocol (AP). Since then, the AP international implementation program has contributed to the substantial progress made by Vietnam, Thailand, Iraq, and Malaysia in preparing for entry-into-force of the AP. An overall engagement plan has been developed with components designed to train government AP implementing agencies, inform policy makers, conduct outreach to industry and universities, make AP reporting software available and useful, and plan a detailed approach for implementing the declaration and complementary access provisions of the AP. DOE recently began collaborating with Indonesia, which has already entered the AP into force, requiring a second method of engagement somewhat different from that taken with countries that have not entered the AP into force. The AP international implementation program, administered by the International Nuclear Safeguards and Engagement Program, is working more closely with DOE’s International Nonproliferation Export Control Program to ensure countries are aware of and prepared to implement the export/import provisions of the AP. As the AP implementation program matures and helps move countries closer to entry-into-force or improved AP implementation, it is identifying characteristics of a country’s “end-state” that indicate that DOE assistance is no longer required. The U.S. AP Implementation Act and Senate Resolution of Ratification require the Administration to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states. DOE’s AP international implementation program is a significant part of these measures. This paper describes recent developments to increase the scope and effectiveness of the program.

  18. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  19. Protocol for Maximizing Energy Savings and Indoor Environmental Quality Improvements when Retrofitting Apartments

    SciTech Connect (OSTI)

    Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fis, William J.

    2012-06-18

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  20. Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments

    SciTech Connect (OSTI)

    Noris, Federico; Delp, William W.; Vermeer, Kimberly; Adamkiewicz, Gary; Singer, Brett C.; Fisk, William J.

    2013-06-01

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  1. Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2010 | Department of Energy EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 Protocol EM-HQ Review Field Self Assessment Site Specific QAP-QIP February 2010 This memorandum serves to transmit the Protocol for EM Review/Field Self-Assessment of Site-Specific QAP/QIP. The subject document is developed as part of continued efforts to ensure technical consistency, transparency, and clarity of QA requirements and expectations. Protocol EM-HQ Review Field Self Assessment Site

  2. Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs Protocol for EM Review/Field Self-Assessment of Site-Specific QAPs/QIPs The purpose of this document is to present the review protocol and lines of inquiry (LOIs) that are used as basis for EM-HQ technical review and approval of site-specific QAP/QIPs. Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans (2.63 MB) More Documents &

  3. Subfreezing Start/Stop Protocol for and Advanced Metallic Open-Flowfield

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cell Stack | Department of Energy Subfreezing Start/Stop Protocol for and Advanced Metallic Open-Flowfield Fuel Cell Stack Subfreezing Start/Stop Protocol for and Advanced Metallic Open-Flowfield Fuel Cell Stack Part of a $100 million fuel cell award announced by DOE Secretary Bodman on Oct. 25, 2006. 2_nuvera.pdf (21.96 KB) More Documents & Publications Subfreezing Start/Stop Protocol for an Advanced Metallic Open-Flowfield Fuel Cell Stack Fuel Cell Kickoff Meeting Agenda Advance

  4. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  5. The Development of a Small Engine Based Ash Loading Protocol | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Ash Loading Protocol The Development of a Small Engine Based Ash Loading Protocol When 5% lubrication oil is added to diesel fuel in a small engine test, ash increases linearly and at the back of a filter, the amount depending on the differences in substrate and wash-coat type. deer08_bunting.pdf (322.41 KB) More Documents & Publications Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Requirements-Driven Diesel Catalyzed Particulate Trap Design

  6. Protocol, ES&H Systems Assessor/Appraiser - October 2003 | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Office Specific Qualification Standard for ES&H Systems AssessorAppraiser (Rev. 0) This ... PDF icon Protocol, ES&H Systems AssessorAppraiser - October 2003 More Documents & ...

  7. Implementation of two-party protocols in the noisy-storage model

    SciTech Connect (OSTI)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-05-15

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  8. Fuel Cell Tech Team Accelerated Stress Test and Polarization Curve Protocols for PEM Fuel Cells

    Broader source: Energy.gov [DOE]

    Accelerated stress test and polarization curve protocols developed by the U.S. DRIVE Fuel Cell Technical Team for polymer electrolyte membrane (PEM) fuel cells, revised January 14, 2013.

  9. Accelerated Stress Test and Polarization Curve Protocols for PEM Fuel Cells

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Appendix A: FCTT AST and Polarization Curve Protocols for PEMFCs U.S. DRIVE Fuel Cell Tech Team Cell Component Accelerated Stress Test and Polarization Curve Protocols for PEM Fuel Cells (Electrocatalysts, Supports, Membranes, and Membrane Electrode Assemblies) Last Revision: January 14, 2013 Fuel cells, especially for automotive propulsion, must operate over a wide range of operating and cyclic conditions. The desired operating range encompasses temperatures from below the freezing point to

  10. Quantum tomographic cryptography with Bell diagonal states: Nonequivalence of classical and quantum distillation protocols

    SciTech Connect (OSTI)

    Kaszlikowski, Dagomir; Lim, J.Y.; Willeboordse, Frederick H.; Oi, D.K.L.; Gopinathan, Ajay; Kwek, L.C.

    2005-01-01

    We present a generalized tomographic quantum key distribution protocol in which the two parties share a Bell diagonal mixed state of two qubits. We show that if an eavesdropper performs a coherent measurement on many quantum ancilla states simultaneously, classical methods of secure key distillation are less effective than quantum entanglement distillation protocols. We also show that certain classes of Bell diagonal states are resistant to any attempt at incoherent eavesdropping.

  11. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X

  12. ITC Filing of Operational Protocols - August 9, 2011 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ITC Filing of Operational Protocols - August 9, 2011 ITC Filing of Operational Protocols - August 9, 2011 These supplemental comments complete ITC's response to the comments filed in this proceeding in March, 2009 by the Midwest Independent Transmission System Operator, Inc., and the Independent Electricity System Operator of Ontario. The operational agreements required to complete ITC's application in this case are attached to the supplemental comments, and ITC respectfully requests that the

  13. Measurement and verification protocols -- Facts and fiction, news from the field

    SciTech Connect (OSTI)

    Schiller, S.R.; Kromer, J.S.

    1998-07-01

    This paper provides descriptions of the 1997 International Performance Measurement and Verification Protocol (IPMVP), the 1996 Federal Energy Management Program's (FEMP) Measurement Verification Guidelines, and the draft ASHRAE 13-P Measurement of Energy and Demand Savings Guideline. These protocols and guidelines are establishing a framework for measurement and verification (M and V) activities throughout the world. The M and V protocols are also being used by the energy performance contracting industry as an educational tool and as the starting point for program specific M and V guidelines. Beyond descriptions of the documents the paper covers how the documents are being sued and the perspective of various user groups--such as government entities, utilities, private companies, and energy services companies. The protocols were designed around four main M and V options to allow flexibility in their application to different types of projects. However, this intentional flexibility has caused confusion among some users who are now required to select the appropriate option, method, level or rigor, and accuracy for their projects. Eventually though, as the protocols are more widely used and more documentation is available on M and V costs and accuracy the industry will become more comfortable selecting the best option and applying the M and V protocols in a more consistent manner for different types of projects and programs.

  14. Highly Scalable, UDP-Based Network Transport Protocols for Lambda Grids and 10 GE Routed Networks

    SciTech Connect (OSTI)

    PI: Robert Grossman Co-PI: Stephen Eick

    2009-08-04

    Summary of Report In work prior to this grant, NCDM developed a high performance data transport protocol called SABUL. During this grant, we refined SABUL’s functionality, and then extended both the capabilities and functionality and incorporated them into a new protocol called UDP-based Data transport Protocol, or UDT. We also began preliminary work on Composable UDT, a version of UDT that allows the user to choose among different congestion control algorithms and implement the algorithm of his choice at the time he compiles the code. Specifically, we: · Investigated the theoretical foundations of protocols similar to SABUL and UDT. · Performed design and development work of UDT, a protocol that uses UDP in both the data and control channels. · Began design and development work of Composable UDT, a protocol that supports the use of different congestion control algorithms by simply including the appropriate library when compiling the code. · Performed experimental studies using UDT and Composable UDT using real world applications such as the Sloan Digital Sky Survey (SDSS) astronomical data sets. · Released several versions of UDT and Composable, the most recent being v3.1.

  15. Remote monitoring using technologies from the Internet and World Wide Web

    SciTech Connect (OSTI)

    Puckett, J.M.; Burczyk, L.

    1997-11-01

    Recent developments in Internet technologies are changing and enhancing how one processes and exchanges information. These developments include software and hardware in support of multimedia applications on the World Wide Web. In this paper the authors describe these technologies as they have applied them to remote monitoring and show how they will allow the International Atomic Energy Agency to efficiently review and analyze remote monitoring data for verification of material movements. The authors have developed demonstration software that illustrates several safeguards data systems using the resources of the Internet and Web to access and review data. This Web demo allows the user to directly observe sensor data, to analyze simulated safeguards data, and to view simulated on-line inventory data. Future activities include addressing the technical and security issues associated with using the Web to interface with existing and planned monitoring systems at nuclear facilities. Some of these issues are authentication, encryption, transmission of large quantities of data, and data compression.

  16. Copy of Using Emulation and Simulation to Understand the Large-Scale Behavior of the Internet.

    SciTech Connect (OSTI)

    Adalsteinsson, Helgi; Armstrong, Robert C.; Chiang, Ken; Gentile, Ann C.; Lloyd, Levi; Minnich, Ronald G.; Vanderveen, Keith; Van Randwyk, Jamie A; Rudish, Don W.

    2008-10-01

    We report on the work done in the late-start LDRDUsing Emulation and Simulation toUnderstand the Large-Scale Behavior of the Internet. We describe the creation of a researchplatform that emulates many thousands of machines to be used for the study of large-scale inter-net behavior. We describe a proof-of-concept simple attack we performed in this environment.We describe the successful capture of a Storm bot and, from the study of the bot and furtherliterature search, establish large-scale aspects we seek to understand via emulation of Storm onour research platform in possible follow-on work. Finally, we discuss possible future work.3

  17. "Dark Fiber" Enables Research to Create Tomorrow's Internet | U.S.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE Office of Science (SC) "Dark Fiber" Enables Research to Create Tomorrow's Internet Advanced Scientific Computing Research (ASCR) ASCR Home About Research Facilities Science Highlights Benefits of ASCR Funding Opportunities Advanced Scientific Computing Advisory Committee (ASCAC) Community Resources Contact Information Advanced Scientific Computing Research U.S. Department of Energy SC-21/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-7486 F:

  18. Quantifying and Mapping the Digital Divide from an Internet Point of View

    SciTech Connect (OSTI)

    Cottrell, R.Les; Khan, Shahryar; Williams, Jerrod; Mehdi, Akbar; Kalim, Umar; Ali, Arshad; /NUST, Rawalpindi

    2008-09-18

    Quantitative knowledge of the magnitude, extent and trends of the Digital Divide are critical to understand and identify the regions most in need of help, to make rational decisions on how to address the problems and to make cases for executives, funding agencies and politicians. We report on a project (PingER) to measure the Digital Divide from the point of view of Internet performance. The PingER project has been measuring Internet performance since 1995 and with the increased emphasis on measuring and tracking the Digital Divide, it now covers over 700 hosts in over 150 countries that between them contain over 99% of the world's Internet connected population. In this paper we will describe the how PingER works, it deployment, the data analysis, and presentation. We also introduce a new PingER visualization tool (ViPER) that provides a more appealing interactive visualization of the PingER data and also works on mobile PDAs. We will also show results from PingER that illustrate the magnitude, extent and trends for the Digital Divide, and also compare PingER results with some human development and technology indices.

  19. Dynaically Responsive IP Window Coatings

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... (future scope) Subwavelength Structures: Mirin, et al., Nano Letters 9, 1255 (2009). ... at room temperature gives disordered nano-array * Heating expands and flattens film ...

  20. IP_Climate_Poster 121312

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Title: Northern New Mexico Climate, Water Year 2012 at Los Alamos National Laboratory, ... The water year is a more hydrologically sound measure of climate and hydrological activity ...

  1. IP_Climate_Poster 121312

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    671 Approved for public release; distribution is unlimited. Los Alamos National Laboratory, an affirmative action/equal opportunity employer, is operated by the Los Alamos National Security, LLC for the National Nuclear Security Administration of the U.S. Department of Energy under contract DE-AC52-06NA25396. By acceptance of this article, the publisher recognizes that the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this

  2. An RFC 1179 Compatible Remote Print Server for Windows 3.1

    Energy Science and Technology Software Center (OSTI)

    1993-11-09

    Internet RFC 1179 describes the protocol to be used for printing files on a remote printer in a TCP/IP network. The protocol is client/server, meaning that the client initiates the print request, and the server receives the request and performs the actual printing locally. This protocol has been in long use on Unix systems derived from the Berkeley Software Distribution, such as DEC''s Ultrix and Sun''s SunOS. LPD Services implements the server portion of thismore » protocol. It handles both the network communication and conformance with the protocol, and printing using the Microsoft Windows device independent printing interface.« less

  3. Application of the NREL Test-to-Failure Protocol for PV Modules

    SciTech Connect (OSTI)

    Hacke, P.; Osterwald, C.; Trudell, D.; Terwilliger, K.; Bosco, N.; Oelak, E.; Kurtz, S.

    2011-02-01

    Initial results of application of the NREL Test-to-Failure Protocol are presented and discussed. Six commercially available multicrystalline Si-cell flat-plate modules were subjected to the protocol with controls. The samples were divided among three test sequences, (1) 1000 hours of 85C/85% relative humidity with positive or negative 600 V bias to the active layers with respect to the grounded frame, (2) -40/85C thermal cycling with electrical load at the rated module power, and (3) an alternating sequence between tests (1) and (2). Application of the protocol manifested in the acceleration of degradation mechanisms seen in the field including backsheet delamination, corrosion, bubble formation within the laminate, discoloration of the antireflective coating, and localized heating with degradation of the backsheet as a result of moisture ingress, corrosion, and concentrated current flow. Significant differences in performance after one round of the protocol are seen in damp heat depending on the polarity of the bias applied to the active layer (the short-circuited power leads of the module). The protocol is found to successfully accelerate module degradation mechanisms that have been observed in the field and will help to differentiate the performance and reliability of various module technologies.

  4. Biosafety assessment protocols for new organisms in New Zealand: Can they apply internationally to emerging technologies?

    SciTech Connect (OSTI)

    Barratt, B.I.P. . E-mail: barbara.barratt@agresearch.co.nz; Moeed, A.; Malone, L.A.

    2006-05-15

    An analysis of established biosafety protocols for release into the environment of exotic plants and biological control agents for weeds and arthropod pests has been carried out to determine whether such protocols can be applied to relatively new and emerging technologies intended for the primary production industries, such as transgenic plants. Example case studies are described to indicate the scope of issues considered by regulators who make decisions on new organism releases. No transgenic plants have been released to date in New Zealand, but two field test approvals are described as examples. An analysis of the biosafety protocols has shown that, while many of the risk criteria considered for decision-making by regulators are similar for all new organisms, a case-by-case examination of risks and potential impacts is required in order to fully assess risk. The value of post-release monitoring and validation of decisions made by regulators is emphasised.

  5. Development of a dynamic quality assurance testing protocol for multisite clinical trial DCE-CT accreditation

    SciTech Connect (OSTI)

    Driscoll, B.; Keller, H.; Jaffray, D.; Coolens, C.; Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2; Techna Institute, University Health Network, 124-100 College Street, Toronto, Ontario M5G 1L5

    2013-08-15

    Purpose: Credentialing can have an impact on whether or not a clinical trial produces useful quality data that is comparable between various institutions and scanners. With the recent increase of dynamic contrast enhanced-computed tomography (DCE-CT) usage as a companion biomarker in clinical trials, effective quality assurance, and control methods are required to ensure there is minimal deviation in the results between different scanners and protocols at various institutions. This paper attempts to address this problem by utilizing a dynamic flow imaging phantom to develop and evaluate a DCE-CT quality assurance (QA) protocol.Methods: A previously designed flow phantom, capable of producing predictable and reproducible time concentration curves from contrast injection was fully validated and then utilized to design a DCE-CT QA protocol. The QA protocol involved a set of quantitative metrics including injected and total mass error, as well as goodness of fit comparison to the known truth concentration curves. An additional region of interest (ROI) sensitivity analysis was also developed to provide additional details on intrascanner variability and determine appropriate ROI sizes for quantitative analysis. Both the QA protocol and ROI sensitivity analysis were utilized to test variations in DCE-CT results using different imaging parameters (tube voltage and current) as well as alternate reconstruction methods and imaging techniques. The developed QA protocol and ROI sensitivity analysis was then applied at three institutions that were part of clinical trial involving DCE-CT and results were compared.Results: The inherent specificity of robustness of the phantom was determined through calculation of the total intraday variability and determined to be less than 2.2 1.1% (total calculated output contrast mass error) with a goodness of fit (R{sup 2}) of greater than 0.99 0.0035 (n= 10). The DCE-CT QA protocol was capable of detecting significant deviations from the

  6. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    SciTech Connect (OSTI)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-06-15

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds.

  7. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    SciTech Connect (OSTI)

    Zhang, J; Adams, C; Lumby, C; Dillon, J; Woods, E; Richer, E

    2014-06-01

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatric patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to

  8. Demand-side management program evaluation and the EPA Conservation Verification Protocols. Final report

    SciTech Connect (OSTI)

    Willems, P.; Ciraulo, J.; Smith, B.

    1993-11-01

    The US Environmental Protection Agency (EPA) Conservation Verification Protocols (CVPs) are a set of step-by-step procedures for impact monitoring and evaluation of electric utility demand-side management (DSM) programs. The EPA developed these protocols as part of its mission to implement the Acid Rain Program authorized by Title IV of the Clean Air Amendments of 1990. This report provides an overview of the CVPs and how they can be used by electric utilities in DSM program monitoring and evaluation. Both the CVPs Monitoring Path and Stipulated Path procedures are summarized and reviewed. Several examples are provided to illustrate how to calculate DSM program energy savings using the CVPSs.

  9. Calibration and data collection protocols for reliable lattice parameter values in electron pair distribution function studies

    SciTech Connect (OSTI)

    Abeykoon, A. M. Milinda; Hu, Hefei; Wu, Lijun; Zhu, Yimei; Billinge, Simon J. L.

    2015-01-30

    Different protocols for calibrating electron pair distribution function (ePDF) measurements are explored and described for quantitative studies on nanomaterials. It is found that the most accurate approach to determine the camera length is to use a standard calibration sample of Au nanoparticles from the National Institute of Standards and Technology. Different protocols for data collection are also explored, as are possible operational errors, to find the best approaches for accurate data collection for quantitative ePDF studies.

  10. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.; Rauch, Emily M.; Hathaway, John E.; Solana, Amy E.

    2009-03-27

    This protocol was written for the Department of Energys Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated many questions on the performance and operational cost of these buildings.

  11. Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirements for Cycling Testing and Its Effects on Type 3 and 4 Containers | Department of Energy Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR Requirements for Cycling Testing and Its Effects on Type 3 and 4 Containers Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR Requirements for Cycling Testing and Its Effects on Type 3 and 4 Containers These slides were presented at the International Hydrogen Fuel and Pressure Vessel Forum on September 27 - 29, 2010,

  12. Cyberspace modernization :

    SciTech Connect (OSTI)

    Keliiaa, Curtis M.; McLane, Victor N.

    2014-07-01

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internet of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.

  13. Protocols for Monitoring Habitat Restoration Projects in the Lower Columbia River and Estuary

    SciTech Connect (OSTI)

    Roegner, G. Curtis; Diefenderfer, Heida L.; Borde, Amy B.; Thom, Ronald M.; Dawley, Earl M.; Whiting, Allan H.; Zimmerman, Shon A.; Johnson, Gary E.

    2008-04-25

    Protocols for monitoring salmon habitat restoration projects are essential for the U.S. Army Corps of Engineers' environmental efforts in the Columbia River estuary. This manual provides state-of-the science data collection and analysis methods for landscape features, water quality, and fish species composition, among others.

  14. Protocol for DOE-VPP Star Site Re-certification Reviews

    Broader source: Energy.gov [DOE]

    This document provides the overall policy and the procedural protocols that will be utilized by the Office of Environment, Safety and Health in conducting re-certification reviews of facilities participating in the Department of Energy Voluntary Protection Program (DOE-VPP) at the Star recognition level.

  15. Towards an improved LAI collection protocol via simulated field-based PAR sensing

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Yao, Wei; Van Leeuwen, Martin; Romanczyk, Paul; van Aardt, Jan; Kelbe, David

    2016-07-14

    In support of NASA’s next-generation spectrometer—the Hyperspectral Infrared Imager (HyspIRI)—we are working towards assessing sub-pixel vegetation structure from imaging spectroscopy data. Of particular interest is Leaf Area Index (LAI), which is an informative, yet notoriously challenging parameter to efficiently measure in situ. While photosynthetically-active radiation (PAR) sensors have been validated for measuring crop LAI, there is limited literature on the efficacy of PAR-based LAI measurement in the forest environment. This study (i) validates PAR-based LAI measurement in forest environments, and (ii) proposes a suitable collection protocol, which balances efficiency with measurement variation, e.g., due to sun flecks and various-sized canopymore » gaps. A synthetic PAR sensor model was developed in the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model and used to validate LAI measurement based on first-principles and explicitly-known leaf geometry. Simulated collection parameters were adjusted to empirically identify optimal collection protocols. Furthermore, these collection protocols were then validated in the field by correlating PAR-based LAI measurement to the normalized difference vegetation index (NDVI) extracted from the “classic” Airborne Visible Infrared Imaging Spectrometer (AVIRIS-C) data (R2 was 0.61). The results indicate that our proposed collecting protocol is suitable for measuring the LAI of sparse forest (LAI < 3–5 ( m2/m2)).« less

  16. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report

    SciTech Connect (OSTI)

    Not Available

    1993-09-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

  17. Analysis of the Impacts of an Early Start for Compliance with the Kyoto Protocol

    Reports and Publications (EIA)

    1999-01-01

    This report describes the Energy Information Administration's analysis of the impacts of an early start, using the same methodology as in Impacts of the Kyoto Protocol on U.S. Energy Markets and Economic Activity, with only those changes in assumptions caused by the early start date.

  18. Chapter 7, Refrigerator Recycling Evaluation Protocol: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Refrigerator Recycling Evaluation Protocol Doug Bruchs and Josh Keeling, The Cadmus Group, Inc. Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 7 - 1 Chapter 7 - Table of Contents 1 Measure Description .............................................................................................................. 2 2 Application Conditions of Protocol

  19. Report of the Federal Internetworking Requirements Panel

    SciTech Connect (OSTI)

    1994-05-31

    The Federal Internetworking Requirements Panel (FIRP) was established by the National Institute of Standards and Technology (NIST) to reassess Federal requirements for open systems networks and to recommend policy on the Government`s use of networking standards. The Panel was chartered to recommend actions which the Federal Government can take to address the short and long-term issues of interworking and convergence of networking protocols--particularly the Internet Protocol Suite (IPS) and Open Systems Interconnection (OSI) protocol suite and, when appropriate, proprietary protocols. The Panel was created at the request of the Office of Management and Budget in collaboration with the Federal Networking Council and the Federal Information Resources Management Policy Council. The Panel`s membership and charter are contained in an appendix to this report.

  20. 1D GAS-DYNAMIC SIMULATION OF SHOCK-WAVE PROCESSES VIA INTERNET

    SciTech Connect (OSTI)

    Khishchenko, K. V.; Levashov, P. R.; Povarnitsyn, M. E.; Zakharenkov, A. S.

    2009-12-28

    We present a Web-interface for 1D simulation of different shock-wave experiments. The choosing of initial parameters, the modeling itself and output data treatment can be made directly via the Internet. The interface is based upon the expert system on shock-wave data and equations of state and contains both the Eulerian and Lagrangian Godunov hydrocodes. The availability of equations of state for a broad set of substances makes this system a useful tool for planning and interpretation of shock-wave experiments. As an example of simulation with the system, results of modeling of multistep shock loading of potassium between polytetrafluoroethylene and stainless steel plates are presented in comparison with experimental data from Shakhray et al.(2005).

  1. Minutes of the coordination workshop on DOE nuclear data program services via the internet

    SciTech Connect (OSTI)

    Smith, D.L.; Dunford, C.L.

    1996-11-01

    This workshop was convened to explore what is currently being done in the area of data dissemination via the Internet and to examine ways that future activities in this area within the U.S. nuclear data programs can be better coordinated. Overview talks on the current status, from both the national and international perspectives, were provided. Following these, there were presentations on specific activities in the area of Internet data dissemination which are taking place at seven different institutions. Institutions represented at this meeting were asked to provide written summaries of their programs before the meeting. The talks included actual demonstrations of the electronic methodologies which are under development at these laboratories, and they highlighted the richness and creativity of these programs. This information proved to be very useful in the ensuing general discussions. The main issues that were addressed at this meeting were: (i) how to adapt to rapid evolution of data management and dissemination technologies, (ii) how to provide outside users with some sense of unity in the U.S. nuclear data program and to develop consistent, user-friendly ways to access data without discouraging individual initiatives and the richness which comes from diversity, (iii) how to maintain quality control over the information and services provided, (iv) how to progress in a era of very restrictive budgets, (v) how to effectively merge the nuclear structure and nuclear reaction data dissemination activities while at the same time recognizing and respecting their inherent differences, (vi) how to organize the stewardship of nuclear data and the processes of nuclear data dissemination in an efficient, technically advanced and yet cost effective manner, and (vii) how the data processing tasks should be allocated between server and client computers.

  2. Analysis of the Quality of Information Obtained About Uterine Artery Embolization From the Internet

    SciTech Connect (OSTI)

    Tavare, Aniket N.; Alsafi, Ali Hamady, Mohamad S.

    2012-12-15

    Purpose: The Internet is widely used by patients to source health care-related information. We sought to analyse the quality of information available on the Internet about uterine artery embolization (UAE). Materials and Methods: We searched three major search engines for the phrase 'uterine artery embolization' and compiled the top 50 results from each engine. After excluding repeated sites, scientific articles, and links to documents, the remaining 50 sites were assessed using the LIDA instrument, which scores sites across the domains of accessibility, usability, and reliability. The Fleisch reading ease score (FRES) was calculated for each of the sites. Finally, we checked the country of origin and the presence of certification by the Health On the Net Foundation (HONcode) as well as their effect on LIDA and FRES scores.ResultsThe following mean scores were obtained: accessibility 48/60 (80%), usability 42/54 (77%), reliability 20/51 (39%), total LIDA 110/165 (67%), and FRES 42/100 (42%). Nine sites had HONcode certification, and this was associated with significantly greater (p < 0.05) reliability and total LIDA and FRES scores. When comparing sites between United Kingdom and United States, there was marked variation in the quality of results obtained when searching for information on UAE (p < 0.05). Conclusion: In general, sites were well designed and easy to use. However, many scored poorly on the reliability of their information either because they were produced in a non-evidence-based way or because they lacking currency. It is important that patients are guided to reputable, location-specific sources of information online, especially because prominent search engine rank does not guarantee reliability of information.

  3. Cactus and Visapult: A case study of ultra-high performance distributed visualization using connectionless protocols

    SciTech Connect (OSTI)

    Shalf, John; Bethel, E. Wes

    2002-05-07

    This past decade has seen rapid growth in the size, resolution, and complexity of Grand Challenge simulation codes. Many such problems still require interactive visualization tools to make sense of multi-terabyte data stores. Visapult is a parallel volume rendering tool that employs distributed components, latency tolerant algorithms, and high performance network I/O for effective remote visualization of massive datasets. In this paper we discuss using connectionless protocols to accelerate Visapult network I/O and interfacing Visapult to the Cactus General Relativity code to enable scalable remote monitoring and steering capabilities. With these modifications, network utilization has moved from 25 percent of line-rate using tuned multi-streamed TCP to sustaining 88 percent of line rate using the new UDP-based transport protocol.

  4. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    SciTech Connect (OSTI)

    Fortes, Raphael; Rigolin, Gustavo

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: Optimal direct teleportation protocols using directly partially entangled states. We put in a single formalism all strategies of direct teleportation. We extend these techniques for multipartite partially entangle states. We give upper bounds for the optimal efficiency of these protocols.

  5. Sandia to Discuss Energy-Storage Test Protocols at the European PV Solar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Conference Discuss Energy-Storage Test Protocols at the European PV Solar Energy Conference - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization

  6. A protocol for lifetime energy and environmental impact assessment of building insulation materials

    SciTech Connect (OSTI)

    Shrestha, Som S. Biswas, Kaushik; Desjarlais, Andre O.

    2014-04-01

    This article describes a proposed protocol that is intended to provide a comprehensive list of factors to be considered in evaluating the direct and indirect environmental impacts of building insulation materials, as well as detailed descriptions of standardized calculation methodologies to determine those impacts. The energy and environmental impacts of insulation materials can generally be divided into two categories: (1) direct impact due to the embodied energy of the insulation materials and other factors and (2) indirect or environmental impacts avoided as a result of reduced building energy use due to addition of insulation. Standards and product category rules exist, which provide guidelines about the life cycle assessment (LCA) of materials, including building insulation products. However, critical reviews have suggested that these standards fail to provide complete guidance to LCA studies and suffer from ambiguities regarding the determination of the environmental impacts of building insulation and other products. The focus of the assessment protocol described here is to identify all factors that contribute to the total energy and environmental impacts of different building insulation products and, more importantly, provide standardized determination methods that will allow comparison of different insulation material types. Further, the intent is not to replace current LCA standards but to provide a well-defined, easy-to-use comparison method for insulation materials using existing LCA guidelines. - Highlights: We proposed a protocol to evaluate the environmental impacts of insulation materials. The protocol considers all life cycle stages of an insulation material. Both the direct environmental impacts and the indirect impacts are defined. Standardized calculation methods for the avoided operational energy is defined. Standardized calculation methods for the avoided environmental impact is defined.

  7. Field Test Protocol. Standard Internal Load Generation for Unoccupied Test Homes

    SciTech Connect (OSTI)

    Fang, X.; Christensen, D.; Barker, G.; Hancock, E.

    2011-06-01

    This document describes a simple and general way to generate House Simulation Protocol (HSP)-consistent internal sensible and latent loads in unoccupied homes. It is newly updated based on recent experience, and provides instructions on how to calculate and set up the operational profiles in unoccupied homes. The document is split into two sections: how to calculate the internal load magnitude and schedule, and then what tools and methods should be used to generate those internal loads to achieve research goals.

  8. Field Test Protocol: Standard Internal Load Generation in Unoccupied Test Homes

    SciTech Connect (OSTI)

    Fang, X.; Christensen, D.; Barker, G.; Hancock, E.

    2011-06-01

    This document describes a simple and general way to generate House Simulation Protocol (HSP)-consistent internal sensible and latent loads in unoccupied homes. It is newly updated based on recent experience, and provides instructions on how to calculate and set up the operational profiles in unoccupied homes. The document is split into two sections: how to calculate the internal load magnitude and schedule, and then what tools and methods should be used to generate those internal loads to achieve research goals.

  9. Optimizing a dynamical decoupling protocol for solid-state electronic spin ensembles in diamond

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Farfurnik, D.; Jarmola, A.; Pham, L. M.; Wang, Z. H.; Dobrovitski, V. V.; Walsworth, R. L.; Budker, D.; Bar-Gill, N.

    2015-08-24

    In this study, we demonstrate significant improvements of the spin coherence time of a dense ensemble of nitrogen-vacancy (NV) centers in diamond through optimized dynamical decoupling (DD). Cooling the sample down to 77 K suppresses longitudinal spin relaxation T1 effects and DD microwave pulses are used to increase the transverse coherence time T2 from ~0.7ms up to ~30ms. Furthermore, we extend previous work of single-axis (Carr-Purcell-Meiboom-Gill) DD towards the preservation of arbitrary spin states. Following a theoretical and experimental characterization of pulse and detuning errors, we compare the performance of various DD protocols. We also identify that the optimal controlmore » scheme for preserving an arbitrary spin state is a recursive protocol, the concatenated version of the XY8 pulse sequence. The improved spin coherence might have an immediate impact on improvements of the sensitivities of ac magnetometry. Moreover, the protocol can be used on denser diamond samples to increase coherence times up to NV-NV interaction time scales, a major step towards the creation of quantum collective NV spin states.« less

  10. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  11. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Bray, Kathryn L.; Conover, David R.; Kintner-Meyer, Michael CW; Viswanathan, Vijayganesh; Ferreira, Summer; Rose, David; Schoenwald, David

    2012-10-01

    The U.S. Department of Energy’s Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of EESs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  12. Protocol for uniformly measuring and expressing the performance of energy storage systems.

    SciTech Connect (OSTI)

    Ferreira, Summer Rhodes; Rose, David Martin; Schoenwald, David Alan; Bray, Kathy; Conover, David; Kintner-Meyer, Michael; Viswanathan, Vilayanur

    2013-08-01

    The U.S. Department of Energy's Energy Storage Systems (ESS) Program, through the support of Pacific Northwest National Laboratory (PNNL) and Sandia National Laboratories (SNL), facilitated the development of the protocol provided in this report. The focus of the protocol is to provide a uniform way of measuring, quantifying, and reporting the performance of ESSs in various applications; something that does not exist today and, as such, is hampering the consideration and use of this technology in the market. The availability of an application-specific protocol for use in measuring and expressing performance-related metrics of ESSs will allow technology developers, power-grid operators and other end-users to evaluate the performance of energy storage technologies on a uniform and comparable basis. This will help differentiate technologies and products for specific application(s) and provide transparency in how performance is measured. It also will assist utilities and other consumers of ESSs to make more informed decisions as they consider the potential application and use of ESSs, as well as form the basis for documentation that might be required to justify utility investment in such technologies.

  13. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  14. Optimizing a dynamical decoupling protocol for solid-state electronic spin ensembles in diamond

    SciTech Connect (OSTI)

    Farfurnik, D.; Jarmola, A.; Pham, L. M.; Wang, Z. H.; Dobrovitski, V. V.; Walsworth, R. L.; Budker, D.; Bar-Gill, N.

    2015-08-24

    In this study, we demonstrate significant improvements of the spin coherence time of a dense ensemble of nitrogen-vacancy (NV) centers in diamond through optimized dynamical decoupling (DD). Cooling the sample down to 77 K suppresses longitudinal spin relaxation T1 effects and DD microwave pulses are used to increase the transverse coherence time T2 from ~0.7ms up to ~30ms. Furthermore, we extend previous work of single-axis (Carr-Purcell-Meiboom-Gill) DD towards the preservation of arbitrary spin states. Following a theoretical and experimental characterization of pulse and detuning errors, we compare the performance of various DD protocols. We also identify that the optimal control scheme for preserving an arbitrary spin state is a recursive protocol, the concatenated version of the XY8 pulse sequence. The improved spin coherence might have an immediate impact on improvements of the sensitivities of ac magnetometry. Moreover, the protocol can be used on denser diamond samples to increase coherence times up to NV-NV interaction time scales, a major step towards the creation of quantum collective NV spin states.

  15. Results of an emergency response atmospheric dispersion model comparison using a state accepted statistical protocol

    SciTech Connect (OSTI)

    Ciolek, J.T. Jr.

    1993-10-01

    The Rocky Flats Plant, located approximately 26 km northwest of downtown Denver, Colorado, has developed an emergency response atmospheric dispersion model for complex terrain applications. Plant personnel would use the model, known as the Terrain-Responsive Atmospheric Code (TRAC) (Hodgin 1985) to project plume impacts and provide off-site protective action recommendations to the State of Colorado should a hazardous material release occur from the facility. The Colorado Department of Health (CDH) entered into an interagency agreement with the Rocky Flats Plant prime contractor, EG&G Rocky Flats, and the US Department of Energy to evaluate TRAC as an acceptable emergency response tool. After exhaustive research of similar evaluation processes from other emergency response and regulatory organizations, the interagency committee devised a formal acceptance process. The process contains an evaluation protocol (Hodgin and Smith 1992), descriptions of responsibilities, an identified experimental data set to use in the evaluation, and judgment criteria for model acceptance. The evaluation protocol is general enough to allow for different implementations. This paper explains one implementation, shows protocol results for a test case, and presents results of a comparison between versions of TRAC with different wind Field codes: a two dimensional mass consistent code called WINDS (Fosberg et al. 1976) that has been extended to three dimensions, and a fully 3 dimensional mass conserving code called NUATMOS (Ross and Smith 1987, Ross et al. 1988).

  16. Implications of Export/Import Reporting Requirements in the United States - International Atomic Energy Agency Safeguards Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Benjamin, Eugene L.; McNair, Gary W.

    2001-02-20

    The United States has signed but not ratified the US/IAEA Safeguards Additional Protocol. If ratified, the Additional Protocol will require the US to report to the IAEA certain nuclear-related exports and imports to the IAEA. This document identifies and assesses the issues associated with the US making those reports. For example, some regulatory changes appear to be necessary. The document also attempts to predict the impact on the DOE Complex by assessing the historical flow of exports and imports that would be reportable if the Additional Protocol were in force.

  17. Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for QAP/QIP Review March 2010 1 Table of Content 1.1 Overview ............................................................................................................................................... 2 1.2 Purpose .................................................................................................................................................. 2 1.3 EM-HQ Corporate Review Process

  18. Calibration and data collection protocols for reliable lattice parameter values in electron pair distribution function (ePDF) studies

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Abeykoon, A. M. Milinda; Hu, Hefei; Wu, Lijun; Zhu, Yimei; Billinge, Simon J. L.

    2015-02-01

    We explore and describe different protocols for calibrating electron pair distribution function (ePDF) measurements for quantitative studies on nano-materials. We find the most accurate approach to determine the camera-length is to use a standard calibration sample of Au nanoparticles from National Institute of Standards and Technology. Different protocols for data collection are also explored, as are possible operational errors, to find the best approaches for accurate data collection for quantitative ePDF studies.

  19. N-Terminal Enrichment: Developing a Protocol to Detect Specific Proteolytic Fragments

    SciTech Connect (OSTI)

    Schepmoes, Athena A.; Zhang, Qibin; Petritis, Brianne O.; Qian, Weijun; Smith, Richard D.

    2009-12-01

    Proteolytic processing events are essential to physiological processes such as reproduction, development, and host responses, as well as regulating proteins in cancer; therefore, there is a significant need to develop robust approaches for characterizing such events. The current mass spectrometry (MS)-based proteomics techniques employs a “bottom-up” strategy, which does not allow for identification of different proteolytic proteins since the strategy measures all the small peptides from any given protein. The aim of this development is to enable the effective identification of specific proteolytic fragments. The protocol utilizes an acetylation reaction to block the N-termini of a protein, as well as any lysine residues. Following digestion, N-terminal peptides are enriched by removing peptides that contain free amines, using amine-reactive silica-bond succinic anhydride beads. The resulting enriched sample has one N-terminal peptide per protein, which reduces sample complexity and allows for increased analytical sensitivity compared to global proteomics.1 We initially compared the peptide identification and efficiency of blocking lysine using acetic anhydride (a 42 Da modification) or propionic anhydride (a 56 Da modification) in our protocol. Both chemical reactions resulted in comparable peptide identifications and *95 percent efficiency for blocking lysine residues. However, the use of propionic anhydride allowed us to distinguish in vivo acetylated peptides from chemically-tagged peptides.2 In an initial experiment using mouse plasma, we were able to identify *300 unique N-termini peptides, as well as many known cleavage sites. This protocol holds potential for uncovering new information related to proteolytic pathways, which will assist our understanding about cancer biology and efforts to identify potential biomarkers for various diseases.

  20. AVTA: EVSE Charging Protocol for On and Off-Peak Demand

    Broader source: Energy.gov [DOE]

    The Vehicle Technologies Office's Advanced Vehicle Testing Activity carries out testing on a wide range of advanced vehicles and technologies on dynamometers, closed test tracks, and on-the-road. These results provide benchmark data that researchers can use to develop technology models and guide future research and development. The following report is a description of development of a charge protocol to take advantage of off and on-peak demand economics at facilities, as informed by the AVTA's testing on plug-in electric vehicle charging equipment. This research was conducted by Idaho National Laboratory.

  1. The evaluation of an analytical protocol for the determination of substances in waste for hazard classification

    SciTech Connect (OSTI)

    Hennebert, Pierre; Papin, Arnaud; Padox, Jean-Marie; Hasebrouck, Benoît

    2013-07-15

    Highlights: • Knowledge of wastes in substances will be necessary to assess HP1–HP15 hazard properties. • A new analytical protocol is proposed for this and tested by two service laboratories on 32 samples. • Sixty-three percentage of the samples have a satisfactory analytical balance between 90% and 110%. • Eighty-four percentage of the samples were classified identically (Seveso Directive) for their hazardousness by the two laboratories. • The method, in progress, is being normalized in France and is be proposed to CEN. - Abstract: The classification of waste as hazardous could soon be assessed in Europe using largely the hazard properties of its constituents, according to the the Classification, Labelling and Packaging (CLP) regulation. Comprehensive knowledge of the component constituents of a given waste will therefore be necessary. An analytical protocol for determining waste composition is proposed, which includes using inductively coupled plasma (ICP) screening methods to identify major elements and gas chromatography/mass spectrometry (GC–MS) screening techniques to measure organic compounds. The method includes a gross or indicator measure of ‘pools’ of higher molecular weight organic substances that are taken to be less bioactive and less hazardous, and of unresolved ‘mass’ during the chromatography of volatile and semi-volatile compounds. The concentration of some elements and specific compounds that are linked to specific hazard properties and are subject to specific regulation (examples include: heavy metals, chromium(VI), cyanides, organo-halogens, and PCBs) are determined by classical quantitative analysis. To check the consistency of the analysis, the sum of the concentrations (including unresolved ‘pools’) should give a mass balance between 90% and 110%. Thirty-two laboratory samples comprising different industrial wastes (liquids and solids) were tested by two routine service laboratories, to give circa 7000 parameter

  2. Interactive, Internet Delivery of Scientific Visualization viaStructured, Prerendered Multiresolution Imagery

    SciTech Connect (OSTI)

    Chen, Jerry; Yoon, Ilmi; Bethel, E. Wes

    2005-04-20

    We present a novel approach for highly interactive remote delivery of visualization results. Instead of real-time rendering across the internet, our approach, inspired by QuickTime VR's Object Movieconcept, delivers pre-rendered images corresponding to different viewpoints and different time steps to provide the experience of 3D and temporal navigation. We use tiled, multiresolution image streaming to consume minimum bandwidth while providing the maximum resolution that a user can perceive from a given viewpoint. Since image data, a viewpoint and time stamps are the only required inputs, our approach is generally applicable to all visualization and graphics rendering applications capable of generating image files in an ordered fashion. Our design is a form of latency-tolerant remote visualization, where visualization and Rendering time is effectively decoupled from interactive exploration. Our approach trades off increased interactivity, flexible resolution (for individual clients), reduced load and effective reuse of coherent frames between multiple users (from the servers perspective) at the expense of unconstrained exploration. A normal web server is the vehicle for providing on-demand images to the remote client application, which uses client-pull to obtain and cache only those images required to fulfill the interaction needs. This paper presents an architectural description of the system along with a performance characterization for stage of production, delivery and viewing pipeline.

  3. GREEN + IDMaps: A practical soulution for ensuring fairness in a biased internet

    SciTech Connect (OSTI)

    Kapadia, A. C.; Thulasidasan, S.; Feng, W. C.

    2002-01-01

    GREEN is a proactive queue-management (PQM) algorithm that removes TCP's bias against connections with longer round-trip times, while maintaining high link utilization and low packet-loss. GREEN applies knowledge of the steady-state behavior of TCP connections to proactively drop packets, thus preventing congestion from ever occurring. As a result, GREEN ensures much higher fairness between flows than other active queue management schemes like Flow Random Early Drop (FRED) and Stochastic Fair Blue (SFB), which suffer in topologies where a large number of flows have widely varying round-trip times. GREEN'S performance relies on its ability to gauge a flow's round-trip time (RTT). In previous work, we presented results for an ideal GREEN router which has accurate RTT information for a flow. In this paper, we present a practical solution based on IDMaps, an Internet distance-estimation service, and compare its performance to an ideal GREEN router. We show that a solution based on IDMaps is practical and maintains high fairness and link utilization, and low packet-loss rates.

  4. A Protocol for Lifetime Energy and Environmental Impact Assessment of Building Insulation Materials

    SciTech Connect (OSTI)

    Shrestha, Som S; Biswas, Kaushik; Desjarlais, Andre Omer

    2014-01-01

    This article describes a proposed protocol that is intended to provide a comprehensive list of factors to be considered in evaluating the direct and indirect environmental impacts of building insulation materials, as well as detailed descriptions of standardized calculation methodologies to determine those impacts. The energy and environmental impacts of insulation materials can generally be divided into two categories: (1) direct impact due to the embodied energy of the insulation materials and other factors, and (2) indirect or environmental impacts avoided as a result of reduced building energy use due to addition of insulation. Standards and product category rules exist that provide guidelines about the life cycle assessment (LCA) of materials, including building insulation products. However, critical reviews have suggested that these standards fail to provide complete guidance to LCA studies and suffer from ambiguities regarding the determination of the environmental impacts of building insulation and other products. The focus of the assessment protocol described here is to identify all factors that contribute to the total energy and environmental impacts of different insulation products and, more importantly, provide standardized determination methods that will allow comparison of different insulation material types. Further, the intent is not to replace current LCA standards but to provide a well-defined, easy-to-use comparison method for insulation materials using existing LCA guidelines.

  5. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    SciTech Connect (OSTI)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  6. Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)

    SciTech Connect (OSTI)

    Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

    2013-08-09

    The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

  7. Solving iTOUGH2 simulation and optimization problems using the PEST protocol

    SciTech Connect (OSTI)

    Finsterle, S.A.; Zhang, Y.

    2011-02-01

    The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstrate the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.

  8. Protocol for Appraisal of Petroleum Producing Properties on Native American Tribal Lands

    SciTech Connect (OSTI)

    1999-04-27

    Petroleum is currently produced on Native American Tribal Lands and has been produced on some of these lands for approximately 100 years. As these properties are abandoned at a production level that is considered the economic limit by the operator, Native American Tribes are considering this an opportunity to assume operator status to keep the properties producing. In addition to operating properties as they are abandoned, Native American Tribes also are assuming liabilities of the former operator(s) and ownership of equipment left upon abandonment. Often, operators are assumed by Native American Tribes without consideration of the liabilities left by the former operators. The purpose of this report is to provide protocols for the appraisal of petroleum producing properties and analysis of the petroleum resource to be produced after assuming operations. The appraisal protocols provide a spreadsheet for analysis of the producing property and a checklist of items to bring along before entering the property for onsite appraisal of the property. The report will provide examples of some environmental flags that may indicate potential liabilities remaining on the property left unaddressed by previous operators. It provides a starting point for appraisal and analysis of a property with a basis to make the decision to assume operations or to pursue remediation and/or closure of the liabilities of previous operators.

  9. Protocol for laboratory research on degradation, interaction, and fate of wastes disposed by deep-well injection: Final report

    SciTech Connect (OSTI)

    Collins, A.G.; Crocker, M.E.

    1987-12-01

    The objective of this research investigation was to develop a laboratory protocol for use in determining degradation, interaction, and fate of organic wastes disposed in deep subsurface reservoirs via disposal wells. Knowledge of the ultimate fate of deep-well disposed wastes is important because provisions of the Resource Conservation and Recovery Act (RCRA) require that by August 1988, the Environmental Protection Agency (EPA) must show that the disposal of specified wastes by deep-well injection is safe to human health and the environment, or the practice must be stopped. The National Institute for Petroleum and Energy Research (NIPER) developed this protocol primarily by transferring some of its expertise and knowledge of laboratory protocol relevant to improved recovery of petroleum. Phenol, because it is injected into deep, subsurface reservoirs for disposal, was selected for study by the EPA. Phenol is one waste product that has been injected into the Frio formation; therefore, a decision was made to use phenol and sedimentary rock from the Frio formation for a series of laboratory experiments to demonstrate the protocol. This study investigates the adsorption properties of a specific reservoir rock which is representative of porous sedimentary geologic formations used as repositories for hazardous organic wastes. The developed protocol can be used to evaluate mobility, adsorption, and degradation of an organic hazardous waste under simulated subsurface reservoir conditions. 22 refs., 13 figs., 16 tabs.

  10. An Internet-based interactive module for air emissions from fossil fuel based power generation

    SciTech Connect (OSTI)

    Karman, D.; O`Leary, K.; O`Reilly, S.

    1997-12-31

    The proliferation of the Internet, Web pages and associated software tools available for developing multimedia material provides significant opportunities in training, education and information transfer. This paper will describe the development, testing and evaluation of an interactive teaching module aimed at college and university students that have previous education in thermodynamics and basic chemistry. The module is currently in development at the Department of Civil and Environmental Engineering at Carleton University with support from Environment Canada. Preliminary testing of this module is expected to begin late January. The module contains options to look at CO, CO{sub 2}, SO{sub 2} and NO{sub x} emissions associated with electric power generation in thermal stations that use coal, natural gas, crude and distillate oil. Factors governing the thermal efficiency of typical boiler systems and the thermodynamic limitations for converting heat into work are discussed. Supporting background information such as emission trends and emission factors used in calculations are also included as part of this module. A simple Rankine cycle without reheat or regeneration is considered to compare the emissions per unit energy delivered from each of the fuels considered. For natural gas and distillate oil, combined cycle operation is considered with a gas turbine-heat recovery steam generator combination replacing the boiler in the simple Rankine cycle. For all fuels, the cogeneration option is investigated by expanding the steam to an intermediate pressure in the turbine and utilizing the remaining heat by condensing the steam in a heat recovery application. Emission factors and basic information on CO, SO{sub 2} and NO{sub x} control technologies are utilized to calculate and report the emissions per unit energy delivered under the various scenarios investigated.

  11. A protocol for EBT3 radiochromic film dosimetry using reflection scanning

    SciTech Connect (OSTI)

    Papaconstadopoulos, Pavlos Hegyi, Gyorgy; Seuntjens, Jan; Devic, Slobodan

    2014-12-15

    Purpose: To evaluate the performance of the EBT3 radiochromic film dosimetry system using reflection measurements and to suggest a calibration protocol for precise and accurate reflection film dosimetry. Methods: A set of 14 Gafchromic EBT3 film pieces were irradiated to various doses ranging from 0 to 8 Gy and subsequently scanned using both the reflection and transmission mode. Scanning resolution varied from 50 to 508 dpi (0.5–0.05 mm/pixel). Both the red and green color channels of scanned images were used to relate the film response to the dose. A sensitivity, uncertainty, and accuracy analysis was performed for all scanning modes and color channels. The total uncertainty, along with the fitting and experimental uncertainty components, was identified and analyzed. A microscope resolution target was used to evaluate possible resolution losses under reflection scanning. The calibration range was optimized for reflection scanning in the low (<2 Gy) and high (>2 Gy) dose regions based on the reported results. Results: Reflection scanning using the red channel exhibited the highest sensitivity among all modes, being up to 150% higher than transmission mode in the red channel for the lowest dose level. Furthermore, there was no apparent loss in resolution between the two modes. However, higher uncertainties and reduced accuracy were observed for the red channel under reflection mode, especially at dose levels higher than 2 Gy. These uncertainties were mainly attributed to saturation effects which were translated in poor fitting results. By restricting the calibration to the 0–2 Gy dose range, the situation is reversed and the red reflection mode was superior to the transmission mode. For higher doses, the green channel in reflection mode presented comparable results to the red transmission. Conclusions: A two-color reflection scanning protocol can be suggested for EBT3 radiochromic film dosimetry using the red channel for doses less than 2 Gy and the green

  12. SU-E-J-07: A Functional MR Protocol for the Pancreatic Tumor Delineation

    SciTech Connect (OSTI)

    Andreychenko, A; Heerkens, H; Meijer, G; Vulpen, M van; Lagendijk, J; Berg, C van den

    2014-06-01

    Purpose: Pancreatic cancer is one of the cancers with the poorest survival prognosis. At the time of diagnosis most of pancreatic cancers are unresectable and those patients can be treated by radiotherapy. Radiotherapy for pancreatic cancer is limited due to uncertainties in CT-based delineations. MRI provides an excellent soft tissue contrast. Here, an MR protocol is developed to improve delineations for radiotherapy treatment of pancreatic cancer. In a later stage this protocol can also be used for on-line visualization of the pancreas during MRI guided treatments. Methods: Nine pancreatic cancer patients were included. The MR protocol included T2 weighted(T2w), T1 weighted(T1w), diffusion weighted(DWI) and dynamic contrast enhanced(DCE) techniques. The tumor was delineated on T2w and T1w MRI by an experienced radiation oncologist. Healthy pancreas or pancreatitis (assigned by the oncologist based on T2w) areas were also delineated. Apparent diffusion coefficient(ADC), and area under the curve(AUC)/time to peak(TTP) maps were obtained from DWI and DCE scans, respectively. Results: A clear demarcation of tumor area was visible on b800 DWI images in 5 patients. ADC maps of those patients characterized tumor as an area with restricted water diffusion. Tumor delineations based on solely DCE were possible in 7 patients. In 6 of those patients AUC maps demonstrated tumor heterogeneity: a hypointense area with a hyperintense ring. TTP values clearly discriminated the tumor and the healthy pancreas but could not distinguish tumor and the pancreatitis accurately. Conclusion: MR imaging results in a more pronounced tumor contrast than contrast enhanced CT. The addition of quantitative, functional MRI provides valuable, additional information to the radiation oncologist on the spatial tumor extent by discriminating tumor from the healthy pancreas(TTP, DWI) and characterizing the tumor(ADC). Our findings indicate that tumor delineation in pancreatic cancer can greatly

  13. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  14. Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-06-12

    This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, 6-27-13

  15. Manual for Implementation of the Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-06-12

    This Manual provides detailed information for implementing the requirements of DOE O 142.2A, dated 12-15-06; the Agreement Between the United States of America and the International Atomic Energy Agency (IAEA) for the Application of Safeguards in the United States; the Original Protocol to the Agreement; the Additional Protocol to the Agreement signed by the United States and the IAEA on June 12, 1998; and the Interagency Procedures for the Implementation of the U.S.-IAEA Safeguards Agreement. No cancellation. Admin Chg 1, dated 6-27-13, supersedes DOE M 142.2-1. Certified 12-3-14.

  16. The first 100 feet: New options for Internet and broadband access. Final report, June 1, 1996--January 31, 1998

    SciTech Connect (OSTI)

    Branscomb, L.; Hurley, D.; Keller, J.

    1998-04-01

    This project was undertaken to explore new options for connecting homes and small businesses to high-speed communications networks, such as the Internet. Fundamental to this inquiry was an interest in looking at options which are newly enabled through changes in technology and regulation, and which go beyond the traditional topdown, centralized model for local access. In particular, the authors focused on opportunities for end-user and community-level investment. This project was intended to investigate the opportunities presented by the decreasing cost of computing and networking platforms, the unbundling of local exchange network elements, and the intelligent endpoints model of networking best exemplified by the Internet. Do these factors, along with communications technologies such as spread spectrum wireless, digital subscriber line services, and the ability to modulate a communications signal over the electric power line infrastructure, enable new models for end-user investment in intelligent infrastructure as a leverage point for accessing the broadband network? This question was first explored through a two-day conference held at the Freedom Forum in Arlington, Virginia, October 29 and 30, 1996. The workshop addressed issues in the consumer adoption of new communications technologies, use of the electric power line infrastructure, the role of municipalities, and the use of alternative technologies, such as XDSL, satellite, spread spectrum wireless, LMDS, and others. The best of these papers have been further developed, with editorial guidance provided by Harvard, and compiled in the form of a book (The First 100 Feet: New Options for Internet and Broadband Access, Deborah Hurley and James Keller, eds., MIT Press, 1998) to be published as part of the MIT Press Spring 1998 catalogue. A summary of topics covered by the book is given in this report.

  17. Acquisition Letter/Financial Assistance Letter (ALIFAL) 201 0...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    With Internet Protocol Version 6 (IPv6) Acquisition LetterFinancial Assistance Letter (ALIFAL) 201 0-06, Acquiring Information Technology, Requirement to Comply With Internet ...

  18. ESnet IPv6 History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    support of IPv6. In anticipation of the scalability problems with IPv4 (the current Internet Protocol), the Internet Engineering Task Force (IETF) has produced a comprehensive...

  19. ESnet: a Production IPv6 Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IPv6 Network In anticipation of the scalability problems with IPv4 (the current Internet Protocol), the Internet Engineering Task Force (IETF) has produced a comprehensive...

  20. Chapter 2, Commercial and Industrial Lighting Evaluation Protocol: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Commercial and Industrial Lighting Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Dakers Gowans, Left Fork Energy Subcontract Report NREL/SR-7A30-53827 April 2013 Chapter 2 - Table of Contents 1 Measure Description .............................................................................................................. 2 2 Application Conditions of the Protocol

  1. Chapter 3, Commercial and Industrial Lighting Controls Evaluation Protocol: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Commercial and Industrial Lighting Controls Evaluation Protocol Stephen Carlson, DNV KEMA Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 3 - 1 Chapter 3 - Table of Contents 1 Measure Description .............................................................................................................. 2 2 Application Conditions of Protocol

  2. Chapter 5, Residential Furnaces and Boilers Evaluation Protocol: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Residential Furnaces and Boilers Evaluation Protocol David Jacobson, Jacobson Energy Research Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 5 - 1 Chapter 5 - Table of Contents 1 Measure Description .............................................................................................................. 2 2 Application Conditions of Protocol

  3. Chapter 8, Whole-Building Retrofit with Billing Analysis Evaluation Protocol: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Whole-Building Retrofit with Consumption Data Analysis Evaluation Protocol Ken Agnew and Mimi Goldberg, DNV KEMA Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 8 - 1 Chapter 8 - Table of Contents 1 Measure Description ...............................................................................................................2 2 Application Conditions of Protocol

  4. The Evolution of the Internet Community and the"Yet-to-Evolve" Smart Grid Community: Parallels and Lessons-to-be-Learned

    SciTech Connect (OSTI)

    McParland, Charles

    2009-11-06

    The Smart Grid envisions a transformed US power distribution grid that enables communicating devices, under human supervision, to moderate loads and increase overall system stability and security. This vision explicitly promotes increased participation from a community that, in the past, has had little involvement in power grid operations -the consumer. The potential size of this new community and its member's extensive experience with the public Internet prompts an analysis of the evolution and current state of the Internet as a predictor for best practices in the architectural design of certain portions of the Smart Grid network. Although still evolving, the vision of the Smart Grid is that of a community of communicating and cooperating energy related devices that can be directed to route power and modulate loads in pursuit of an integrated, efficient and secure electrical power grid. The remaking of the present power grid into the Smart Grid is considered as fundamentally transformative as previous developments such as modern computing technology and high bandwidth data communications. However, unlike these earlier developments, which relied on the discovery of critical new technologies (e.g. the transistor or optical fiber transmission lines), the technologies required for the Smart Grid currently exist and, in many cases, are already widely deployed. In contrast to other examples of technical transformations, the path (and success) of the Smart Grid will be determined not by its technology, but by its system architecture. Fortunately, we have a recent example of a transformative force of similar scope that shares a fundamental dependence on our existing communications infrastructure - namely, the Internet. We will explore several ways in which the scale of the Internet and expectations of its users have shaped the present Internet environment. As the presence of consumers within the Smart Grid increases, some experiences from the early growth of the Internet

  5. IP Kids Page | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    belinblankStudentsinventia InventNow.org - World: http:www.inventnow.org American Intellectual Property Law Association: http:www.aipla.orgcommitteescommitteepages...

  6. Standard Intellectual Property (IP) Provisions for Financial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Type of Award Type of Project Special Data Statute e.g., EPACT) Type of Recipient Set ... Type of Award Type of Project Special Data Statute e.g., EPACT) Type of Recipient Set ...

  7. IPS- Industrial Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Solar, Vehicles, Wind energy Product: Engineeringarchitecturaldesign;Installation; Maintenance and repair; Other:Construction Phone Number: 419-531-3121 Website:...

  8. Impacts of the Kyoto protocol on U.S. energy markets and economic activity

    SciTech Connect (OSTI)

    1998-10-01

    The Intergovernmental Panel on Climate Change (IPCC) was established by the World Meteorological Organization and the United Nations Environment Program in 1988 to assess the available scientific, technical, and socioeconomic information in the field of climate change. The most recent report of the IPCC concluded that ``Our ability to quantify the human influence on global climate is currently limited because the expected signal is still emerging from the noise of natural variability, and because there are uncertainties in key factors. These include the magnitudes and patterns of long-term variability and the time-evolving pattern of forcing by, and response to, changes in concentrations of greenhouse gases and aerosols, and land surface changes. Nevertheless the balance of evidence suggests that there is a discernible human influence on global climate. The first and second Conference of the Parties in 1995 and 1996 agreed to address the issue of greenhouse gas emissions for the period beyond 2000, and to negotiate quantified emission limitations and reductions for the third Conference of the Parties. On December 1 through 11, 1997, representatives from more than 160 countries met in Kyoto, Japan, to negotiate binding limits on greenhouse gas emissions for developed nations. The resulting Kyoto Protocol established emissions targets for each of the participating developed countries--the Annex 1 countries--relative to their 1990 emissions levels. 114 refs., 138 figs., 33 tabs.

  9. Islip Housing Authority Energy Efficiency Turnover Protocols, Islip, New York (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-08-01

    More than 1 million HUD-supported public housing units provide rental housing for eligible low-income families across the country. A survey of over 100 PHAs across the country indicated that there is a high level of interest in developing low cost solutions that improve energy efficiency and can be seamlessly included in the refurbishment process. Further, PHAs, have incentives (both internal and external) to reduce utility bills. ARIES worked with two public housing authorities (PHAs) to develop packages of energy efficiency retrofit measures the PHAs can cost effectively implement with their own staffs in the normal course of housing operations at the time when units are refurbished between occupancies. The energy efficiency turnover protocols emphasized air infiltration reduction, duct sealing and measures that improve equipment efficiency. ARIES documented implementation in ten housing units. Reductions in average air leakage were 16-20% and duct leakage reductions averaged 38%. Total source energy consumption savings was estimated at 6-10% based on BEopt modeling with a simple payback of 1.7 to 2.2 years. Implementation challenges were encountered mainly related to required operational changes and budgetary constraints. Nevertheless, simple measures can feasibly be accomplished by PHA staff at low or no cost. At typical housing unit turnover rates, these measures could impact hundreds of thousands of unit per year nationally.

  10. Development of Monitoring & Verification Technology (MVT) for Carbon Sequestration in Terrestrial Ecosystems: Instrumentation and Protocols

    SciTech Connect (OSTI)

    Wielopolski, Lucian

    2008-09-29

    The objective of this CRADA is to further develop the Multiple Elemental Soil Analysis (MESA) system, based on inelastic neutron scattering technology that was originally developed by Dr. Lucian Wielopolski at BNL. The scope of this CRADA will center on the quantification and monitoring of non-destructive in situ carbon loading in soils to evaluate land application emission reduction activities. To accomplish this objective, the CRADA will center on three main joint activities as described below: A. To further develop and characterize a prototype, field deployable MESA system for static and scanning purposes. B. To develop applicable protocols for agricultural land applications; system validation and field sampling schemes. C. To implement field experiments for independent systems validation, verification, and acceptance by third parties for use in the market segment and commercialization. The technical approach involves a system for monitoring characteristic gamma rays emitted from carbon nuclei stimulated by inelastic neutron scattering from a carbon nucleus. The system consists of a neutron generator emitting fast, 14 MeV, neutrons, shielding materials, and a detection system with nuclear electronics for data acquisition. Following standard system calibration, the results are produced immediately at the end of the counting period.

  11. Commercial Building Energy Asset Score System: Program Overview and Technical Protocol (Version 1.0)

    SciTech Connect (OSTI)

    Wang, Na; Gorrissen, Willy J.

    2013-01-11

    The U.S. Department of Energy (DOE) is developing a national voluntary energy asset score system that includes an energy asset score tool to help building owners evaluate their buildings with respect to the score system. The goal of the energy asset score system is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system will allow building owners and managers to compare their building infrastructure against peers and track building upgrade progress over time. The system can also help other building stakeholders (e.g., building operators, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from their operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset score tool. This report also describes alternative methods that were considered prior to developing the current approach. Finally, this report describes a few features of the program where alternative approaches are still under evaluation.

  12. SU-E-P-49: Evaluation of Image Quality and Radiation Dose of Various Unenhanced Head CT Protocols

    SciTech Connect (OSTI)

    Chen, L; Khan, M; Alapati, K; Hsieh, M; Barry, K

    2015-06-15

    Purpose: To evaluate the diagnostic value of various unenhanced head CT protocols and predicate acceptable radiation dose level for head CT exam. Methods: Our retrospective analysis included 3 groups, 20 patients per group, who underwent clinical routine unenhanced adult head CT examination. All exams were performed axially with 120 kVp. Three protocols, 380 mAs without iterative reconstruction and automAs, 340 mAs with iterative reconstruction without automAs, 340 mAs with iterative reconstruction and automAs, were applied on each group patients respectively. The images were reconstructed with H30, J30 for brain window and H60, J70 for bone window. Images acquired with three protocols were randomized and blindly reviewed by three radiologists. A 5 point scale was used to rate each exam The percentage of exam score above 3 and average scores of each protocol were calculated for each reviewer and tissue types. Results: For protocols without automAs, the average scores of bone window with iterative reconstruction were higher than those without iterative reconstruction for each reviewer although the radiation dose was 10 percentage lower. 100 percentage exams were scored 3 or higher and the average scores were above 4 for both brain and bone reconstructions. The CTDIvols are 64.4 and 57.8 mGy of 380 and 340 mAs, respectively. With automAs, the radiation dose varied with head size, resulting in 47.5 mGy average CTDIvol between 39.5 and 56.5 mGy. 93 and 98 percentage exams were scored great than 3 for brain and bone windows, respectively. The diagnostic confidence level and image quality of exams with AutomAs were less than those without AutomAs for each reviewer. Conclusion: According to these results, the mAs was reduced to 300 with automAs OFF for head CT exam. The radiation dose was 20 percentage lower than the original protocol and the CTDIvol was reduced to 51.2 mGy.

  13. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    SciTech Connect (OSTI)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  14. Non-destructive inspection protocol for reinforced concrete barriers and bridge railings

    SciTech Connect (OSTI)

    Chintakunta, Satish R.; Boone, Shane D.

    2014-02-18

    Reinforced concrete highway barriers and bridge railings serve to prevent errant vehicles from departing the travel way at grade separations. Despite the important role that they play in maintaining safety and their ubiquitous nature, barrier inspection rarely moves beyond visual inspection. In August 2008, a tractor-trailer fatally departed William Preston Lane, Jr. Memorial Bridge after it dislodged a section of the bridge barrier. Investigations following the accident identified significant corrosion of the anchor bolts attaching the bridge railing to the bridge deck. As a result of the information gathered during its investigation of the accident, the National Transportation Safety Board (NTSB) made recommendations to the Federal Highway Administration concerning Non-Destructive Evaluation (NDE) of concrete bridge railings. The Center for nondestructive evaluation (NDE) at Turner Fairbank Highway Research Center in McLean, VA is currently evaluating feasibility of using four technologies - ground penetrating radar (GPR), ultrasonic pulse-echo, digital radiography and infrared thermal imaging methods to develop bridge inspection methods that augment visual inspections, offer reliable measurement techniques, and are practical, both in terms of time and cost, for field inspection work. Controlled samples containing predefined corrosion levels in reinforcing steel were embedded at barrier connection points for laboratory testing. All four NDE techniques were used in the initial phase I testing. An inspection protocol for detecting and measuring the corrosion of reinforced steel embedded in the anchorage system will be developed as part of phase II research. The identified technologies shall be further developed for field testing utilizing a structure with a barrier in good condition and a structure with a barrier in poor condition.

  15. ANALOG I/O MODULE TEST SYSTEM BASED ON EPICS CA PROTOCOL AND ACTIVEX CA INTERFACE

    SciTech Connect (OSTI)

    YENG,YHOFF,L.

    2003-10-13

    Analog input (ADC) and output (DAC) modules play a substantial role in device level control of accelerator and large experiment physics control system. In order to get the best performance some features of analog modules including linearity, accuracy, crosstalk, thermal drift and so on have to be evaluated during the preliminary design phase. Gain and offset error calibration and thermal drift compensation (if needed) may have to be done in the implementation phase as well. A natural technique for performing these tasks is to interface the analog VO modules and GPIB interface programmable test instruments with a computer, which can complete measurements or calibration automatically. A difficulty is that drivers of analog modules and test instruments usually work on totally different platforms (vxworks VS Windows). Developing new test routines and drivers for testing instruments under VxWorks (or any other RTOS) platform is not a good solution because such systems have relatively poor user interface and developing such software requires substantial effort. EPICS CA protocol and ActiveX CA interface provide another choice, a PC and LabVIEW based test system. Analog 110 module can be interfaced from LabVIEW test routines via ActiveX CA interface. Test instruments can be controlled via LabVIEW drivers, most of which are provided by instrument vendors or by National Instruments. Labview also provides extensive data analysis and process functions. Using these functions, users can generate powerful test routines very easily. Several applications built for Spallation Neutron Source (SNS) Beam Loss Monitor (BLM) system are described in this paper.

  16. Stimulated Raman signals at conical intersections: Ab initio surface hopping simulation protocol with direct propagation of the nuclear wave function

    SciTech Connect (OSTI)

    Kowalewski, Markus Mukamel, Shaul

    2015-07-28

    Femtosecond Stimulated Raman Spectroscopy (FSRS) signals that monitor the excited state conical intersections dynamics of acrolein are simulated. An effective time dependent Hamiltonian for two C—H vibrational marker bands is constructed on the fly using a local mode expansion combined with a semi-classical surface hopping simulation protocol. The signals are obtained by a direct forward and backward propagation of the vibrational wave function on a numerical grid. Earlier work is extended to fully incorporate the anharmonicities and intermode couplings.

  17. Medical Screening Protocol for the Former Worker Medical Screening Program U.S. Department of Energy, October 7, 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7/15 1 MEDICAL SCREENING PROTOCOL FOR THE FORMER WORKER MEDICAL SCREENING PROGRAM U.S. DEPARTMENT OF ENERGY General Principles: 1) The purpose of the medical evaluation component of the U.S. Department of Energy (DOE) Former Worker Medical Screening Program (FWP) is to provide interested former workers with targeted testing to screen for selected adverse health effects potentially related to their work in DOE operations. The program does not test for all potentially work-related conditions; for

  18. Chapter 21: Residential Lighting Evaluation Protocol. Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Residential Lighting Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 This supersedes the version originally published in April 2013. Scott Dimetrosky, Katie Parkinson, and Noah Lieb Apex Analytics, LLC Boulder, Colorado NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-63205 February 2015 NREL is a national

  19. A Systematic Review of Protocols for the Three-Dimensional Morphologic Assessment of Abdominal Aortic Aneurysms Using Computed Tomographic Angiography

    SciTech Connect (OSTI)

    Ghatwary, Tamer M. H.; Patterson, Benjamin O.; Karthikesalingam, Alan; Hinchliffe, Robert J.; Loftus, Ian M.; Morgan, Robert; Thompson, Matt M.; Holt, Peter J. E.

    2013-02-15

    The morphology of infrarenal abdominal aortic aneurysms (AAAs) directly influences the perioperative outcome and long-term durability of endovascular aneurysm repair. A variety of methods have been proposed for the characterization of AAA morphology using reconstructed three-dimensional (3D) computed tomography (CT) images. At present, there is lack of consensus as to which of these methods is most applicable to clinical practice or research. The purpose of this review was to evaluate existing protocols that used 3D CT images in the assessment of various aspects of AAA morphology. An electronic search was performed, from January 1996 to the end of October 2010, using the Embase and Medline databases. The literature review conformed to PRISMA statement standards. The literature search identified 604 articles, of which 31 studies met inclusion criteria. Only 15 of 31 studies objectively assessed reproducibility. Existing published protocols were insufficient to define a single evidence-based methodology for preoperative assessment of AAA morphology. Further development and expert consensus are required to establish a standardized and validated protocol to determine precisely how morphology relates to outcomes after endovascular aneurysm repair.

  20. Wireless Sensors Improve Data Center Efficiency

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... as steel beams; electrical noise from ... Transmission Control ProtocolInternet Protocol (TCPIP) over an Ethernet connection, ... under-floor air distribution, and helped ...

  1. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Technologies (IT) such as Ethernet(tm), Transmission Control ProtocolInternet Protocol (TCPIP) and Windows for both critical and non-critical communications....

  2. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    SciTech Connect (OSTI)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  3. SU-F-18C-01: Minimum Detectability Analysis for Comprehensive Sized Based Optimization of Image Quality and Radiation Dose Across CT Protocols

    SciTech Connect (OSTI)

    Smitherman, C; Chen, B; Samei, E

    2014-06-15

    Purpose: This work involved a comprehensive modeling of task-based performance of CT across a wide range of protocols. The approach was used for optimization and consistency of dose and image quality within a large multi-vendor clinical facility. Methods: 150 adult protocols from the Duke University Medical Center were grouped into sub-protocols with similar acquisition characteristics. A size based image quality phantom (Duke Mercury Phantom) was imaged using these sub-protocols for a range of clinically relevant doses on two CT manufacturer platforms (Siemens, GE). The images were analyzed to extract task-based image quality metrics such as the Task Transfer Function (TTF), Noise Power Spectrum, and Az based on designer nodule task functions. The data were analyzed in terms of the detectability of a lesion size/contrast as a function of dose, patient size, and protocol. A graphical user interface (GUI) was developed to predict image quality and dose to achieve a minimum level of detectability. Results: Image quality trends with variations in dose, patient size, and lesion contrast/size were evaluated and calculated data behaved as predicted. The GUI proved effective to predict the Az values representing radiologist confidence for a targeted lesion, patient size, and dose. As an example, an abdomen pelvis exam for the GE scanner, with a task size/contrast of 5-mm/50-HU, and an Az of 0.9 requires a dose of 4.0, 8.9, and 16.9 mGy for patient diameters of 25, 30, and 35 cm, respectively. For a constant patient diameter of 30 cm, the minimum detected lesion size at those dose levels would be 8.4, 5, and 3.9 mm, respectively. Conclusion: The designed CT protocol optimization platform can be used to evaluate minimum detectability across dose levels and patient diameters. The method can be used to improve individual protocols as well as to improve protocol consistency across CT scanners.

  4. Fact #872: May 11, 2015 Study Finds More than 60% of Millennials and Generation Xers Use the Internet to Find a Car Dealer While Less than Half of Baby Boomers Did – Dataset

    Broader source: Energy.gov [DOE]

    Excel file and dataset for Study Finds More than 60% of Millennials and Generation Xers Use the Internet to Find a Car Dealer While Less than Half of Baby Boomers Did

  5. Fact #872: May 11, 2015 Study Finds More than 60% of Millennials and Generation Xers Use the Internet to Find a Car Dealer While Less than Half of Baby Boomers Did

    Broader source: Energy.gov [DOE]

    According to an AutoTrader-commissioned study of people who purchased vehicles within the past 12 months, the Internet is the source most used when finding a car dealer. However, the study revealed...

  6. Broadening

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Arguing that problems with IP multicast (such as complexity of multicast routing protocols, malicious users without credentials joining multicast groups, and congestion control) ...

  7. Microsoft PowerPoint - OTT RFI Summary of Input_Public_Oct 2015

    Office of Environmental Management (EM)

    ... and standardization of TT processes, activities and policies - Unify IP agreements, NDA protocols, COI's - Clarify what terms areare not negotiable - Clear long-term ...

  8. Addendum to the AAPM's TG-51 protocol for clinical reference dosimetry of high-energy photon beams

    SciTech Connect (OSTI)

    McEwen, Malcolm; DeWerd, Larry; Ibbott, Geoffrey; Followill, David; Rogers, David W. O.; Seltzer, Stephen; Seuntjens, Jan

    2014-04-15

    An addendum to the AAPM's TG-51 protocol for the determination of absorbed dose to water in megavoltage photon beams is presented. This addendum continues the procedure laid out in TG-51 but new k{sub Q} data for photon beams, based on Monte Carlo simulations, are presented and recommendations are given to improve the accuracy and consistency of the protocol's implementation. The components of the uncertainty budget in determining absorbed dose to water at the reference point are introduced and the magnitude of each component discussed. Finally, the consistency of experimental determination of N{sub D,w} coefficients is discussed. It is expected that the implementation of this addendum will be straightforward, assuming that the user is already familiar with TG-51. The changes introduced by this report are generally minor, although new recommendations could result in procedural changes for individual users. It is expected that the effort on the medical physicist's part to implement this addendum will not be significant and could be done as part of the annual linac calibration.

  9. Stratospheric ozone protection: The Montreal Protocol and Title VI of the Clean Air Act Amendments of 1990

    SciTech Connect (OSTI)

    Babst, C.R. III

    1993-08-01

    The stratospheric ozone layer protects the surface of the Earth from harmful ultraviolet (UV-B) radiation, which has been causally linked to skin cancer and cataracts, suppression of the human immune system, damage to crops and aquatic organisms, the formation of ground-level zone and the rapid weathering of outdoor plastics. In recent years, scientists have observed a significant deterioration of the ozone layer, particularly over the poles, but increasingly over populated regions as well. This deterioration has been attributed to the atmospheric release of certain man-made halocarbons, including chlorofluorocarbons (CFCs), halons, methyl chloroform and carbon tetrachloride. Once used extensively as propellants for aerosol sprays (but generally banned for such purposes since 1978), CFCs are widely used today as refrigerants, foams and solvents. All of these chlorinated (CFC, methyl chloroform and carbon tetrachloride) and brominated (halon) compounds are classified for regulatory purposes as Class I substances because of their significant ozone-depleting potential. Hydrochlorofluorocarbons (HCFCs), developed as alternatives to CFCs and halons for many different applications, have been classified for regulatory purposes as Class II substances because of their relatively less destructive impact on stratospheric ozone. This paper describes the following regulations to reduce destruction of the ozone layer: the Montreal Protocol; Title VI of the Clean air Act Amendments of 1990; Accelerated Phase-out schedules developed by the countries which signed the Montreal Protocol; Use restrictions; Recycling and Emission reduction requirements; Servicing of motor vehicle air conditions; ban on nonessential products; labeling requirements; safe alternatives. 6 refs.

  10. SU-E-I-32: Benchmarking Head CT Doses: A Pooled Vs. Protocol Specific Analysis of Radiation Doses in Adult Head CT Examinations

    SciTech Connect (OSTI)

    Fujii, K; Bostani, M; Cagnon, C; McNitt-Gray, M

    2015-06-15

    Purpose: The aim of this study was to collect CT dose index data from adult head exams to establish benchmarks based on either: (a) values pooled from all head exams or (b) values for specific protocols. One part of this was to investigate differences in scan frequency and CT dose index data for inpatients versus outpatients. Methods: We collected CT dose index data (CTDIvol) from adult head CT examinations performed at our medical facilities from Jan 1st to Dec 31th, 2014. Four of these scanners were used for inpatients, the other five were used for outpatients. All scanners used Tube Current Modulation. We used X-ray dose management software to mine dose index data and evaluate CTDIvol for 15807 inpatients and 4263 outpatients undergoing Routine Brain, Sinus, Facial/Mandible, Temporal Bone, CTA Brain and CTA Brain-Neck protocols, and combined across all protocols. Results: For inpatients, Routine Brain series represented 84% of total scans performed. For outpatients, Sinus scans represented the largest fraction (36%). The CTDIvol (mean ± SD) across all head protocols was 39 ± 30 mGy (min-max: 3.3–540 mGy). The CTDIvol for Routine Brain was 51 ± 6.2 mGy (min-max: 36–84 mGy). The values for Sinus were 24 ± 3.2 mGy (min-max: 13–44 mGy) and for Facial/Mandible were 22 ± 4.3 mGy (min-max: 14–46 mGy). The mean CTDIvol for inpatients and outpatients was similar across protocols with one exception (CTA Brain-Neck). Conclusion: There is substantial dose variation when results from all protocols are pooled together; this is primarily a function of the differences in technical factors of the protocols themselves. When protocols are analyzed separately, there is much less variability. While analyzing pooled data affords some utility, reviewing protocols segregated by clinical indication provides greater opportunity for optimization and establishing useful benchmarks.

  11. Internet-Based Survey Evaluating Use of Pain Medications and Attitudes of Radiation Oncology Patients Toward Pain Intervention

    SciTech Connect (OSTI)

    Simone, Charles B. Vapiwala, Neha; Hampshire, Margaret K.; Metz, James M.

    2008-09-01

    Purpose: Pain is a common symptom among cancer patients, yet many patients do not receive adequate pain management. Few data exist quantifying analgesic use by radiation oncology patients. This study evaluated the causes of pain in cancer patients and investigated the reasons patients fail to receive optimal analgesic therapy. Methods and Materials: An institutional review board-approved, Internet-based questionnaire assessing analgesic use and pain control was posted on the OncoLink (available at (www.oncolink.org)) Website. Between November 2005 and April 2006, 243 patients responded. They were predominantly women (73%), white (71%), and educated beyond high school (67%) and had breast (38%), lung (6%), or ovarian (6%) cancer. This analysis evaluated the 106 patients (44%) who underwent radiotherapy. Results: Of the 106 patients, 58% reported pain from their cancer treatment, and 46% reported pain directly from their cancer. The pain was chronic in 51% and intermittent in 33%. Most (80%) did not use medication to manage their pain. Analgesic use was significantly less in patients with greater education levels (11% vs. 36%, p = 0.002), with a trend toward lower use by whites (16% vs. 32%, p 0.082) and women (17% vs. 29%, p = 0.178). The reasons for not taking analgesics included healthcare provider not recommending medication (87%), fear of addiction or dependence (79%), and inability to pay (79%). Participants experiencing pain, but not taking analgesics, pursued alternative therapies for relief. Conclusions: Many radiation oncology patients experience pain from their disease and cancer treatment. Most study participants did not use analgesics because of concerns of addiction, cost, or failure of the radiation oncologist to recommend medication. Healthcare providers should have open discussions with their patients regarding pain symptoms and treatment.

  12. Field Laboratory in the Osage Reservation -- Determination of the Status of Oil and Gas Operations: Task 1. Development of Survey Procedures and Protocols

    SciTech Connect (OSTI)

    Carroll, Herbert B.; Johnson, William I.

    1999-04-27

    Procedures and protocols were developed for the determination of the status of oil, gas, and other mineral operations on the Osage Mineral Reservation Estate. The strategy for surveying Osage County, Oklahoma, was developed and then tested in the field. Two Osage Tribal Council members and two Native American college students (who are members of the Osage Tribe) were trained in the field as a test of the procedures and protocols developed in Task 1. Active and inactive surface mining operations, industrial sites, and hydrocarbon-producing fields were located on maps of the county, which was divided into four more or less equal areas for future investigation. Field testing of the procedures, protocols, and training was successful. No significant damage was found at petroleum production operations in a relatively new production operation and in a mature waterflood operation.

  13. SU-E-I-57: Evaluation and Optimization of Effective-Dose Using Different Beam-Hardening Filters in Clinical Pediatric Shunt CT Protocol

    SciTech Connect (OSTI)

    Gill, K; Aldoohan, S; Collier, J

    2014-06-01

    Purpose: Study image optimization and radiation dose reduction in pediatric shunt CT scanning protocol through the use of different beam-hardening filters Methods: A 64-slice CT scanner at OU Childrens Hospital has been used to evaluate CT image contrast-to-noise ratio (CNR) and measure effective-doses based on the concept of CT dose index (CTDIvol) using the pediatric head shunt scanning protocol. The routine axial pediatric head shunt scanning protocol that has been optimized for the intrinsic x-ray tube filter has been used to evaluate CNR by acquiring images using the ACR approved CT-phantom and radiation dose CTphantom, which was used to measure CTDIvol. These results were set as reference points to study and evaluate the effects of adding different filtering materials (i.e. Tungsten, Tantalum, Titanium, Nickel and Copper filters) to the existing filter on image quality and radiation dose. To ensure optimal image quality, the scanner routine air calibration was run for each added filter. The image CNR was evaluated for different kVps and wide range of mAs values using above mentioned beam-hardening filters. These scanning protocols were run under axial as well as under helical techniques. The CTDIvol and the effective-dose were measured and calculated for all scanning protocols and added filtration, including the intrinsic x-ray tube filter. Results: Beam-hardening filter shapes energy spectrum, which reduces the dose by 27%. No noticeable changes in image low contrast detectability Conclusion: Effective-dose is very much dependent on the CTDIVol, which is further very much dependent on beam-hardening filters. Substantial reduction in effective-dose is realized using beam-hardening filters as compare to the intrinsic filter. This phantom study showed that significant radiation dose reduction could be achieved in CT pediatric shunt scanning protocols without compromising in diagnostic value of image quality.

  14. The global gridded crop model intercomparison: Data and modeling protocols for Phase 1 (v1.0)

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Elliott, J.; Müller, C.; Deryng, D.; Chryssanthacopoulos, J.; Boote, K. J.; Büchner, M.; Foster, I.; Glotter, M.; Heinke, J.; Iizumi, T.; et al

    2015-02-11

    We present protocols and input data for Phase 1 of the Global Gridded Crop Model Intercomparison, a project of the Agricultural Model Intercomparison and Improvement Project (AgMIP). The project consist of global simulations of yields, phenologies, and many land-surface fluxes using 12–15 modeling groups for many crops, climate forcing data sets, and scenarios over the historical period from 1948 to 2012. The primary outcomes of the project include (1) a detailed comparison of the major differences and similarities among global models commonly used for large-scale climate impact assessment, (2) an evaluation of model and ensemble hindcasting skill, (3) quantification ofmore » key uncertainties from climate input data, model choice, and other sources, and (4) a multi-model analysis of the agricultural impacts of large-scale climate extremes from the historical record.« less

  15. The global gridded crop model intercomparison: Data and modeling protocols for Phase 1 (v1.0)

    SciTech Connect (OSTI)

    Elliott, J.; Müller, C.; Deryng, D.; Chryssanthacopoulos, J.; Boote, K. J.; Büchner, M.; Foster, I.; Glotter, M.; Heinke, J.; Iizumi, T.; Izaurralde, R. C.; Mueller, N. D.; Ray, D. K.; Rosenzweig, C.; Ruane, A. C.; Sheffield, J.

    2015-02-11

    We present protocols and input data for Phase 1 of the Global Gridded Crop Model Intercomparison, a project of the Agricultural Model Intercomparison and Improvement Project (AgMIP). The project consist of global simulations of yields, phenologies, and many land-surface fluxes using 12–15 modeling groups for many crops, climate forcing data sets, and scenarios over the historical period from 1948 to 2012. The primary outcomes of the project include (1) a detailed comparison of the major differences and similarities among global models commonly used for large-scale climate impact assessment, (2) an evaluation of model and ensemble hindcasting skill, (3) quantification of key uncertainties from climate input data, model choice, and other sources, and (4) a multi-model analysis of the agricultural impacts of large-scale climate extremes from the historical record.

  16. Small Business Internet Sites

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Site: http:thomas.loc.gov Executive Orders: http:www.whitehouse.govnewsorders Senate Small Business Committee: http:sbc.senate.gov House Small ...

  17. Oxygen Reduction Reaction Measurements on Platinum Electrocatalysts Utilizing Rotating Disk Electrode Technique: I. Impact of Impurities, Measurement Protocols and Applied Corrections

    SciTech Connect (OSTI)

    Shinozaki, Kazuma; Zack, Jason W.; Richards, Ryan M.; Pivovar, Bryan S.; Kocha, Shyam S.

    2015-07-22

    The rotating disk electrode (RDE) technique is being extensively used as a screening tool to estimate the activity of novel PEMFC electrocatalysts synthesized in lab-scale (mg) quantities. Discrepancies in measured activity attributable to glassware and electrolyte impurity levels, as well as conditioning, protocols and corrections are prevalent in the literature. Moreover, the electrochemical response to a broad spectrum of commercially sourced perchloric acid and the effect of acid molarity on impurity levels and solution resistance were also assessed. Our findings reveal that an area specific activity (SA) exceeding 2.0 mA/cm2 (20 mV/s, 25°C, 100 kPa, 0.1 M HClO4) for polished poly-Pt is an indicator of impurity levels that do not impede the accurate measurement of the ORR activity of Pt based catalysts. After exploring various conditioning protocols to approach maximum utilization of the electrochemical area (ECA) and peak ORR activity without introducing catalyst degradation, an investigation of measurement protocols for ECA and ORR activity was conducted. Down-selected protocols were based on the criteria of reproducibility, duration of experiments, impurity effects and magnitude of pseudo-capacitive background correction. In sum, statistical reproducibility of ORR activity for poly-Pt and Pt supported on high surface area carbon was demonstrated.

  18. Oxygen Reduction Reaction Measurements on Platinum Electrocatalysts Utilizing Rotating Disk Electrode Technique: I. Impact of Impurities, Measurement Protocols and Applied Corrections

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Shinozaki, Kazuma; Zack, Jason W.; Richards, Ryan M.; Pivovar, Bryan S.; Kocha, Shyam S.

    2015-07-22

    The rotating disk electrode (RDE) technique is being extensively used as a screening tool to estimate the activity of novel PEMFC electrocatalysts synthesized in lab-scale (mg) quantities. Discrepancies in measured activity attributable to glassware and electrolyte impurity levels, as well as conditioning, protocols and corrections are prevalent in the literature. Moreover, the electrochemical response to a broad spectrum of commercially sourced perchloric acid and the effect of acid molarity on impurity levels and solution resistance were also assessed. Our findings reveal that an area specific activity (SA) exceeding 2.0 mA/cm2 (20 mV/s, 25°C, 100 kPa, 0.1 M HClO4) for polishedmore » poly-Pt is an indicator of impurity levels that do not impede the accurate measurement of the ORR activity of Pt based catalysts. After exploring various conditioning protocols to approach maximum utilization of the electrochemical area (ECA) and peak ORR activity without introducing catalyst degradation, an investigation of measurement protocols for ECA and ORR activity was conducted. Down-selected protocols were based on the criteria of reproducibility, duration of experiments, impurity effects and magnitude of pseudo-capacitive background correction. In sum, statistical reproducibility of ORR activity for poly-Pt and Pt supported on high surface area carbon was demonstrated.« less

  19. Chapter 10, Peak Demand and Time-Differentiated Energy Savings Cross-Cutting Protocols: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Peak Demand and Time-Differentiated Energy Savings Cross-Cutting Protocols Frank Stern, Navigant Consulting Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 10 - 1 Chapter 10 - Table of Contents 1 Introduction .............................................................................................................................2 2 Purpose of Peak Demand and Time-differentiated Energy

  20. Chapter 11, Sample Design Cross-Cutting Protocols: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Sample Design Cross-Cutting Protocols M. Sami Khawaja, Josh Rushton, and Josh Keeling, The Cadmus Group, Inc. Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 11 - 1 Chapter 11 - Table of Contents 1 Introduction ............................................................................................................................ 3 1.1 Chapter Organization

  1. Chapter 13, Assessing Persistence and Other Evaluation Issues Cross-Cutting Protocols: The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Assessing Persistence and Other Evaluation Issues Cross- Cutting Protocols Daniel M. Violette, Navigant Consulting Subcontract Report NREL/SR-7A30-53827 April 2013 The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures 13 - 1 Chapter 13 - Table of Contents 1 Introduction .............................................................................................................................2 2 Persistence of Energy Savings

  2. Test procedures and protocols: Their relevance to the figure of merit for thermal distribution systems. Volume 1: Informal report

    SciTech Connect (OSTI)

    Andrews, J.W.

    1993-09-01

    A conceptual framework is developed that categorizes measurement protocols for forced-air thermal distribution systems in small buildings. This framework is based on the distinction between two generic approaches. The {open_quote}system-comparison{close_quote} approach seeks to determine, via a pair of whole-house energy-use measurements, the difference in energy use between the house with the as-found duct system and the same house with no energy losses attributable to the thermal distribution system. The {open_quote}component loss-factor{close_quote} approach identifies and measures the individual causes of duct losses, and then builds up a value for the net overall duct efficiency, usually with the help of computer simulation. Examples of each approach are analyzed and related to a proposed Figure of Merit for thermal distribution systems. This Figure of Merit would serve as the basis for a Standard Method of Test analogous to those already in place for furnaces, boilers, air conditioners, and heat pumps.

  3. Lessons Learned at the Idaho National Laboratory for the Entry into Force of the U.S. Additional Protocol

    SciTech Connect (OSTI)

    Jeffrey C. Joe; Shauna A. Hoiland

    2009-07-01

    For a number of years, the Idaho National Laboratory (INL) has been preparing for the entry into force of the U.S. Additional Protocol (AP). These preparations included attending training, participating in tabletop exercises, preparing draft declarations, developing INL-specific guidance documents, preparing for and hosting a mock complementary access visit, and preparing declarations for official submittal. All of these activities, the training materials, and software developed by other U.S. DOE national laboratories (PNNL, ORNL, LANL, and BNL) were very helpful in preparing for the entry into force of the AP. As with any endeavor of this size and complexity, however, there are always instances where even the best preparations and advanced planning do not anticipate every challenge. As the DOE's lead nuclear energy research and development facility, the INL faced many unique challenges. The majority of research conducted at the INL is nuclear fuel cycle related, most of which is not protected by the National Security Exclusion. This paper describes the lessons learned from the INLs experience of preparing for the entry into force of the AP, specifically how translating and implementing general principles into actual activities proved to be one of many challenges, and provides general suggestions on how to respond effectively and efficiently to routine annual data calls and other AP requests.

  4. The development of a charge protocol to take advantage of off- and on-peak demand economics at facilities

    SciTech Connect (OSTI)

    Jeffrey Wishart

    2012-02-01

    This document reports the work performed under Task 1.2.1.1: 'The development of a charge protocol to take advantage of off- and on-peak demand economics at facilities'. The work involved in this task included understanding the experimental results of the other tasks of SOW-5799 in order to take advantage of the economics of electricity pricing differences between on- and off-peak hours and the demonstrated charging and facility energy demand profiles. To undertake this task and to demonstrate the feasibility of plug-in hybrid electric vehicle (PHEV) and electric vehicle (EV) bi-directional electricity exchange potential, BEA has subcontracted Electric Transportation Applications (now known as ECOtality North America and hereafter ECOtality NA) to use the data from the demand and energy study to focus on reducing the electrical power demand of the charging facility. The use of delayed charging as well as vehicle-to-grid (V2G) and vehicle-to-building (V2B) operations were to be considered.

  5. ADDITIONAL PROTOCOL REPORTING

    National Nuclear Security Administration (NNSA)

    Source Material Article 2.a(vi) * Possession of source material preceding the starting point of IAEA safeguards - Uranium ore concentrates - By-product from other ore processing...

  6. SAMPLING AND ANALYSIS PROTOCOLS

    SciTech Connect (OSTI)

    Jannik, T; P Fledderman, P

    2007-02-09

    Radiological sampling and analyses are performed to collect data for a variety of specific reasons covering a wide range of projects. These activities include: Effluent monitoring; Environmental surveillance; Emergency response; Routine ambient monitoring; Background assessments; Nuclear license termination; Remediation; Deactivation and decommissioning (D&D); and Waste management. In this chapter, effluent monitoring and environmental surveillance programs at nuclear operating facilities and radiological sampling and analysis plans for remediation and D&D activities will be discussed.

  7. Appraisal Process Protocols

    Broader source: Energy.gov (indexed) [DOE]

    including special nuclear materials and sensitive and classified information in all forms. ... whether special nuclear materials, classified and sensitive matter, and other ...

  8. Surface and subsurface cleanup protocol for radionuclides Gunnison, Colorado, UMTRA Project Processing Site. Revision 3, Final report

    SciTech Connect (OSTI)

    Not Available

    1994-05-01

    The supplemental standards provisions of Title 40, Code of Federal Regulations, Part 192 (40 CFR Part 192) require the cleanup of radionuclides other than radium-226 (Ra-226) to levels ``as low as reasonably achievable`` (ALARA), taking into account site-specific conditions, if sufficient quantities and concentrations are present to constitute a significant radiation hazard. In this context, thorium-230 (Th-230) at the Gunnison, Colorado, processing site will require remediation. However, a seasonally fluctuating groundwater table at the site significantly complicates conventional remedial action with respect to cleanup. Characterization data indicate that in the offpile areas, the removal of residual in situ bulk Ra-226 and Th-230 such that the 1000-year projected Ra-226 concentration (Ra-226 concentration in 1000 years due to the decay of in situ Ra-226 and the in-growth of Ra-226 from in situ Th-230) complies with the US Environmental Protection Agency (EPA) cleanup standard for in situ Ra-226 and the cleanup protocol for in situ Th-230 can be readily achieved using conventional excavation techniques for bulk contamination without encountering significant impacts due to groundwater. The EPA cleanup standard and criterion for Ra-226 and the 1000-year projected Ra-226 are 5 and 15 picocuries per gram (pCi/g) above background, respectively, averaged over 15-centimeter (cm) deep surface and subsurface intervals and 100-square-meter (m{sup 2}) grid areas. Significant differential migration of Th-230 relative to Ra-226 has occurred over 40 percent of the subpile area. To effectively remediate the site with respect to Ra-226 and Th-230, supplemental standard is proposed and discussed in this report.

  9. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    SciTech Connect (OSTI)

    Lewis, Lorraine; Cox, Jennifer; Morgia, Marita; Atyeo, John; Lamoury, Gillian

    2015-09-15

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-based CTV delineation protocol was introduced. CTV visibility and its post-operative shrinkage pattern were assessed. The subjects were 27 early stage breast cancer patients receiving post-operative radiotherapy alone and 15 receiving post-operative chemotherapy followed by radiotherapy. The radiotherapy alone (RT/alone) group received a CT scan at median 25 days post-operatively (CT1rt) and another at 40 Gy, median 68 days (CT2rt). The chemotherapy/RT group (chemo/RT) received a CT scan at median 18 days post-operatively (CT1ch), a planning CT scan at median 126 days (CT2ch), and another at 40 Gy (CT3ch). There was no significant difference (P = 0.08) between the initial mean CTV for each cohort. The RT/alone cohort showed significant CTV volume reduction of 38.4% (P = 0.01) at 40 Gy. The Chemo/RT cohort had significantly reduced volumes between CT1ch: median 54 cm{sup 3} (4–118) and CT2ch: median 16 cm{sup 3}, (2–99), (P = 0.01), but no significant volume reduction thereafter. Surgical clips enable localisation of the post-surgical seroma for radiotherapy targeting. Most seroma shrinkage occurs early, enabling CT treatment planning to take place at 7 weeks, which is within the 9 weeks recommended to limit disease recurrence.

  10. SU-E-I-34: Evaluating Use of AEC to Lower Dose for Lung Cancer Screening CT Protocols

    SciTech Connect (OSTI)

    Arbique, G; Anderson, J; Guild, J; Duan, X; Malguria, N; Omar, H; Brewington, C; Zhang, D

    2015-06-15

    Purpose: The National Lung Screening Trial mandated manual low dose CT technique factors, where up to a doubling of radiation output could be used over a regular to large patient size range. Recent guidance from the AAPM and ACR for lung cancer CT screening recommends radiation output adjustment for patient size either through AEC or a manual technique chart. This study evaluated the use of AEC for output control and dose reduction. Methods: The study was performed on a multidetector helical CT scanner (Aquillion ONE, Toshiba Medical) equipped with iterative reconstruction (ADIR-3D), AEC was adjusted with a standard deviation (SD) image quality noise index. The protocol SD parameter was incrementally increased to reduce patient population dose while image quality was evaluated by radiologist readers scoring the clinical utility of images on a Likert scale. Results: Plots of effective dose vs. body size (water cylinder diameter reported by the scanner) demonstrate monotonic increase in patient dose with increasing patient size. At the initial SD setting of 19 the average CTDIvol for a standard size patient was ∼ 2.0 mGy (1.2 mSv effective dose). This was reduced to ∼1.0 mGy (0.5 mSv) at an SD of 25 with no noticeable reduction in clinical utility of images as demonstrated by Likert scoring. Plots of effective patient diameter and BMI vs body size indicate that these metrics could also be used for manual technique charts. Conclusion: AEC offered consistent and reliable control of radiation output in this study. Dose for a standard size patient was reduced to one-third of the 3 mGy CTDIvol limit required for ACR accreditation of lung cancer CT screening. Gary Arbique: Research Grant, Toshiba America Medical Systems; Cecelia Brewington: Research Grant, Toshiba America Medical Systems; Di Zhang: Employee, Toshiba America Medical Systems.

  11. Practical Use of the Extended No Action Level (eNAL) Correction Protocol for Breast Cancer Patients With Implanted Surgical Clips

    SciTech Connect (OSTI)

    Penninkhof, Joan; Quint, Sandra; Baaijens, Margreet; Heijmen, Ben; Dirkx, Maarten

    2012-02-01

    Purpose: To describe the practical use of the extended No Action Level (eNAL) setup correction protocol for breast cancer patients with surgical clips and evaluate its impact on the setup accuracy of both tumor bed and whole breast during simultaneously integrated boost treatments. Methods and Materials: For 80 patients, two orthogonal planar kilovoltage images and one megavoltage image (for the mediolateral beam) were acquired per fraction throughout the radiotherapy course. For setup correction, the eNAL protocol was applied, based on registration of surgical clips in the lumpectomy cavity. Differences with respect to application of a No Action Level (NAL) protocol or no protocol were quantified for tumor bed and whole breast. The correlation between clip migration during the fractionated treatment and either the method of surgery or the time elapsed from last surgery was investigated. Results: The distance of the clips to their center of mass (COM), averaged over all clips and patients, was reduced by 0.9 {+-} 1.2 mm (mean {+-} 1 SD). Clip migration was similar between the group of patients starting treatment within 100 days after surgery (median, 53 days) and the group starting afterward (median, 163 days) (p = 0.20). Clip migration after conventional breast surgery (closing the breast superficially) or after lumpectomy with partial breast reconstructive techniques (sutured cavity). was not significantly different either (p = 0.22). Application of eNAL on clips resulted in residual systematic errors for the clips' COM of less than 1 mm in each direction, whereas the setup of the breast was within about 2 mm of accuracy. Conclusions: Surgical clips can be safely used for high-accuracy position verification and correction. Given compensation for time trends in the clips' COM throughout the treatment course, eNAL resulted in better setup accuracies for both tumor bed and whole breast than NAL.

  12. Chapter 14: Chiller Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … May 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Chiller Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Alex Tiessen, Posterity Group Ottawa, Ontario NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-62431 September 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance

  13. Chapter 15: Commercial New Construction Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … May 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Commercial New Construction Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Steven Keates, ADM Associates, Inc. Sacramento, California NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-62432 September 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy

  14. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … May 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Retrocommissioning Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Alex Tiessen, Posterity Group Ottawa, Ontario NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-62430 September 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the

  15. Chapter 18: Variable Frequency Drive Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … December 2014

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Variable Frequency Drive Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Jeff Romberger SBW Consulting, Inc. Bellevue, Washington NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-63166 November 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy

  16. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … December 2014

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Jeff Romberger SBW Consulting, Inc. Bellevue, Washington NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-63167 November 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable

  17. Chapter 22: Compressed Air Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures: September 2011 … December 2014

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Compressed Air Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of performance September 2011 - December 2014 Nathanael Benton Nexant, Inc. San Francisco, California NREL Technical Monitor: Charles Kurnik Subcontract Report NREL/SR-7A40-63210 November 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by

  18. Islip Housing Authority Energy Efficiency Turnover Protocols, Islip, New York (Fact Sheet), Building America Case Study: Whole-House Solutions for Existing Homes, Building Technologies Office (BTO)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Islip Housing Authority Energy Efficiency Turnover Protocols Islip, New York PROJECT INFORMATION Project Name: Islip Housing Authority Unit Turnover Retrofit Program Location: Islip, NY Partners: Islip Housing Authority, http://www.rhaonline.com/ Advanced Residential Integrated Solutions Collaborative (ARIES), http://levypartnership.com/ Building Component: Whole building Application: Retrofit; single and multifamily Year Tested: 2013 Applicable Climate Zone(s): All PERFORMANCE DATA Cost of

  19. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    SciTech Connect (OSTI)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  20. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  1. Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from which you entered our website (for example, "xcompany.com" if you use a private Internet access account or "your school.edu" if you connect from a university domain) IP...

  2. ESnet LHCONE Service for Universities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This Internet Best 3 Common Practice requires that organizations filter traffic on their border to insure the traffic they send out does not have forged IP source addresses. This...

  3. Investigation of Path Dependence in Commercial Li-ion Cells Chosen for PHEV Duty Cycle Protocols (paper)

    SciTech Connect (OSTI)

    Kevin L. Gering

    2011-04-01

    Path dependence is emerging as a premier issue of how electrochemical cells age in conditions that are diverse and variable in the time domain. For example, lithium-ion cells in a vehicle configuration will experience a variable combination of usage and rest periods over a range of temperature and state of charge (SOC). This is complicated by the fact that some aging can actually become worse (or better) when a lithium-ion cell is idle for extended periods under calendar-life (calL) aging, as opposed to cycle-life (cycL) conditions where the cell is used within a predictable schedule. The purpose of this study is to bridge the gap between highly idealized and controlled laboratory test conditions and actual field conditions regarding PHEV applications, so that field-type aging mechanisms can be mimicked and quantified in a repeatable laboratory setting. The main parameters are the magnitude and frequency of the thermal cycling, looking at isothermal, mild, and severe scenarios. To date, little is known about Li-ion aging effects caused by thermal cycling superimposed onto electrochemical cycling, and related path dependence. This scenario is representative of what Li-ion batteries will experience in vehicle service, where upon the typical start of a HEV/PHEV, the batteries will be cool or cold, will gradually warm up to normal temperature and operate there for a time, then will cool down after the vehicle is turned off. Such thermal cycling will occur thousands of times during the projected life of a HEV/PHEV battery pack. We propose to quantify the effects of thermal cycling on Li-ion batteries using a representative chemistry that is commercially available. The secondary Li-ion cells used in this study are of the 18650 configuration, have a nominal capacity rating of 1.9 Ah, and consist of a {LiMn2O4 + LiMn(1/3)Ni(1/3)Co(1/3)O2} cathode and a graphite anode. Electrochemical cycling is based on PHEV-relevant cycle-life protocols that are a combination of charge

  4. TU-C-12A-07: Characterization of Longitudinal Reproducibility of Quantitative Diffusion Imaging Data Acquired with Four Different Protocols Using a Phantom

    SciTech Connect (OSTI)

    Li, X; Buzzelli, M; Randazzo, W; Yanasak, N

    2014-06-15

    Purpose: To characterize and compare the longitudinal reproducibility of diffusion imaging data acquired with four different protocols using a phantom. Methods: The Diffusive Quantitative Imaging Phantom (DQIP) was constructed using fifteen cylindrical compartments within a larger compartment, filled with deionized water doped with CuSO4 and NaCl. The smaller compartments contained arrays of hexagonal or cylindrical glass capillaries of varying inner diameters, for differing restraint of water diffusion. The sensitivity of diffusion imaging metrics to signal-to-noise ratio (SNR) was probed by doping compartments with differing ratios of deuterium oxide to H2O. A cork phantom enclosure was constructed to increase thermal stability during scanning and a cork holder was made to reproduce scanner positioning. Four different protocols of DWI (diffusion weighted imaging) and DTI (Diffusion tensor imaging) imaging were assembled on a GE Excite HDx 3.0T MRI scanner to collect imaging data over 9-10 days. Data was processed with in-house software created in Matlab to obtain fractional anisotropy (FA) and apparent diffusion coefficient (ADC) values. Results: All DTI and DWI sequences showed good longitudinal stability of mean FA and ADC values per compartment, exhibiting low standard deviation ∼9%. A t-test was performed to compare mean FA values from the DTI clinical protocol to those of the DTI special protocol, indicating significantly different values in the majority of compartments. ANOVA performed on ADC values for all DTI and DWI sequences also showed significantly different values in a majority of compartments. Conclusion: This work has the potential for quantifying systemic variations between diffusion imaging sequences from different platforms. Characterization of DWI and DTI performance were done over four sequences with predictable results. This data suggests that the DQIP phantom may be a reliable method of monitoring day-to-day and scan-to-scan variation in

  5. A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance: Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Grimaila, Michael R

    2010-01-01

    In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysis Protocol (MAAP) in this context.

  6. Optimal routing of IP packets to multi-homed servers

    SciTech Connect (OSTI)

    Swartz, K.L.

    1992-08-01

    Multi-homing, or direct attachment to multiple networks, offers both performance and availability benefits for important servers on busy networks. Exploiting these benefits to their fullest requires a modicum of routing knowledge in the clients. Careful policy control must also be reflected in the routing used within the network to make best use of specialized and often scarce resources. While relatively straightforward in theory, this problem becomes much more difficult to solve in a real network containing often intractable implementations from a variety of vendors. This paper presents an analysis of the problem and proposes a useful solution for a typical campus network. Application of this solution at the Stanford Linear Accelerator Center is studied and the problems and pitfalls encountered are discussed, as are the workarounds used to make the system work in the real world.

  7. WP-07 IP Rebuttal Testimony (wp07/initial)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (DOEBP-3694) Dates Subject WP-07 Pages PDF File Size Filed on Parties Site Linked on This Page Financial Strategy and Risk Tolerance WP-07-E-BPA-30 17 200 kb 03-06-2006...

  8. Research Study - Global Enterprise VoIP Equipment Market Forecasts...

    Open Energy Info (EERE)

    we deeply analyzed the world's main region market conditions that including the product price, profit, capacity, production, capacity utilization, supply, demand and industry...

  9. WP-07 IP Direct Testimony (wp07/initial)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    total of twenty (20) direct testimony documents that have been packaged into three (3) books (see below). This page provides direct links to the Direct Testimony books on the Rate...

  10. MHK Technologies/IPS OWEC Buoy | Open Energy Information

    Open Energy Info (EERE)

    electricity from ocean waves at a cost competitive with fossil fuel generated power Cluster of buoys gives energy and act as wave breaker Off shore wave energy converters and...

  11. MS4 & IP Connection - PowerPoint Presentation

    SciTech Connect (OSTI)

    Lemke, Terrill W.

    2015-05-20

    An overview of Los Alamos National Lab’s (LANL) storm sewer system, the presentation includes information on the management storm sewer permit and environmental programs and projects of LANL institutions.

  12. Industrial Plant Services Australia Pty Ltd IPS | Open Energy...

    Open Energy Info (EERE)

    New South Wales, Australia Zip: 2099 Sector: Services Product: Australian Subsidiary of Man Ferrostaal. The company sells and services equipment and plants for the ferrous,...

  13. WP-07 IP Studies & Documentation (wp07/initial)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Initial Proposal Studies and Documentation were provided to rate case parties on CD-ROM at the Prehearing Conference and filed with the hearing clerk via the Rate Case Parties...

  14. Providing Internet access to Los Alamos National Laboratory technical reports: A case history in providing public access to previously restricted documents

    SciTech Connect (OSTI)

    Collins, K.A.

    1996-12-31

    The Los Alamos National Laboratory (LANL) Research Library recently fulfilled a strategic goal of providing worldwide desktop access via the Internet to full-image files of the complete unclassified holdings of Los Alamos technical reports in its Report Collection. This effort began in late 1994 with the scanning of paper and microfiche format reports. Concurrently, the Research Library helped to initiate shifting the model for publishing new technical reports from paper to electronic; the files could then be directly mounted on the Research Library`s Web server. Providing desktop access to these reports was instrumental in expediting the development of internal policies that would better define what documents, previously restricted to the general public, could be publicly released. Undoubtedly, the most significant category of such reports were previously classified reports that had been declassified, but had not gone through a further review for public release. Collaboration with LANL`s Classification Group led to approval for public release of 97% of these reports. The LANL Research Library`s Web site now offers unique and unprecedented access to the world of a huge body of technical reports never available before anywhere in any form. This paper discusses the issues and steps involved in this achievement.

  15. Disaggregated analysis of US energy consumption in the 1990s: Evidence of the effects of the internet and rapid economic growth

    SciTech Connect (OSTI)

    Murtishaw, Scott; Schipper, Lee

    2001-07-01

    This paper decomposes US energy use from 1988 to 1998 and attributes the changes in energy use to three underlying factors: activity, structure, and intensity. For this study we use a bottom-up methodology, by separately decomposing delivered energy use in six sectors: travel, freight, manufacturing industries, non-manufacturing industries, residential, and services. The most commonly used indicator of energy efficiency in the total economy, the ratio of energy consumed to unit of GDP (E/GDP) created can often be misleading. The rapid decline in the E/GDP ratio in recent years has been used to support assertions that the Internet and information technologies in general have enabled improvements in energy efficiencies. However, our disaggregate analysis suggests that energy intensities on average are falling more slowly than ever before while actual energy use increased faster than at any time since 1970. The decline in the E/GDP ratio in the mid-to late 1990s owes much more to structural changes in the demand for energy services than to falling energy intensities.

  16. Internet Based, GIS Catalog of Non-Traditional Sources of Cooling Water for Use at America's Coal-Fired Power Plants

    SciTech Connect (OSTI)

    J. Daniel Arthur

    2011-09-30

    In recent years, rising populations and regional droughts have caused coal-fired power plants to temporarily curtail or cease production due to a lack of available water for cooling. In addition, concerns about the availability of adequate supplies of cooling water have resulted in cancellation of plans to build much-needed new power plants. These issues, coupled with concern over the possible impacts of global climate change, have caused industry and community planners to seek alternate sources of water to supplement or replace existing supplies. The Department of Energy, through the National Energy Technology Laboratory (NETL) is researching ways to reduce the water demands of coal-fired power plants. As part of the NETL Program, ALL Consulting developed an internet-based Catalog of potential alternative sources of cooling water. The Catalog identifies alternative sources of water, such as mine discharge water, oil and gas produced water, saline aquifers, and publicly owned treatment works (POTWs), which could be used to supplement or replace existing surface water sources. This report provides an overview of the Catalog, and examines the benefits and challenges of using these alternative water sources for cooling water.

  17. Channel-capacity gain in entanglement-assisted communication protocols based exclusively on linear optics, single-photon inputs, and coincidence photon counting

    SciTech Connect (OSTI)

    Lougovski, P.; Uskov, D. B.

    2015-08-04

    Entanglement can effectively increase communication channel capacity as evidenced by dense coding that predicts a capacity gain of 1 bit when compared to entanglement-free protocols. However, dense coding relies on Bell states and when implemented using photons the capacity gain is bounded by 0.585 bits due to one's inability to discriminate between the four optically encoded Bell states. In this research we study the following question: Are there alternative entanglement-assisted protocols that rely only on linear optics, coincidence photon counting, and separable single-photon input states and at the same time provide a greater capacity gain than 0.585 bits? In this study, we show that besides the Bell states there is a class of bipartite four-mode two-photon entangled states that facilitate an increase in channel capacity. We also discuss how the proposed scheme can be generalized to the case of two-photon N-mode entangled states for N=6,8.

  18. Channel-capacity gain in entanglement-assisted communication protocols based exclusively on linear optics, single-photon inputs, and coincidence photon counting

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lougovski, P.; Uskov, D. B.

    2015-08-04

    Entanglement can effectively increase communication channel capacity as evidenced by dense coding that predicts a capacity gain of 1 bit when compared to entanglement-free protocols. However, dense coding relies on Bell states and when implemented using photons the capacity gain is bounded by 0.585 bits due to one's inability to discriminate between the four optically encoded Bell states. In this research we study the following question: Are there alternative entanglement-assisted protocols that rely only on linear optics, coincidence photon counting, and separable single-photon input states and at the same time provide a greater capacity gain than 0.585 bits? In thismore » study, we show that besides the Bell states there is a class of bipartite four-mode two-photon entangled states that facilitate an increase in channel capacity. We also discuss how the proposed scheme can be generalized to the case of two-photon N-mode entangled states for N=6,8.« less

  19. EIA-22M, Monthly Biodiesel Production Survey Page 1 EIA-22M

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    With the Internet-based option, EIA uses security protocols to protect the information ... For the purposes of firm classification, a firm primarily engaged in the development and...

  20. FEDERAL ACQUISITION CIRCULAR 2005-38 SUMMARY Item Subject FAR...

    Broader source: Energy.gov (indexed) [DOE]

    Card 2006-026 Restrictions for Treasury Offset Program Debts. I11 ... Internet Protocol Version 6 (IPv6) 2005-04 1 IV ... Federal Food Donation Act of...

  1. Policy Flash 2011-96 | Department of Energy

    Office of Environmental Management (EM)

    versions of the following sixteen RFP Section H clause templates: 1) COMPLIANCE WITH INTERNET PROTOCOL VERSION 6 (IPV6) IN ACQUIRING INFORMATION TECHNOLOGY, 2) CONTRACTOR...

  2. U

    U.S. Energy Information Administration (EIA) Indexed Site

    respondents should submit data electronically using EIA's secure Single Sign-On internet data collection system. This system uses security protocols to protect information...

  3. SU-F-BRD-05: Dosimetric Comparison of Protocol-Based SBRT Lung Treatment Modalities: Statistically Significant VMAT Advantages Over Fixed- Beam IMRT

    SciTech Connect (OSTI)

    Best, R; Harrell, A; Geesey, C; Libby, B; Wijesooriya, K

    2014-06-15

    Purpose: The purpose of this study is to inter-compare and find statistically significant differences between flattened field fixed-beam (FB) IMRT with flattening-filter free (FFF) volumetric modulated arc therapy (VMAT) for stereotactic body radiation therapy SBRT. Methods: SBRT plans using FB IMRT and FFF VMAT were generated for fifteen SBRT lung patients using 6 MV beams. For each patient, both IMRT and VMAT plans were created for comparison. Plans were generated utilizing RTOG 0915 (peripheral, 10 patients) and RTOG 0813 (medial, 5 patients) lung protocols. Target dose, critical structure dose, and treatment time were compared and tested for statistical significance. Parameters of interest included prescription isodose surface coverage, target dose heterogeneity, high dose spillage (location and volume), low dose spillage (location and volume), lung dose spillage, and critical structure maximum- and volumetric-dose limits. Results: For all criteria, we found equivalent or higher conformality with VMAT plans as well as reduced critical structure doses. Several differences passed a Student's t-test of significance: VMAT reduced the high dose spillage, evaluated with conformality index (CI), by an average of 9.4%15.1% (p=0.030) compared to IMRT. VMAT plans reduced the lung volume receiving 20 Gy by 16.2%15.0% (p=0.016) compared with IMRT. For the RTOG 0915 peripheral lesions, the volumes of lung receiving 12.4 Gy and 11.6 Gy were reduced by 27.0%13.8% and 27.5%12.6% (for both, p<0.001) in VMAT plans. Of the 26 protocol pass/fail criteria, VMAT plans were able to achieve an average of 0.20.7 (p=0.026) more constraints than the IMRT plans. Conclusions: FFF VMAT has dosimetric advantages over fixed beam IMRT for lung SBRT. Significant advantages included increased dose conformity, and reduced organs-at-risk doses. The overall improvements in terms of protocol pass/fail criteria were more modest and will require more patient data to establish difference trends of

  4. Data Network Equipment Energy Use and Savings Potential in Buildings

    SciTech Connect (OSTI)

    Lanzisera, Steven; Nordman, Bruce; Brown, Richard E.

    2010-06-09

    Network connectivity has become nearly ubiquitous, and the energy use of the equipment required for this connectivity is growing. Network equipment consists of devices that primarily switch and route Internet Protocol (IP) packets from a source to a destination, and this category specifically excludes edge devices like PCs, servers and other sources and sinks of IP traffic. This paper presents the results of a study of network equipment energy use and includes case studies of networks in a campus, a medium commercial building, and a typical home. The total energy use of network equipment is the product of the stock of equipment in use, the power of each device, and their usage patterns. This information was gathered from market research reports, broadband market penetration studies, field metering, and interviews with network administrators and service providers. We estimate that network equipment in the USA used 18 TWh, or about 1percent of building electricity, in 2008 and that consumption is expected to grow at roughly 6percent per year to 23 TWh in 2012; world usage in 2008 was 51 TWh. This study shows that office building network switches and residential equipment are the two largest categories of energy use consuming 40percent and 30percent of the total respectively. We estimate potential energy savings for different scenarios using forecasts of equipment stock and energy use, and savings estimates range from 20percent to 50percent based on full market penetration of efficient technologies.

  5. C–IBI: Targeting cumulative coordination within an iterative protocol to derive coarse-grained models of (multi-component) complex fluids

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    de Oliveira, Tiago E.; Netz, Paulo A.; Kremer, Kurt; Junghans, Christoph; Mukherji, Debashish

    2016-05-03

    We present a coarse-graining strategy that we test for aqueous mixtures. The method uses pair-wise cumulative coordination as a target function within an iterative Boltzmann inversion (IBI) like protocol. We name this method coordination iterative Boltzmann inversion (C–IBI). While the underlying coarse-grained model is still structure based and, thus, preserves pair-wise solution structure, our method also reproduces solvation thermodynamics of binary and/or ternary mixtures. In addition, we observe much faster convergence within C–IBI compared to IBI. To validate the robustness, we apply C–IBI to study test cases of solvation thermodynamics of aqueous urea and a triglycine solvation in aqueous urea.

  6. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    SciTech Connect (OSTI)

    Vine, E.; Sathaye, J.

    1997-12-01

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  7. Poster — Thur Eve — 06: Dose assessment of cone beam CT imaging protocols as part of SPECT/CT examinations

    SciTech Connect (OSTI)

    Tonkopi, E; Ross, AA

    2014-08-15

    Purpose: To assess radiation dose from the cone beam CT (CBCT) component of SPECT/CT studies and to compare with other CT examinations performed in our institution. Methods: We used an anthropomorphic chest phantom and the 6 cc ion chamber to measure entrance breast dose for several CBCT and diagnostic CT acquisition protocols. The CBCT effective dose was calculated with ImPACT software; the CT effective dose was evaluated from the DLP value and conversion factor, dependent on the anatomic region. The RADAR medical procedure radiation dose calculator was used to assess the nuclear medicine component of exam dose. Results: The entrance dose to the breast measured with the anthropomorphic phantom was 0.48 mGy and 9.41 mGy for cardiac and chest CBCT scans; and 4.59 mGy for diagnostic thoracic CT. The effective doses were 0.2 mSv, 3.2 mSv and 2.8 mSv respectively. For a small patient represented by the anthropomorphic phantom, the dose from the diagnostic CT was lower than from the CBCT scan, as a result of the exposure reduction options available on modern CT scanners. The CBCT protocols used the same fixed scanning techniques. The diagnostic CT dose based on the patient data was 35% higher than the phantom dose. For most SPECT/CT studies the dose from the CBCT component was comparable with the dose from the radiopharmaceutical. Conclusions: The patient radiation dose from the cone beam CT scan can be higher than that from a diagnostic CT and should be taken into consideration in evaluating total SPECT/CT patient dose.

  8. GROK

    Energy Science and Technology Software Center (OSTI)

    2006-02-24

    GROK is web based Internet Protocol (IP) search tool designed to help the user find and analyze network sessions in close to real time (5 minute). It reliew on the output generated by a packet capture and session summary tool called BAG. The bag program runs on a linux system, and continuously generates 5 minute full packet capture ILIBPCAP files, Internet session summary files, and interface statistic files, round-robin, over a period limited to themore » amount of disc storage available to the system. In the LANL case, an 8 terabyte file system accomodates seven days of data (most of the time). Summary information, such as top 20 outgoing and incoming network services (such as www/tcp or 161/udp) along with network interface statistics which indicate the health of the capture system are plotted every 5 minutes for display by the GROK web server. The grok home page presents the analyst with a set of search criteia used to query the information being collected by the bag program. Since the information ultimately resides in "pcap" files, other pcap aware programs such as bro ethereal, nosehair, smacqq, snort, and tcpdump have been incorporated into groks web interface. Clickable documentation is available for each search criteria« less

  9. SU-E-J-214: MR Protocol Development to Visualize Sirius MRI Markers in Prostate Brachytherapy Patients for MR-Based Post-Implant Dosimetry

    SciTech Connect (OSTI)

    Lim, T; Wang, J; Frank, S; Stafford, R; Bruno, T; Bathala, T; Mahmood, U; Pugh, T; Ibbott, G; Kudchadker, R

    2015-06-15

    Purpose: The current CT-based post-implant dosimetry allows precise seed localization but limited anatomical delineation. Switching to MR-based post-implant dosimetry is confounded by imprecise seed localization. One approach is to place positive-contrast markers (Sirius) adjacent to the negative-contrast seeds. This patient study aims to assess the utility of a 3D fast spoiled gradient-recalled echo (FSPGR) sequence to visualize Sirius markers for post-implant dosimetry. Methods: MRI images were acquired in prostate implant patients (n=10) on Day 0 (day-of-implant) and Day 30. The post-implant MR protocol consisted of 3D T2-weighted fast-spin-echo (FSE), T2-weighted 2D-FSE (axial) and T1-weighted 2D-FSE (axial/sagittal/coronal). We incorporated a 3D-FSPGR sequence into the post-implant MR protocol to visualize the Sirius markers. Patients were scanned with different number-of-excitations (6, 8, 10), field-of-view (10cm, 14cm, 18cm), slice thickness (1mm, 0.8mm), flip angle (14 degrees, 20 degrees), bandwidth (122.070 Hz/pixel, 325.508 Hz/pixel, 390.625 Hz/pixel), phase encoding steps (160, 192, 224, 256), frequency-encoding direction (right/left, anterior/posterior), echo-time type (minimum-full, out-of-phase), field strength (1.5T, 3T), contrast (with, without), scanner vendor (Siemens, GE), coil (endorectal-coil only, endorectal-and-torso-coil, torsocoil only), endorectal-coil filling (30cc, 50cc) and endorectal-coil filling type (air, perfluorocarbon [PFC]). For post-implant dosimetric evaluation with greater anatomical detail, 3D-FSE images were fused with 3D-FSPGR images. For comparison with CT-based post-implant dosimetry, CT images were fused with 3D-FSPGR images. Results: The 3D-FSPGR sequence facilitated visualization of markers in patients. Marker visualization helped distinguish signal voids as seeds versus needle tracks for more definitive MR-based post-implant dosimetry. On the CT-MR fused images, the distance between the seed on CT to MR images was 3

  10. SU-E-I-78: Establishing a Protocol for Quick Estimation of Thyroid Internal Contamination with 131I in Normal and Emergency Situations

    SciTech Connect (OSTI)

    Naderi, S Mehdizadeh; Karimipourfard, M; Lotfalizadeh, F; Zamani, E; Molaeimanesh, Z; Sadeghi, M; Sina, S; Faghihi, R; Entezarmahdi, M

    2015-06-15

    Purpose: I-131 is one of the most frequent radionuclides used in nuclear medicine departments. The radiation workers, who manipulate the unsealed radio-toxic iodine, should be monitored for internal contamination. In this study a protocol was established for estimating I-131 activity absorbed in the thyroid glands of the nuclear medicine staff in normal working condition and also in accidents. Methods: I-131 with the activity of 10 μCi was injected inside the thyroid gland of a home-made anthropomorphic neck phantom. The phantom is made up of PMMA as soft tissue, and Aluminium as bone. The dose rate at different distances from the surface of the neck phantom was measured using a scintillator detector for duration of two months. Then, calibration factors were obtained, for converting the dose rate at each distance to the iodine activity inside the thyroid. Results: According to the results of this study, the calibration factors for converting the dose rates (nSv/h) at distances of 0cm, 1cm, 6cm, 11cm, and 16cm to the activity (kBq) inside the thyroid were found to be 0.03, 0.04, 0.14, 0.29, and 0.49 . Conclusion: This method can be effectively used for quick estimation of the I-131 concentration inside the thyroid of the staff for daily checks in normal working conditions and also in accidents.

  11. Decontamination systems information and research program -- Literature review in support of development of standard test protocols and barrier design models for in situ formed barriers project

    SciTech Connect (OSTI)

    1994-12-01

    The US Department of Energy is responsible for approximately 3,000 sites in which contaminants such as carbon tetrachloride, trichlorethylene, perchlorethylene, non-volatile and soluble organic and insoluble organics (PCBs and pesticides) are encountered. In specific areas of these sites radioactive contaminants are stored in underground storage tanks which were originally designed and constructed with a 30-year projected life. Many of these tanks are now 10 years beyond the design life and failures have occurred allowing the basic liquids (ph of 8 to 9) to leak into the unconsolidated soils below. Nearly one half of the storage tanks located at the Hanford Washington Reservation are suspected of leaking and contaminating the soils beneath them. The Hanford site is located in a semi-arid climate region with rainfall of less than 6 inches annually, and studies have indicated that very little of this water finds its way to the groundwater to move the water down gradient toward the Columbia River. This provides the government with time to develop a barrier system to prevent further contamination of the groundwater, and to develop and test remediation systems to stabilize or remove the contaminant materials. In parallel to remediation efforts, confinement and containment technologies are needed to retard or prevent the advancement of contamination plumes through the environment until the implementation of remediation technology efforts are completed. This project examines the various confinement and containment technologies and protocols for testing the materials in relation to their function in-situ.

  12. DNA extraction protocols cause differences in 16S rRNA amplicon sequencing efficiency but not in community profile composition or structure

    SciTech Connect (OSTI)

    2014-12-01

    The recent development of methods applying next-generation sequencing to microbial community characterization has led to the proliferation of these studies in a wide variety of sample types. Yet, variation in the physical properties of environmental samples demands that optimal DNA extraction techniques be explored for each new environment. The microbiota associated with many species of insects offer an extraction challenge as they are frequently surrounded by an armored exoskeleton, inhibiting disruption of the tissues within. In this study, we examine the efficacy of several commonly used protocols for extracting bacterial DNA from ants. While bacterial community composition recovered using Illumina 16S rRNA amplicon sequencing was not detectably biased by any method, the quantity of bacterial DNA varied drastically, reducing the number of samples that could be amplified and sequenced. These results indicate that the concentration necessary for dependable sequencing is around 10,000 copies of target DNA per microliter. Exoskeletal pulverization and tissue digestion increased the reliability of extractions, suggesting that these steps should be included in any study of insect-associated microorganisms that relies on obtaining microbial DNA from intact body segments. Although laboratory and analysis techniques should be standardized across diverse sample types as much as possible, minimal modifications such as these will increase the number of environments in which bacterial communities can be successfully studied.

  13. DNA extraction protocols cause differences in 16S rRNA amplicon sequencing efficiency but not in community profile composition or structure

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    None

    2014-12-01

    The recent development of methods applying next-generation sequencing to microbial community characterization has led to the proliferation of these studies in a wide variety of sample types. Yet, variation in the physical properties of environmental samples demands that optimal DNA extraction techniques be explored for each new environment. The microbiota associated with many species of insects offer an extraction challenge as they are frequently surrounded by an armored exoskeleton, inhibiting disruption of the tissues within. In this study, we examine the efficacy of several commonly used protocols for extracting bacterial DNA from ants. While bacterial community composition recovered using Illuminamore » 16S rRNA amplicon sequencing was not detectably biased by any method, the quantity of bacterial DNA varied drastically, reducing the number of samples that could be amplified and sequenced. These results indicate that the concentration necessary for dependable sequencing is around 10,000 copies of target DNA per microliter. Exoskeletal pulverization and tissue digestion increased the reliability of extractions, suggesting that these steps should be included in any study of insect-associated microorganisms that relies on obtaining microbial DNA from intact body segments. Although laboratory and analysis techniques should be standardized across diverse sample types as much as possible, minimal modifications such as these will increase the number of environments in which bacterial communities can be successfully studied.« less

  14. CCS Project Permit Acquisition Protocols

    SciTech Connect (OSTI)

    Lee, Si-Yong; Zaluski, Wade; Matthews, Vince; McPherson, Brian

    2013-06-30

    Geologic carbon storage projects require a vast range of permits prior to deployment. These include land-access permits, drilling permits, seismic survey permits, underground injection control permits, and any number of local and state permits, depending on the location of the project. For the “Characterization of Most Promising Sequestration Formations in the Rocky Mountain Region” (RMCCS) project in particular, critical permits included site access permits, seismic survey permits, and drilling permits for the characterization well. Permits for these and other activities were acquired either prior to or during the project.

  15. Kyoto Protocol | Open Energy Information

    Open Energy Info (EERE)

    The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over...

  16. Information requested in Protocol No

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... wind energy by forecasting the availability and timing of wind-powered generation. ... Over time, developments like these will lower the costs of regulation as well as provide ...

  17. Independent Oversight Appraisal Process Protocols

    Broader source: Energy.gov (indexed) [DOE]

    and time-saving way to determine whether a large number of people possess a specific body of knowledge. Knowledge tests may be written or oral, or a combination of the two,...

  18. Seismicity Protocol | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report Microearthquake Technology for EGS Fracture Characterization Monitoring...

  19. Chapter 16: Retrocommissioning Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    Retrocommissioning (RCx) is a systematic process for optimizing energy performance in existing buildings. It specifically focuses on improving the control of energy-using equipment (e.g., heating, ventilation, and air conditioning equipment and lighting) and typically does not involve equipment replacement. Field results have shown proper RCx can achieve energy savings ranging from 5% to 20%, with a typical payback of 2 years or less. A study conducted on behalf of Lawrence Berkeley National Laboratory analyzed data from 11 utilities operating RCx programs across the United States. The dataset included 122 RCx projects and more than 950 RCx measures.

  20. Information requested in Protocol No

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1, 2010 Smart Grid RFI U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Re: Smart Grid RFI: Addressing Policy and Logistical Challenges In response to the Department of Energy's (DOE) Request for Information regarding smart grid implementation listed in the September 17, 2010 Federal Register, the New York Independent System Operator, Inc. (NYISO) offers the attached white paper entitled "Envisioning

  1. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  2. Chapter 17: Residential Behavior Protocol

    SciTech Connect (OSTI)

    Stewart, J.; Todd, A.

    2015-01-01

    Residential behavior-based (BB) programs use strategies grounded in the behavioral social sciences to influence household energy use. Strategies may include providing households with real-time or delayed feedback about their energy use; supplying energy-efficiency education and tips; rewarding households for reducing their energy use; comparing households to their peers; and establishing games, tournaments, and competitions. BB programs often target multiple energy end uses and encourage energy savings, demand savings, or both. Savings from BB programs are usually a small percentage of energy use, typically less than 5%.

  3. DoseVolume Modeling of Brachial Plexus-Associated Neuropathy After Radiation Therapy for Head-and-Neck Cancer: Findings From a Prospective Screening Protocol

    SciTech Connect (OSTI)

    Chen, Allen M.; Wang, Pin-Chieh; Daly, Megan E.; Cui, Jing; Hall, William H.; Vijayakumar, Srinivasan; Phillips, Theodore L.; Farwell, D. Gregory; Purdy, James A.

    2014-03-15

    Purpose: Data from a prospective screening protocol administered for patients previously irradiated for head-and-neck cancer was analyzed to identify dosimetric predictors of brachial plexus-associated neuropathy. Methods and Materials: Three hundred fifty-two patients who had previously completed radiation therapy for squamous cell carcinoma of the head and neck were prospectively screened from August 2007 to April 2013 using a standardized self-administered instrument for symptoms of neuropathy thought to be related to brachial plexus injury. All patients were disease-free at the time of screening. The median time from radiation therapy was 40 months (range, 6-111 months). A total of 177 patients (50%) underwent neck dissection. Two hundred twenty-one patients (63%) received concurrent chemotherapy. Results: Fifty-one patients (14%) reported brachial plexus-related neuropathic symptoms withthe most common being ipsilateral pain (50%), numbness/tingling (40%), and motor weakness and/or muscle atrophy (25%). The 3- and 5-year estimates of freedom from brachial plexus-associated neuropathy were 86% and 81%, respectively. Clinical/pathological N3 disease (P<.001) and maximum radiation dose to the ipsilateral brachial plexus (P=.01) were significantly associated with neuropathic symptoms. Cox regression analysis revealed significant dosevolume effects for brachial plexus-associated neuropathy. The volume of the ipsilateral brachial plexus receiving >70 Gy (V70) predicted for symptoms, with the incidence increasing with V70 >10% (P<.001). A correlation was also observed for the volume receiving >74 Gy (V74) among patients treated without neck dissection, with a cutoff of 4% predictive of symptoms (P=.038). Conclusions: Dosevolume guidelines were developed for radiation planning that may limit brachial plexus-related neuropathies.

  4. Improved protocol to purify untagged amelogenin – Application to murine amelogenin containing the equivalent P70→T point mutation observed in human amelogenesis imperfecta

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Buchko, Garry W.; Shaw, Wendy J.

    2014-10-13

    Amelogenin is the predominant extracellular protein responsible for converting carbonated hydroxyapatite into dental enamel, the hardest and most heavily mineralized tissue in vertebrates. Despite much effort, the precise mechanism by which amelogenin regulates enamel formation is not fully understood. To assist efforts aimed at understanding the biochemical mechanism of enamel formation, more facile protocols to purify recombinantly expressed amelogenin, ideally without any tag to assist affinity purification, are advantageous. Here we describe an improved method to purify milligram quantities of amelogenin that exploits its high solubility in 2% glacial acetic acid under conditions of low ionic strength. The method involvesmore » heating the frozen cell pellet for two 15 min periods at ~70 ºC with two minutes of sonication in between, dialysis twice in 2% acetic acid (1:250 v/v), and reverse phase chromatography. A further improvement in yield is obtained by resuspending the frozen cell pellet in 6 M guanidine hydrochloride in the first step. The acetic acid heating method is illustrated with a murine amelogenin containing the corresponding P70→T point mutation observed in an human amelogenin associated with amelogenesis imperfecta (P71T), while the guanidine hydrochloride heating method is illustrated with wild type murine amelogenin (M180). The self-assembly properties of P71T were probed by NMR chemical shift perturbation studies as a function of protein (0.1 to 1.8 mM) and NaCl (0 to 367 mM) concentration. In conclusion, relative to similar studies with wild type murine amelogenin, P71T self-associates at lower protein or salt concentrations with the interactions initiated near the N-terminus.« less

  5. Wireless Sensor Node Power Profiling Based on IEEE 802.11 and IEEE 802.15.4 Communication Protocols. Modeling and Simulation

    SciTech Connect (OSTI)

    Agarwal, Vivek; Richardson, Joseph; Zhang, Yanliang

    2015-10-01

    retransmission, which result in unanticipated power losses. This report focuses rigorous stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers 802.11 and 802.15.4 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The report will present development of an expression to compute the expected energy consumption per operational cycle of a schedule-driven WSN by taking into consideration the node level activities, i.e., sensing and processing, and the network level activities, i.e., channel access, packet collision, retransmission attempts, and transmission of a data packet.

  6. Clients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at NERSC, you will need to grant access for TCP connections originating... Read More ftp Files can be transferred to and from HPSS via the standard internet protocol FTP. Read...

  7. ftp

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ftp ftp Files can be transferred between HPSS and remote sites via the standard internet protocol ftp, however, being non-parallel the performance of ftp will probably not be as...

  8. June 2011 Monthly News Roundup | U.S. DOE Office of Science ...

    Office of Science (SC) Website

    ... This massive exercise was akin to a "test drive" where content was shared and networks were configured to support Internet Protocol version 6 (IPv6), which is already supplanting ...

  9. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    SciTech Connect (OSTI)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  10. Microsoft Word - Internet Write-Up.doc

    Energy Savers [EERE]

    Sandia National Laboratories Nuclear Weapons Safety Program (U) DOEIG-0799 July 2008 The following is an unclassified summary of the classified Audit Report on "Sandia National ...

  11. internet of things | OpenEI Community

    Open Energy Info (EERE)

    - 13:42 How cleantech-as-a-service will drive renewable energy adoption 2015 adoption Big Data clean tech clean-tech cleantech cleantech forum cleantech-as-a-service cloud...

  12. Method for gathering and summarizing internet information

    DOE Patents [OSTI]

    Potok, Thomas E.; Elmore, Mark Thomas; Reed, Joel Wesley; Treadwell, Jim N.; Samatova, Nagiza Faridovna

    2008-01-01

    A computer method of gathering and summarizing large amounts of information comprises collecting information from a plurality of information sources (14, 51) according to respective maps (52) of the information sources (14), converting the collected information from a storage format to XML-language documents (26, 53) and storing the XML-language documents in a storage medium, searching for documents (55) according to a search query (13) having at least one term and identifying the documents (26) found in the search, and displaying the documents as nodes (33) of a tree structure (32) having links (34) and nodes (33) so as to indicate similarity of the documents to each other.

  13. System for gathering and summarizing internet information

    DOE Patents [OSTI]

    Potok, Thomas E.; Elmore, Mark Thomas; Reed, Joel Wesley; Treadwell, Jim N.; Samatova, Nagiza Faridovna

    2006-07-04

    A computer method of gathering and summarizing large amounts of information comprises collecting information from a plurality of information sources (14, 51) according to respective maps (52) of the information sources (14), converting the collected information from a storage format to XML-language documents (26, 53) and storing the XML-language documents in a storage medium, searching for documents (55) according to a search query (13) having at least one term and identifying the documents (26) found in the search, and displaying the documents as nodes (33) of a tree structure (32) having links (34) and nodes (33) so as to indicate similarity of the documents to each other.

  14. Method for gathering and summarizing internet information

    DOE Patents [OSTI]

    Potok, Thomas E.; Elmore, Mark Thomas; Reed, Joel Wesley; Treadwell, Jim N.; Samatova, Nagiza Faridovna

    2010-04-06

    A computer method of gathering and summarizing large amounts of information comprises collecting information from a plurality of information sources (14, 51) according to respective maps (52) of the information sources (14), converting the collected information from a storage format to XML-language documents (26, 53) and storing the XML-language documents in a storage medium, searching for documents (55) according to a search query (13) having at least one term and identifying the documents (26) found in the search, and displaying the documents as nodes (33) of a tree structure (32) having links (34) and nodes (33) so as to indicate similarity of the documents to each other.

  15. Final Report on Internet Addressable Lightswitch

    SciTech Connect (OSTI)

    Rubinstein, Francis; Pettler, Peter

    2001-08-27

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be economi cally installed even in existing buildings that were not wired for dual-level lighting.

  16. Industrial Dojo Program Fosters Industrial Internet Development...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SAN RAMON, CA-May 11, 2015-GE Software (NYSE: GE) today announced its 'Industrial Dojo,' ... The Cloud Foundry Dojo program allows software developers to immerse themselves in open ...

  17. DECADE_for Internet.indd

    Broader source: Energy.gov (indexed) [DOE]

    ... Care of these former mill sites was the responsibility of the DOE offi ce in Grand Junction, Colorado. In addition, DOE had completed cleanup at a number of sites under the ...

  18. Microsoft Word - Document in Microsoft Internet Explorer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8 Figure 1. Overview of the GRP94 structure. The two protomers of the GRP94 dimer are shown in blue and cyan. (A) Ribbon drawing of side and top views. The two N- terminal domains of the dimer do not interact, causing the misalignment of ATP hydrolysis residues. (B) Stereo surface view of the GRP94 dimer. The twisted V shape is readily apparent. Structures of GRP94-Nucleotide Complexes Reveal Mechanistic Differences between the Hsp90 Chaperones Life depends on the biochemical activity of the

  19. Secure Healthcare Internet Employee Learning Drill

    SciTech Connect (OSTI)

    2005-08-01

    SHIELD solves the problem of rapidly training large numbers of healthcare or other facility personnel who work around the clock - especially the non-professional semi-skilled employees who usually have "first contact" with patients and visitors - about how to limit or prevent exposure of facilities to infectious illness or other disease threats. This tool provides a very brief, realistic training experience that shows a range of facility personnel how to identify and respond to possible acute infectious respiratory illness outbreaks.

  20. Secure Healthcare Internet Employee Learning Drill

    Energy Science and Technology Software Center (OSTI)

    2005-08-01

    SHIELD solves the problem of rapidly training large numbers of healthcare or other facility personnel who work around the clock - especially the non-professional semi-skilled employees who usually have "first contact" with patients and visitors - about how to limit or prevent exposure of facilities to infectious illness or other disease threats. This tool provides a very brief, realistic training experience that shows a range of facility personnel how to identify and respond to possiblemore » acute infectious respiratory illness outbreaks.« less

  1. Geo-Engineering through Internet Informatics (GEMINI)

    SciTech Connect (OSTI)

    Watney, W. Lynn; Doveton, John H.; Victorine, John R.; Bohling, Goeffrey C.; Bhattacharya, Saibal; Byers, Alan P.; Carr, Timothy R.; Dubois, Martin K.; Gagnon, Glen; Guy, Willard J.; Look, Kurt; Magnuson, Mike; Moore, Melissa; Olea, Ricardo; Pakalapadi, Jayprakash; Stalder, Ken; Collins, David R.

    2002-06-25

    GEMINI will resolve reservoir parameters that control well performance; characterize subtle reservoir properties important in understanding and modeling hydrocarbon pore volume and fluid flow; expedite recognition of bypassed, subtle, and complex oil and gas reservoirs at regional and local scale; differentiate commingled reservoirs; build integrated geologic and engineering model based on real-time, iterate solutions to evaluate reservoir management options for improved recovery; provide practical tools to assist the geoscientist, engineer, and petroleum operator in making their tasks more efficient and effective; enable evaluations to be made at different scales, ranging from individual well, through lease, field, to play and region (scalable information infrastructure); and provide training and technology transfer to evaluate capabilities of the client.

  2. Microsoft Word - Document in Microsoft Internet Explorer

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Status of the Mixed Oxide Fuel Fabrication Facility DOE/IG-0713 December 2005 STATUS OF THE MIXED OXIDE FUEL FABRICATION FACILITY TABLE OF CONTENTS MOX Facility Design Costs Details of Finding 1 Recommendations 5 Comments 6 Appendices Objective, Scope, and Methodology 9 Prior Audit Reports 11 Management Comments 12 MOX Facility Design Costs Page 1 Details of Finding Design and The audit disclosed that the cost of the Mixed Oxide Fuel Construction Budget Facility (MOX) will significantly exceed

  3. (for Gene Recognition Analysis Internet Link),

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientific Impact: About 1,000 biotechnology companies and laboratories now use GRAIL to track down genes that play a role in human disease. The program has become increasingly ...

  4. Latest ASERs Available on the Internet

    Broader source: Energy.gov (indexed) [DOE]

    Site and Web Address ASER Contact Name E-mail Ames Laboratory https:www.ameslab.gov... Tracy.Ribeiro@lm.doe.gov 2 Site and Web Address ASER Contact Name E-mail Grand ...

  5. BAG (Continuous Round Robin Packet Capture)

    SciTech Connect (OSTI)

    Wood, C. Philip

    2006-03-10

    Bag is a miniature pcap filter which takes pcap input (or input off the wire) using a bpf filter, if specified, and then writes the output to stdout or a file (in pcap format). It depends for some aspects of its functionality on a libpcap library which uses a shared memory packet capture ring bugger. There are two build in modules: chcksum and session. the build in chcksum modules is used to anonymize the ip addresses and repair any checksums in the stream. % bag -r /tmp/*.pcap -Cchucksum, 128.1 65: 10.10 The session module generates sessions which are defined as a series of packets that have two things in common. the first is a unique five-tuple composed oi an IP protocol, IP source address, IP source port, IP destination address, and IP destination port. The second is that if the originating packet is associated with a bi-directional service such as ftpltcp, characteristics and data will be kept for both flows involved with the service. The only protocols evaluated beyond the IP header are ICMP, TCP and UDP. A session can last for as long as bag is running. However, under normal conditions, sessions are generated every time they appear to have closed down. There is a man page included with the distribution which goes into more detail.

  6. Tera-node Network Technology (TASK 4) Network Infrastructure Activities (NIA) final report

    SciTech Connect (OSTI)

    Postel, John; Bannister, Joe

    2000-03-15

    The TNT project developed software technologies in scalable personal telecommunications (SPT), Reservation Protocol 2 (RSVP2), Scalable Computing Infrastructure (SCOPE), and Network Infrastructure Activities (NIA). SPT = developed many innovative protocols to support the use of videoconferencing applications on the Internet. RSVP2 = developed a new reference model and further standardization of RSVP. SCOPE = developed dynamic resource discovery techniques and distributed directory services in support of resource allocation for large distributed systems and computations. NIA = provided policy, operational, and support to the transitioning Internet.

  7. Quantitative Visualization of ChIP-chip Data by Using Linked...

    Office of Scientific and Technical Information (OSTI)

    As a result, it is critical to have a tool to facilitate the quantitative visualization of differences between transcription factors and the genomic regions they bind to understand ...

  8. Microsoft Word - PortTownsend IP Contract 10_08_09.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be deemed unreasonable for BPA to require credit security from an assignee with a Moody's credit rating below "A" or the equivalent if rated by another credit rating agency. No...

  9. Microsoft Word - PT IP Contract 02_02_11 Blackline.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be deemed unreasonable for BPA to require credit security from an assignee with a Moody's credit rating below "A" or the equivalent if rated by another credit rating agency. No...

  10. Microsoft Word - CFAC IP Sale 07 29 2011_blackline_ v2.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be deemed unreasonable for BPA to require credit security from an assignee with a Moody's credit rating below "A" or the equivalent if rated by another credit rating agency. No...

  11. Microsoft Word - PT IP Contract 04_20_11 Posted with edits.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be deemed unreasonable for BPA to require credit security from an assignee with a Moody's credit rating below "A" or the equivalent if rated 11PB-12330, Port Townsend 16 by another...

  12. Building-Grid Integration Research and Development Innovators Program (BIRD IP)

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Building Technologies Office (BTO) within the Department of Energy (DOE) is seeking graduate students interested in exploring building-grid integration and development (R&D) technology concepts that can improve the operating efficiency of buildings and increase penetration of distributed renewable energy generation, leading to more efficient buildings and cleaner generation of electricity.

  13. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  14. An Information Services Algorithm to Heuristically Summarize IP Addresses for a Distributed, Hierarchical Directory Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department of Energy An Explainer: How "Grid Modernization" Could Improve Your Life An Explainer: How "Grid Modernization" Could Improve Your Life January 14, 2016 - 1:10pm Addthis Understanding how the grid works is the first step to understanding our grid modernization efforts. This new video breaks it down. | Video by Simon Edelman, Energy Department. Franklin (Lynn) Orr Franklin (Lynn) Orr Under Secretary for Science and Energy KEY FACTS U.S. Department of Energy

  15. Blading designs to improve thermal performance of HP and IP steam turbines

    SciTech Connect (OSTI)

    Chen, S.; Martin, H.F.

    1996-12-31

    Improved blade designs are available for high pressure and intermediate pressure steam turbines for increased thermal efficiency. These designs and the technology used to develop and verify them are discussed in this paper. The blading designs include twisted blade designs and full three dimensional designs. Appropriate strategies are discussed for the application of these different types of blading for new and retrofit applications. The market place in the electric energy industry in the United States is changing. The impact of this change on the need for improved blade designs and application strategies for the use of this blading is also discussed.

  16. ChIP-seq Accurately Predicts Tissue-Specific Activity of Enhancers

    SciTech Connect (OSTI)

    Visel, Axel; Blow, Matthew J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Ren, Bing; Rubin, Edward M.; Pennacchio, Len A.

    2009-02-01

    A major yet unresolved quest in decoding the human genome is the identification of the regulatory sequences that control the spatial and temporal expression of genes. Distant-acting transcriptional enhancers are particularly challenging to uncover since they are scattered amongst the vast non-coding portion of the genome. Evolutionary sequence constraint can facilitate the discovery of enhancers, but fails to predict when and where they are active in vivo. Here, we performed chromatin immunoprecipitation with the enhancer-associated protein p300, followed by massively-parallel sequencing, to map several thousand in vivo binding sites of p300 in mouse embryonic forebrain, midbrain, and limb tissue. We tested 86 of these sequences in a transgenic mouse assay, which in nearly all cases revealed reproducible enhancer activity in those tissues predicted by p300 binding. Our results indicate that in vivo mapping of p300 binding is a highly accurate means for identifying enhancers and their associated activities and suggest that such datasets will be useful to study the role of tissue-specific enhancers in human biology and disease on a genome-wide scale.

  17. Microsoft Word - IP Public Meeting Agenda 07-12-12 final.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Permit for Storm Water Project Update Public Meeting Thursday, July 12, 2012 Cities of Gold Conference Center, Pojoaque, NM 5:30 - 7:30 5:30 View Posters 5:45 Meeting Opening ...

  18. Microsoft Word - IP Public Meeting Agenda 07-12-12 final.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Permit for Storm Water Project Update Public Meeting Thursday, July 12, 2012 Cities of Gold Conference Center, Pojoaque, NM 5:30 - 7:30 5:30 View Posters 5:45 Meeting Opening...

  19. IP CN Crosby, ND Natural Gas Pipeline Imports From Canada (Dollars per

    U.S. Energy Information Administration (EIA) Indexed Site

    Thousand Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 2010's -- 4.16 1.68

  20. IP CN Crosby, ND Natural Gas Pipeline Imports From Canada (Dollars per

    U.S. Energy Information Administration (EIA) Indexed Site

    Thousand Cubic Feet) Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2014 4.29 4.25 3.82 2.98 2015 2.10 2.28 2.30 2.17 2.04 1.72 1.57 1.58 1.69 1.66 1.40 1.04 2016 0.97

  1. DLC+VIT4IP (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  2. DLC+VIT4IP (Smart Grid Project) (Israel) | Open Energy Information

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  3. DLC+VIT4IP (Smart Grid Project) (Italy) | Open Energy Information

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  4. DLC+VIT4IP (Smart Grid Project) (Netherlands) | Open Energy Informatio...

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  5. DLC+VIT4IP (Smart Grid Project) (United Kingdom) | Open Energy...

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  6. DLC+VIT4IP (Smart Grid Project) (Belgium) | Open Energy Information

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  7. DLC+VIT4IP (Smart Grid Project) (Austria) | Open Energy Information

    Open Energy Info (EERE)

    applications. These shall include the existing power distribution network for novel services in smart electricity distribution networks such as demand side management,...

  8. HUD lead-based-paint abatement demonstration (FHA). Volume 2. Appendices i-p

    SciTech Connect (OSTI)

    Not Available

    1991-08-01

    The document is volume 2 of the two-volume appendices accompanying 'The HUD Lead-Based Paint Abatement Demonstration' report. The document contains paint testing, abatement, cleanup and disposal guidelines; the part NIOSH plays in the project; health and safety training manual; tables from Tractor Technology Resources; list of manufacturers; quality assurance project plan for collection and analysis of air and wipe samples; and release of housing unit from the demonstration.

  9. High Performance Computing Data Center Metering Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1.5% of all electricity used in the US at that time. The report then suggested that the overall consumption would rise ... computers utilized by end users, and servers and ...

  10. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform...

    Energy Savers [EERE]

    ... particular meter (e.g., electricity meter) to confidently ... or reporting consumption data and (2) confirm the reporting period inputs via the BAS front-end system, when ...

  11. House Simulation Protocols Report | Department of Energy

    Energy Savers [EERE]

    The ASHRAE Standard 152 spreadsheet tool, developed by Lawrence Berkeley National Laboratory, quantifies the delivery efficiency of duct systems, based on factors including ...

  12. BPA's proposed oversupply management protocol, Attachment P,...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    levels measured by the U.S. Army Corps of Engineers exceed Oregon and Washington water quality standards at projects that are spilling past unloaded turbines, the Transmission...

  13. Property:CommProtocol | Open Energy Information

    Open Energy Info (EERE)

    Doppler Volume Sampler + RS-232 + MHK ISDBInstrumentsVaisala WINDCAP Ultrasonic Wind Sensor WMT700 + RS-232 + MHK ISDBInstrumentsVector V102 GPS Compass + RS-232 + MHK ISDB...

  14. Eager protocol on a cache pipeline dataflow

    DOE Patents [OSTI]

    Ohmacht, Martin; Sugavanam, Krishnan

    2012-11-13

    A master device sends a request to communicate with a slave device to a switch. The master device waits for a period of cycles the switch takes to decide whether the master device can communicate with the slave device, and the master device sends data associated with the request to communicate at least after the period of cycles has passed since the master device sent the request to communicate to the switch without waiting to receive an acknowledgment from the switch that the master device can communicate with the slave device.

  15. Testing Protocol for Module Encapsulant Creep (Presentation)

    SciTech Connect (OSTI)

    Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

    2012-02-01

    Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

  16. FSEC's MEA Test Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presentation by Florida Solar Energy Center at the October 2008 High Temperature Membrane ... and Development Activity for High Temperature, Low Relative Humidity Membrane Program

  17. BPA's Proposed Oversupply Management Protocol Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    BPA developed and implemented its Interim Environmental Redispatch (ER) and Negative Pricing Policy to reduce TDG in May 2011. - BPA temporarily limited the output of wind...

  18. Optimal Decentralized Protocol for Electric Vehicle Charging

    SciTech Connect (OSTI)

    Gan, LW; Topcu, U; Low, SH

    2013-05-01

    We propose a decentralized algorithm to optimally schedule electric vehicle (EV) charging. The algorithm exploits the elasticity of electric vehicle loads to fill the valleys in electric load profiles. We first formulate the EV charging scheduling problem as an optimal control problem, whose objective is to impose a generalized notion of valley-filling, and study properties of optimal charging profiles. We then give a decentralized algorithm to iteratively solve the optimal control problem. In each iteration, EVs update their charging profiles according to the control signal broadcast by the utility company, and the utility company alters the control signal to guide their updates. The algorithm converges to optimal charging profiles (that are as "flat" as they can possibly be) irrespective of the specifications (e.g., maximum charging rate and deadline) of EVs, even if EVs do not necessarily update their charging profiles in every iteration, and use potentially outdated control signal when they update. Moreover, the algorithm only requires each EV solving its local problem, hence its implementation requires low computation capability. We also extend the algorithm to track a given load profile and to real-time implementation.

  19. Combustion Safety Simplified Test Protocol Field Study

    SciTech Connect (OSTI)

    Brand, L; Cautley, D.; Bohac, D.; Francisco, P.; Shen, L.; Gloss, S.

    2015-11-05

    "9Combustions safety is an important step in the process of upgrading homes for energy efficiency. There are several approaches used by field practitioners, but researchers have indicated that the test procedures in use are complex to implement and provide too many false positives. Field failures often mean that the house is not upgraded until after remediation or not at all, if not include in the program. In this report the PARR and NorthernSTAR DOE Building America Teams provide a simplified test procedure that is easier to implement and should produce fewer false positives. A survey of state weatherization agencies on combustion safety issues, details of a field data collection instrumentation package, summary of data collected over seven months, data analysis and results are included. The project provides several key results. State weatherization agencies do not generally track combustion safety failures, the data from those that do suggest that there is little actual evidence that combustion safety failures due to spillage from non-dryer exhaust are common and that only a very small number of homes are subject to the failures. The project team collected field data on 11 houses in 2015. Of these homes, two houses that demonstrated prolonged and excessive spillage were also the only two with venting systems out of compliance with the National Fuel Gas Code. The remaining homes experienced spillage that only occasionally extended beyond the first minute of operation. Combustion zone depressurization, outdoor temperature, and operation of individual fans all provide statistically significant predictors of spillage.

  20. Combustion Safety Simplified Test Protocol Field Study

    SciTech Connect (OSTI)

    Brand, L.; Cautley, D.; Bohac, D.; Francisco, P.; Shen, L.; Gloss, S.

    2015-11-01

    Combustions safety is an important step in the process of upgrading homes for energy efficiency. There are several approaches used by field practitioners, but researchers have indicated that the test procedures in use are complex to implement and provide too many false positives. Field failures often mean that the house is not upgraded until after remediation or not at all, if not include in the program. In this report the PARR and NorthernSTAR DOE Building America Teams provide a simplified test procedure that is easier to implement and should produce fewer false positives. A survey of state weatherization agencies on combustion safety issues, details of a field data collection instrumentation package, summary of data collected over seven months, data analysis and results are included. The project team collected field data on 11 houses in 2015.