National Library of Energy BETA

Sample records for internet protocol ip

  1. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOE Patents [OSTI]

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  2. Acquisition Letter/Financial Assistance Letter (ALIFAL) 201 0-06, Acquiring Information Technology, Requirement to Comply With Internet Protocol Version 6 (IPv6)

    Office of Energy Efficiency and Renewable Energy (EERE)

    AL/FAL 201 0-06 provides notice that the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council are issuing a final rule amending the Federal Acquisition Regulation (FAR) to require that Internet Protocol Version 6 (IPv6) compliant products be included in all new information technology (IT) acquisitions using Internet Protocol (IP). ALIFAL 2010-06, accordingly, updates the IPv6 guidance provided in AL-2006-04.

  3. H-35 DOE-H-__ Compliance With Internet Protocol Version 6 (Ipv6...

    Broader source: Energy.gov (indexed) [DOE]

    H-35 DOE-H- Compliance With Internet Protocol Version 6 (Ipv6) In Acquiring Information Technology (July 2011) Prescription: Use as appropriate. Consider using in solicitations...

  4. IP address management : augmenting Sandia's capabilities through open source tools.

    SciTech Connect (OSTI)

    Nayar, R. Daniel

    2005-08-01

    Internet Protocol (IP) address management is an increasingly growing concern at Sandia National Laboratories (SNL) and the networking community as a whole. The current state of the available IP addresses indicates that they are nearly exhausted. Currently SNL doesn't have the justification to obtain more IP address space from Internet Assigned Numbers Authority (IANA). There must exist a local entity to manage and allocate IP assignments efficiently. Ongoing efforts at Sandia have been in the form of a multifunctional database application notably known as Network Information System (NWIS). NWIS is a database responsible for a multitude of network administrative services including IP address management. This study will explore the feasibility of augmenting NWIS's IP management capabilities utilizing open source tools. Modifications of existing capabilities to better allocate available IP address space are studied.

  5. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    ScienceCinema (OSTI)

    Tsoukalas, Lefteri [Purdue University, Purdue, Indiana, United States

    2010-01-08

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  6. Inventing an Energy Internet: Concepts, Architectures, and Protocols for Smart Energy Utilization

    SciTech Connect (OSTI)

    Tsoukalas, Lefteri

    2009-04-29

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  7. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    SciTech Connect (OSTI)

    Tsoukalas, Lefteri

    2009-04-29

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  8. Effective Protocols for Mobile Communications and Networking

    SciTech Connect (OSTI)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  9. IP-Based Video Modem Extender Requirements

    SciTech Connect (OSTI)

    Pierson, L G; Boorman, T M; Howe, R E

    2003-12-16

    Visualization is one of the keys to understanding large complex data sets such as those generated by the large computing resources purchased and developed by the Advanced Simulation and Computing program (aka ASCI). In order to be convenient to researchers, visualization data must be distributed to offices and large complex visualization theaters. Currently, local distribution of the visual data is accomplished by distance limited modems and RGB switches that simply do not scale to hundreds of users across the local, metropolitan, and WAN distances without incurring large costs in fiber plant installation and maintenance. Wide Area application over the DOE Complex is infeasible using these limited distance RGB extenders. On the other hand, Internet Protocols (IP) over Ethernet is a scalable well-proven technology that can distribute large volumes of data over these distances. Visual data has been distributed at lower resolutions over IP in industrial applications. This document describes requirements of the ASCI program in visual signal distribution for the purpose of identifying industrial partners willing to develop products to meet ASCI's needs.

  10. Internet protocol network mapper

    DOE Patents [OSTI]

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  11. PVM and IP multicast

    SciTech Connect (OSTI)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  12. Intellectual Property (IP) Service Providers for Acquisition...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Intellectual Property Provides ACQ and Assistance More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions Microsoft ...

  13. Intellectual Property (IP) Service Providers for Acquisition...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEIPCounselforDOELaboratories 2015 More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions ...

  14. InterGroup Protocols

    Energy Science and Technology Software Center (OSTI)

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  15. Audit Report: DOE/IG-0915 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Internet Protocol Telecommunications Networks Advancements in the telecommunications ... Internet Protocol (VoIP) networks at more than 14 locations at a cost of over 56 million. ...

  16. Energy Internet

    Broader source: Energy.gov [DOE]

    Energy Internet is commercializing a software platform for decentralized scheduling of energy-producing or consuming assets on the electricity grid. This scalable system will revolutionize the control of distributed solar generation, electric vehicle charging, intelligent appliances and other smart grid technologies.

  17. The Department of Energys Implementation of Voice over Internet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Voice over Internet Protocol Telecommunications Networks DOEIG-0915 June 2014 U.S. Department of Energy Office of Inspector General Office of Audits and...

  18. IP-1 Certification of Cargo Containers

    SciTech Connect (OSTI)

    Hagler, Lisle

    2010-10-05

    The purpose and scope of this engineering note is to demonstrate that the structural design of the cargo container complies with the IP-1 container requirements of 49 CFR 173.410 as required by CFR 173.411.

  19. Internet strategies for engineers

    SciTech Connect (OSTI)

    Hill, K.; Beruvides, M.G.

    1997-11-01

    This report contains viewgraphs on using internet strategies for engineers. How the internet is being used and what problems are being encountered are being considered.

  20. Voice and Data Network of Convergence and the Application of Voice over IP

    SciTech Connect (OSTI)

    Eldridge, J.M.

    2000-11-01

    This paper looks at emerging technologies for converging voice and data networks and telephony transport over a data network using Internet Protocols. Considered are the benefits and drivers for this convergence. The paper describes these new technologies, how they are being used, and their application to Sandia.

  1. A Network Client Using the Gopher Information Discovery Protocol

    Energy Science and Technology Software Center (OSTI)

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  2. Privacy Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    certain information automatically. What we collect and store automatically is: the Internet Protocol (IP) address of the domain from which you access the Internet (i.e....

  3. ATR NSUF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy Notice NSUF collects and stores the following information automatically: Internet Protocol (IP) address of the domain from which you access the Internet (e.g.,...

  4. Privacy Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    certain information automatically. What we collect and store automatically is: the Internet Protocol (IP) address of the domain from which you access the Internet (i.e....

  5. Entanglement percolation on a quantum internet with scale-free and clustering characters

    SciTech Connect (OSTI)

    Wu Liang; Zhu Shiqun

    2011-11-15

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  6. Protocol for House Parties

    Broader source: Energy.gov [DOE]

    Protocol for House Parties, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  7. Lessons Learned in the Design and Use of IP1 / IP2 Flexible Packaging - 13621

    SciTech Connect (OSTI)

    Sanchez, Mike; Reeves, Wendall; Smart, Bill

    2013-07-01

    For many years in the USA, Low Level Radioactive Waste (LLW), contaminated soils and construction debris, have been transported, interim stored, and disposed of, using IP1 / IP2 metal containers. The performance of these containers has been more than adequate, with few safety occurrences. The containers are used under the regulatory oversight of the US Department of Transportation (DOT), 49 Code of Federal Regulations (CFR). In the late 90's the introduction of flexible packaging for the transport, storage, and disposal of low level contaminated soils and construction debris was introduced. The development of flexible packaging came out of a need for a more cost effective package, for the large volumes of waste generated by the decommissioning of many of the US Department of Energy (DOE) legacy sites across the US. Flexible packaging had to be designed to handle a wide array of waste streams, including soil, gravel, construction debris, and fine particulate dust migration. The design also had to meet all of the IP1 requirements under 49CFR 173.410, and be robust enough to pass the IP2 testing 49 CFR 173.465 required for many LLW shipments. Tens of thousands of flexible packages have been safely deployed and used across the US nuclear industry as well as for hazardous non-radioactive applications, with no recorded release of radioactive materials. To ensure that flexible packages are designed properly, the manufacturer must use lessons learned over the years, and the tests performed to provide evidence that these packages are suitable for transporting low level radioactive wastes. The design and testing of flexible packaging for LLW, VLLW and other hazardous waste streams must be as strict and stringent as the design and testing of metal containers. The design should take into consideration the materials being loaded into the package, and should incorporate the right materials, and manufacturing methods, to provide a quality, safe product. Flexible packaging can be

  8. Intellectual Property (IP) Service Providers for Acquisition and Assistance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactions | Department of Energy DOE_IP_Counsel_for_DOE_Laboratories 2015 (8.17 KB) More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions WA_05_056_IBM_WATSON_RESEARCH_CENTER_Waiver_of_Domestic_and_.pdf Need to Consider Intentional Destructive Acts in NEPA Documents (CEQ, 2006)

  9. Geography-based structural analysis of the Internet

    SciTech Connect (OSTI)

    Kasiviswanathan, Shiva; Eidenbenz, Stephan; Yan, Guanhua

    2010-01-01

    In this paper, we study some geographic aspects of the Internet. We base our analysis on a large set of geolocated IP hop-level session data (including about 300,000 backbone routers, 150 million end hosts, and 1 billion sessions) that we synthesized from a variety of different input sources such as US census data, computer usage statistics, Internet market share data, IP geolocation data sets, CAJDA's Skitter data set for backbone connectivity, and BGP routing tables. We use this model to perform a nationwide and statewide geographic analysis of the Internet. Our main observations are: (1) There is a dominant coast-to-coast pattern in the US Internet traffic. In fact, in many instances even if the end-devices are not near either coast, still the traffic between them takes a long detour through the coasts. (2) More than half of the Internet paths are inflated by 100% or more compared to their corresponding geometric straight-line distance. This circuitousness makes the average ratio between the routing distance and geometric distance big (around 10). (3) The weighted mean hop count is around 5, but the hop counts are very loosely correlated with the distances. The weighted mean AS count (number of ASes traversed) is around 3. (4) The AS size and the AS location number distributions are heavy-tailed and strongly correlated. Most of the ASes are medium sized and there is a wide variability in the geographic dispersion size (measured in terms of the convex hull area) of these ASes.

  10. Intellectual Property (IP) Service Providers for Acquisition and Assistance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactions | Department of Energy Intellectual Property Provides ACQ and Assistance (67.65 KB) More Documents & Publications Intellectual Property (IP) Service Providers for Acquisition and Assistance Transactions Microsoft Word - FAL2004-03.doc Guidance Documents

  11. Internet Performance to Africa

    SciTech Connect (OSTI)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  12. July 2014 Cybersecurity Awareness Campaign - Internet Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July 2014 Cybersecurity Awareness Campaign - Internet Safety July 2014 Cybersecurity Awareness Campaign - Internet Safety More Documents & Publications January 2015 Cybersecurity ...

  13. ENERGY EFFICIENCY TECHNOLOGY ROADMAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IP v.6 - Internet protocol version 6 Emergence of component level standards addressing energy use optimization Networking communication data compression speed bandwidth...

  14. Internet Fuel Cells Forum

    SciTech Connect (OSTI)

    Sudhoff, Frederick A.

    1996-08-01

    The rapid development and integration of the Internet into the mainstream of professional life provides the fuel cell industry with the opportunity to share new ideas with unprecedented capabilities. The U.S. Department of Energy's (DOE's) Morgantown Energy Technology Center (METC) has undertaken the task to maintain a Fuel Cell Forum on the Internet. Here, members can exchange ideas and information pertaining to fuel cell technologies. The purpose of this forum is to promote a better understanding of fuel cell concepts, terminology, processes, and issues relating to commercialization of fuel cell power technology. The Forum was developed by METC to provide those interested with fuel cell conference information for its current concept of exchanging ideas and information pertaining to fuel cells. Last August, the Forum expanded to an on-line and world-wide network. There are 250 members, and membership is growing at a rate of several new subscribers per week. The forum currently provides updated conference information and interactive information exchange. Forum membership is encouraged from utilities, industry, universities, and government. Because of the public nature of the internet, business sensitive, confidential, or proprietary information should not be placed on this system. The Forum is unmoderated; therefore, the views and opinions of authors expressed in the forum do not necessarily state or reflect those of the U.S. government or METC.

  15. Efficient Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps

  16. Appraisal Process Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS December 2015 Office of Enterprise Assessments U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface December 2015 i Preface The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) is responsible for implementing an Independent Oversight Program for safety and security within the Department in accordance with DOE Policy 226.1B, Department of Energy Oversight Policy, and DOE Orders

  17. Seismicity Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Seismicity Protocol Seismicity Protocol Project objectives: Develop an updated protocolbest engineering practices to address public and industry issues associated with induced ...

  18. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  19. Internet of Things | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Internet of Things The Internet of Things is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries. The Internet of Things is the network of physical objects accessed through the Internet, as defined by technology analysts and visionaries. While possibly creating efficiencies in areas such as advanced manufacturing and infrastructure design, production and resilience, the Internet of Things (IOT) also creates new and unknown

  20. SLCA/IP power alternative screening method (SPASM)

    SciTech Connect (OSTI)

    Palmer, S.C. |; Ancrile, J.D.

    1995-03-01

    This report describes the SLCA/IP Power Alternative Screening Method (SPASM), which was used to screen 784 possible combinations of electric power marketing alternatives and dam operational scenarios to provide a representative range for analysis in the Western Area Power Administration Salt Lake City Area Integrated Projects (SLCA/IP) Electric Power Marketing Environmental Impact Statement (EIS). Each combination consists of one energy and capacity commitment level and one operational scenario for each of the hydroelectric facilities at Glen Canyon Dam, Flaming Gorge Dam, and the Aspinall Unit. The total annual cost to the SLCA/IP firm power customers of each of the 784 combinations is estimated and included in a relative frequency distribution. A relative frequency distribution is also generated for each marketing alternative. The number of combinations is reduced to 12 by taking the mean value and endpoint value for each of four marketing alternatives. Some minor deviations from this procedure, which are made for political purposes, are explained. 9 figs., 14 tabs.

  1. Sandia National Laboratories: Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    collect and store the following information automatically and through the use of: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e.,...

  2. An Overview of Internet biosurveillance

    SciTech Connect (OSTI)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray; Barboza, P.; Collier, Nigel; Lightfoot, Nigel; Linge, J. P.; van der Goot, E.; Mawudeku, A.; Madoff, Lawrence; Vaillant, L.; Walters, Ronald A.; Yangarber, Roman; Mantero, Jas; Corley, Courtney D.; Brownstein, John S.

    2013-06-21

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and provides a perspective on the future of the field.

  3. Linear Collider Test Facility: Twiss Parameter Analysis at the IP/Post-IP Location of the ATF2 Beam Line

    SciTech Connect (OSTI)

    Bolzon, Benoit; Jeremie, Andrea; Bai, Sha; Bambade, Philip; White, Glen; /SLAC

    2012-07-02

    At the first stage of the ATF2 beam tuning, vertical beam size is usually bigger than 3 {micro}m at the IP. Beam waist measurements using wire scanners and a laser wire are usually performed to check the initial matching of the beam through to the IP. These measurements are described in this paper for the optics currently used ({beta}{sub x} = 4cm and {beta}{sub y} = 1mm). Software implemented in the control room to automate these measurements with integrated analysis is also described. Measurements showed that {beta} functions and emittances were within errors of measurements when no rematching and coupling corrections were done. However, it was observed that the waist in the horizontal (X) and vertical (Y) plane was abnormally shifted and simulations were performed to try to understand these shifts. They also showed that multiknobs are needed in the current optics to correct simultaneously {alpha}{sub x}, {alpha}{sub y} and the horizontal dispersion (D{sub x}). Such multiknobs were found and their linearity and orthogonality were successfully checked using MAD optics code. The software for these multiknobs was implemented in the control room and waist scan measurements using the {alpha}{sub y} knob were successfully performed.

  4. House Simulation Protocols (Building America Benchmark) - Building...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    House Simulation Protocols (Building America Benchmark) - Building America Top Innovation House Simulation Protocols (Building America Benchmark) - Building America Top Innovation ...

  5. MHK ISDB/Instruments/CDL MiniSense 2-IPS | Open Energy Information

    Open Energy Info (EERE)

    CDL MiniSense 2-IPS < MHK ISDB Jump to: navigation, search MHK Instrumentation & Sensor Database Menu Home Search Add Instrument Add Sensor Add Company Community FAQ Help...

  6. Office Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2015 Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015 April 24, 2015 Office of Environment, Safety and Health...

  7. Geo-Engineering through Internet Informatics (GEMINI)

    SciTech Connect (OSTI)

    Doveton, John H.; Watney, W. Lynn

    2003-03-06

    The program, for development and methodologies, was a 3-year interdisciplinary effort to develop an interactive, integrated Internet Website named GEMINI (Geo-Engineering Modeling through Internet Informatics) that would build real-time geo-engineering reservoir models for the Internet using the latest technology in Web applications.

  8. Next Generation Integrated Environment for Collaborative Work Across Internets

    SciTech Connect (OSTI)

    Harvey B. Newman

    2009-02-24

    We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

  9. Appraisal Process Protocols, Independent Oversight - December 2015 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Appraisal Process Protocols, Independent Oversight - December 2015 Appraisal Process Protocols, Independent Oversight - December 2015 December 2015 Independent Oversight Appraisal Process Protocols These appraisal process protocols provide an overview of the general process that applies to all independent oversight appraisal activities. The subordinate oversight offices maintain more detailed program plans, guides, procedures, and protocols as necessary to assist in

  10. Field Monitoring Protocol: Heat Pump Water Heaters

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. ... 2013 Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. ...

  11. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  12. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  13. Quantitative Visualization of ChIP-chip Data by Using Linked...

    Office of Scientific and Technical Information (OSTI)

    Most analyses of ChIP-chip in vivo DNA binding have focused on qualitative descriptions of ... analyze and explore in vivo DNA binding data of multiple transcription factors. ...

  14. Summary Protocol: Identification, Characterization, Designation, Remedial

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Action, Certification | Department of Energy Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) (2.36 MB) More Documents &

  15. U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected application to crash.

  16. DOE Site Facility Management Contracts Internet Posting | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting PDF icon DOE NNSA Site Facility Management Contracts - November 2015.pdf ...

  17. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  18. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  19. DOE Site Facility Management Contracts Internet Posting | Department...

    Energy Savers [EERE]

    DOE Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting PDF icon DOE NNSA Site Facility Management Contracts - November...

  20. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    SciTech Connect (OSTI)

    Paul, Nathanael R; Shue, Craig; Taylor, Curtis

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  1. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect (OSTI)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  2. Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  3. Multiple protocol fluorometer and method

    DOE Patents [OSTI]

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  4. Supplement No. 2 to the FUSRAP Summary Protocol - Verification and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Certification Protocol | Department of Energy 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol (November 1985, Rev. 1) Supplement No. 2 to the FUSRAP Summary Protocol - Verification and Certification Protocol (November 1985, Rev. 1) (1.14 MB) More Documents & Publications Supplement

  5. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...

    Energy Savers [EERE]

    Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents...

  6. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    SciTech Connect (OSTI)

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  7. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  8. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect (OSTI)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  9. DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11(1).pdf...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf PDF icon DOEsitefacilitymgtcontractsInternetPo...

  10. Cryptography and the Internet: lessons and challenges

    SciTech Connect (OSTI)

    McCurley, K.S.

    1996-12-31

    The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

  11. Webinar: Hydrogen Refueling Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Refueling Protocols Webinar: Hydrogen Refueling Protocols Below is the text version of the webinar titled "Hydrogen Refueling Protocols," originally presented on February 22, 2013. In addition to this text version of the audio, you can access the presentation slides. Moderator: Hi. Thank you so much for attending today's webinar. Just to go through a few housekeeping items before I turn it over to today's speakers. Everyone is on mute, so if you have a question throughout the webinar,

  12. ESPC ENABLE Measurement and Verification Protocol

    Broader source: Energy.gov [DOE]

    Document provides an overview of the Measurement and Verification (M&V) Protocol utilized within ENABLE energy savings performance contract projects.

  13. Superior Energy Performance Measurement and Verification Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance logo This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance ...

  14. Chapter 21: Residential Lighting Evaluation Protocol. Uniform...

    Energy Savers [EERE]

    1: Residential Lighting Evaluation Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with ...

  15. The Internet of Things Helping Utilities | OpenEI Community

    Open Energy Info (EERE)

    The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(266) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

  16. National Clean Energy Business Plan Competition: Energy Internet Wins ACC

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clean Energy Challenge | Department of Energy Energy Internet Wins ACC Clean Energy Challenge National Clean Energy Business Plan Competition: Energy Internet Wins ACC Clean Energy Challenge March 27, 2014 - 4:54pm Addthis Energy Internet, the Southeast regional winner of the Department of Energy's National Clean Energy Business Plan Competition, demonstrates its platform. | Courtesy of Georgia Institute of Technology Energy Internet, the Southeast regional winner of the Department of

  17. DOE Releases Updated Induced Seismicity Protocol

    Broader source: Energy.gov [DOE]

    At the 37th Stanford Geothermal Workshop in Stanford, California, the Geothermal Technologies Program at the U.S. Department of Energy (DOE) released an updated Induced Seismicity Protocol. This document supplements the existing International Energy Agency (IEA) protocol of 2009, and is intended to be a living document kept up-to-date with state-of-the-art knowledge and practices.

  18. TEC Working Group Topic Groups Archives Protocols | Department of Energy

    Office of Environmental Management (EM)

    Protocols TEC Working Group Topic Groups Archives Protocols The Transportation Protocols Topic Group serves as an important vehicle for DOE senior managers to assess and incorporate stakeholder input into the protocols process. The Topic Group was formed to review a series of transportation protocols developed in response to a request for DOE to be more consistent in its approach to transportation.

  19. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect (OSTI)

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  20. Clues to the nature of SN 2009ip from photometric and spectroscopic evolution to late times

    SciTech Connect (OSTI)

    Graham, M. L. [Astronomy Department, University of California, Berkeley, CA 94720 (United States); Sand, D. J. [Physics Department, Texas Tech University, Lubbock, TX 79409 (United States); Valenti, S.; Howell, D. A.; Parrent, J. [Las Cumbres Observatory Global Telescope Network, Goleta, CA 93117 (United States); Halford, M.; Zaritsky, D. [Astronomy Department, University of Arizona, Tucson, AZ 85721 (United States); Bianco, F. [Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States); Rest, A. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Dilday, B., E-mail: melissagraham@berkeley.edu [North Idaho College, 1000 W. Garden Avenue, Coeur d'Alene, ID 83814 (United States)

    2014-06-01

    We present time series photometric and spectroscopic data for the transient SN 2009ip from the start of its outburst in 2012 September until 2013 November. These data were collected primarily with the new robotic capabilities of the Las Cumbres Observatory Global Telescope Network, a specialized facility for time domain astrophysics, and includes supporting high-resolution spectroscopy from the Southern Astrophysical Research Telescope, Kitt Peak National Observatory, and Gemini Observatory. Based on our nightly photometric monitoring, we interpret the strength and timing of fluctuations in the light curve as interactions between fast-moving ejecta and an inhomogeneous circumstellar material (CSM) produced by past eruptions of this massive luminous blue variable (LBV) star. Our time series of spectroscopy in 2012 reveals that, as the continuum and narrow H? flux from CSM interactions declines, the broad component of H? persists with supernova (SN)-like velocities that are not typically seen in LBVs or SN impostor events. At late times, we find that SN 2009ip continues to decline slowly, at ? 0.01 mag day{sup 1}, with small fluctuations in slope similar to Type IIn supernovae (SNe IIn) or SN impostors but no further LBV-like activity. The late-time spectrum features broad calcium lines similar to both late-time SNe and SN impostors. In general, we find that the photometric and spectroscopic evolution of SN 2009ip is more similar to SNe IIn than either continued eruptions of an LBV star or SN impostors but we cannot rule out a nonterminal explosion. In this context, we discuss the implications for episodic mass loss during the late stages of massive star evolution.

  1. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  2. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  3. Protocol for communications in potentially noisy environments

    DOE Patents [OSTI]

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  4. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect (OSTI)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  5. Sandia Inverter Performance Test Protocol Efficiency Weighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inverter Performance Test Protocol Efficiency Weighting Alternatives Jeff Newmiller ∗ , William Erdman † , Joshua S. Stein ‡ , Sigifredo Gonzalez ‡ ∗ DNV GL, San Ramon, CA, US; † Cinch, Lafayette, CA, US; ‡ Sandia National Laboratories, Albuquerque, NM, US Abstract-The Sandia Inverter Performance Test Protocol defined two possible weighted-average efficiency values for use in comparing inverter performance, of which one definition was selected by the California Energy Commission

  6. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  7. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - ...

  8. Protocol, Inspection Criteria - April 23, 2008 | Department of...

    Energy Savers [EERE]

    Protocol, Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008...

  9. Protocol for Enhanced Evaluations of Beyond Design Basis Events...

    Energy Savers [EERE]

    Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design ...

  10. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015 December 2015 Office of Environment, Safety and Health Assessments Protocol ...

  11. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) - PROTOCOL - EA-31-01 April 2015 Office of Environment, Safety and Health ...

  12. Accelerated Stress Test and Polarization Curve Protocols for...

    Office of Environmental Management (EM)

    Team Cell Component Accelerated Stress Test and Polarization Curve Protocols for PEM ... This document describes test protocols to assess the performance and durability of fuel ...

  13. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  14. File Transfer Protocol (FTP) Site Instructions | Open Energy...

    Open Energy Info (EERE)

    Transfer Protocol (FTP) Site Instructions Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: File Transfer Protocol...

  15. Protective Force Protocols for ESS Supported Performance Tests...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, ...

  16. Security incidents on the Internet, 1989--1995

    SciTech Connect (OSTI)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  17. 2013-04-12 1.1 H-FM&T Mod 020 (Admin)(EditedForInternet Posting).pdf

    National Nuclear Security Administration (NNSA)

    Intentionally left blank for Internet posting purposes.

  18. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect (OSTI)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  19. Chapter 15: Commercial New Construction Protocol

    SciTech Connect (OSTI)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  20. Former Worker Program Medical Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Medical Protocol Former Worker Program Medical Protocol October 7, 2015 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which there are screening tests that are reasonably likely to be effective and beneficial to program participants. The protocol is intended to ensure consistency of approach in the medical evaluation of participants. Former Worker Program Medical Protocol (36.47 KB) More Documents & Publications 2014 Former Worker

  1. TEC Working Group Topic Groups Archives Protocols Meeting Summaries |

    Office of Environmental Management (EM)

    Department of Energy Protocols Meeting Summaries TEC Working Group Topic Groups Archives Protocols Meeting Summaries Meeting Summaries Philadelphia TEC Meeting, Protocols Topic Group Summary - July 1999 (110.63 KB) Jacksonville TEC Meeting, Protocols Topic Group Summary - January 1999 (102.04 KB) More Documents & Publications TEC Working Group Topic Groups Archives Protocols Conference Call Summaries TEC Meeting Summaries - July 1997 TEC Meeting Summaries - January 1997

  2. Packet flow monitoring tool and method

    DOE Patents [OSTI]

    Thiede, David R [Richland, WA

    2009-07-14

    A system and method for converting packet streams into session summaries. Session summaries are a group of packets each having a common source and destination internet protocol (IP) address, and, if present in the packets, common ports. The system first captures packets from a transport layer of a network of computer systems, then decodes the packets captured to determine the destination IP address and the source IP address. The system then identifies packets having common destination IP addresses and source IP addresses, then writes the decoded packets to an allocated memory structure as session summaries in a queue.

  3. ChIP-seq Mapping of Distant-Acting Enhancers and Their In Vivo Activities

    SciTech Connect (OSTI)

    Visel, Axel; Pennacchio, Len A.

    2011-06-01

    The genomic location and function of most distant-acting transcriptional enhancers in the human genome remains unknown We performed ChIP-seq for various transcriptional coactivator proteins (such as p300) directly from different embryonic mouse tissues, identifying thousands of binding sitesTransgenic mouse experiments show that p300 and other co-activator peaks are highly predictive of genomic location AND tissue-specific activity patterns of distant-acting enhancersMost enhancers are active only in one or very few tissues Genomic location of tissue-specific p300 peaks correlates with tissue-specific expression of nearby genes Most binding sites are conserved, but the global degree of conservation varies between tissues

  4. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP). Technology summary

    SciTech Connect (OSTI)

    Not Available

    1994-04-01

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors.

  5. p{sub x}+ip{sub y} Superfluid from s-Wave Interactions of Fermionic Cold Atoms

    SciTech Connect (OSTI)

    Zhang Chuanwei; Tewari, Sumanta; Lutchyn, Roman M.; Das Sarma, S.

    2008-10-17

    Two-dimensional (p{sub x}+ip{sub y}) superfluids or superconductors offer a playground for studying intriguing physics such as quantum teleportation, non-Abelian statistics, and topological quantum computation. Creating such a superfluid in cold fermionic atom optical traps using p-wave Feshbach resonance is turning out to be challenging. Here we propose a method to create a p{sub x}+ip{sub y} superfluid directly from an s-wave interaction making use of a topological Berry phase, which can be artificially generated. We discuss ways to detect the spontaneous Hall mass current, which acts as a diagnostic for the chiral p-wave superfluid.

  6. Network Upgrade for the SLC: Control System Modifications

    SciTech Connect (OSTI)

    Crane, M.; Mackenzie, R.; Sass, R.; Himel, T.; /SLAC

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  7. DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx PDF icon DOE site facility mgt contracts Internet Posting ...

  8. Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol | Department of Energy 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol (January 1986) Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol (January 1986) (747.7 KB) More Documents & Publications Summary Protocol: Identification, Characterization, Designation,

  9. Developmental issues in environmental reporting protocols

    SciTech Connect (OSTI)

    Schrock, D.W.; Stoops, J.L.; Meier, A.K.; Vine, E.L.; Solomon, B.D.

    1994-08-01

    In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

  10. Next-gen RF MEMS Switch for a Smarter, Faster Internet of Things...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RF MEMS Switch for a Smarter, Faster Internet of Things Karen Lightman 2014.03.28 Big Data. Internet of Things. Quantified Self. Connected Home. Connected City. These...

  11. BLM - State Protocol Agreement with Nevada | Open Energy Information

    Open Energy Info (EERE)

    State Protocol Agreement with Nevada Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: BLM - State Protocol Agreement with NevadaLegal...

  12. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. ... Battelle Contract No. DE-AC36-99-GO10337 Test Protocol Document, Hydrogen Safety Sensor ...

  13. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601, ...

  14. Vermont Agency of Transportation EPSC Protocol | Open Energy...

    Open Energy Info (EERE)

    of Transportation EPSC Protocol. Vermont Agency of Transportation. VTrans EPSC Protocol. 4p. GuideHandbook sent to Retrieved from "http:en.openei.orgwindex.php?titleVermontA...

  15. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: Non-Flammable Mixtures R. ... DE-AC36-99-GO10337 Test Protocol Document, Hydrogen Safety Sensor Testing Phase I: ...

  16. Avian study protocols and wind energy development

    SciTech Connect (OSTI)

    Fisher, K.

    1995-12-01

    This paper identifies the need to develop and use standardized avian study protocols to determine avian impacts at new and existing wind energy facilities. This will allow data collected from various sites to be correlated for better understanding wind energy related avian impacts. Factors contributing to an increased interest in wind energy facilities by electric utilities include: (1) Increased demand for electricity;(2) increased constraints on traditional electrical generating facilities (i.e. hydroelectric and nuclear power plants);(3) improved wind turbine technology. During the 1980`s generous tax credits spawned the development of wind energy facilities, known as wind farms, in California. Commercial scale wind farm proposals are being actively considered in states across the country - Washington, Oregon, Wyoming, Wisconsin, Texas, and Vermont to name a few. From the wind farms in California the unexpected issue of avian impacts, especially to birds-of-prey, or raptor, surfaced and continues to plague the wind industry. However, most of the avian studies did not followed a standardized protocol or methodology and, therefore, data is unavailable to analyze and compare impacts at different sites or with differing technologies and configurations. Effective mitigation can not be designed and applied until these differences are understood. The Bonneville Power Administration is using comparable avian study protocols to collect data for two environmental impact statements being prepared for two separate wind farm proposals. Similar protocol will be required for any other avian impact analysis performed by the agency on proposed or existing wind farms. The knowledge gained from these studies should contribute to a better understanding of avian interactions with wind energy facilities and the identification of effective mitigation measures.

  17. 3510T1 Emergency Response Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    510 Appendix T1 Emergency Response Protocol 1.0 Purpose This emergency response procedure is used by everyone at Jefferson Lab as the basis for response during an emergency situation in the absence of management direction. By their very nature, emergencies pose unique challenges, Jefferson Lab recognizes that listing the requirements for every possible emergency is prohibitive, but has used identified plausible situations to produce this guidance. For general lab-wide emergency procedures: 2.0

  18. Building America House Simulation Protocols (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    SciTech Connect (OSTI)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  20. Efficient Wide Area Data Transfer Protocols

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficient Wide Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of Informatics and Computing Indiana University Bloomington, IN 47405 ezkissel@indiana.edu Martin Swany School of Informatics and Computing Indiana University Bloomington, IN 47405 swany@iu.edu Brian Tierney Lawrence Berkeley National Laboratory Berkeley, CA 94720 bltierney@lbl.gov Eric Pouyoul Lawrence Berkeley National Laboratory Berkeley, CA 94720 epouyoul@lbl.gov Due to a number of recent

  1. Building America 2014 House Simulation Protocols

    Broader source: Energy.gov [DOE]

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  2. 2014 Building America House Simulation Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 Building America House Simulation Protocols E. Wilson, C. Engebrecht Metzger, S. Horowitz, and R. Hendron National Renewable Energy Laboratory Technical Report NREL/TP-5500-60988 March 2014 NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Operated by the Alliance for Sustainable Energy, LLC This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. Contract No.

  3. Identification of genes directly regulated by the oncogene ZNF217using ChIP-chip assays.

    SciTech Connect (OSTI)

    Krig, S.R.; Jin, V.X.; Bieda, M.C.; O'geen, H.; Yaswen, P.; Green, R.; Farnham, P.J.

    2007-01-26

    It has been proposed that ZNF217, which is amplified at 20q13 in various tumors, plays a key role during neoplastic transformation. ZNF217 has been purified in complexes that contain repressor proteins such as CtBP2, suggesting that it acts as a transcriptional repressor. However, the function of ZNF217 has not been well characterized due to a lack of known target genes. Using a global chromatin immunoprecipitation (ChIP)-chip approach, we identified thousands of ZNF217 binding sites in three tumor cell lines (MCF7, SW480, and Ntera2). Further analysis of ZNF217 in Ntera2 cells showed that many promoters are bound by ZNF217 and CtBP2 and that a subset of these promoters are activated upon removal of ZNF217. Thus, our in vivo studies corroborate the in vitro biochemical analyses of ZNF217-containing complexes and support the hypothesis that ZNF217 functions as a transcriptional repressor. Gene ontology analysis showed that ZNF217 targets in Ntera2 cells are involved in organ development, suggesting that one function of ZNF217 may be to repress differentiation. Accordingly we show that differentiation of Ntera2 cells with retinoic acid led to down-regulation of ZNF217. Our identification of thousands of ZNF217 target genes will enable further studies of the consequences of aberrant expression of ZNF217 during neoplastic transformation.

  4. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol Download the webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013. Hydrogen Refueling Protocols Webinar Slides (3.49 MB) More Documents & Publications Introduction to SAE Hydrogen Fueling Standardization Developing SAE Safety Standards for Hydrogen and

  5. Membrane and MEA Accelerated Stress Test Protocols | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and MEA Accelerated Stress Test Protocols Membrane and MEA Accelerated Stress Test Protocols This presentation on fuel cell membrane and MEA stress test protocols was given by T. Benjamin at the High Temperature Membrane Working Group Meeting in May 2007. htmwg_benjamin.pdf (395.65 KB) More Documents & Publications HTMWG, May 18, 2009, Welcome! Automotive Perspective on PEM Evaluation Fuel Cell Tech Team Accelerated Stress Test and Polarization Curve Protocols for PEM Fuel Cells

  6. Superior Energy Performance Certification Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Certification Protocol Superior Energy Performance Certification Protocol Superior Energy Performance logo The Superior Energy Performance® (SEP(tm)) Certification Protocol describes the purpose of the SEP program and defines the steps required for participation-from initial application through certification by an ANSI-ANAB accredited Verification Body. Superior Energy Performance Certification Protocol (December 2012) (1.2 MB) More Documents & Publications Becoming a Certified Practitioner

  7. Assessment C-Site Visit Protocol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    C-Site Visit Protocol Assessment C-Site Visit Protocol Assessment C- Site Visit Protocol.pdf (201.4 KB) More Documents & Publications Assessment B - Program Criteria ATTACHMENT A - CHECKLIST FOR SELF ASSESSMENT CX-000791: Categorical Exclusion Determination

  8. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  9. An Open Source project building the framework for the Internet...

    Broader source: Energy.gov (indexed) [DOE]

    with the Internet of Things Today NOW PLAYING: Artist: Flowers Song: Daisy Fridge Cloud Laundry Cloud Lighting B Cloud Speaker B Cloud Speaker A Cloud TV Cloud Lighting A...

  10. Ars Technica: Analyzing the Internet of Things in San Ramon ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Analyzing the Internet of Things Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share...

  11. My First Gamble With Internet Based Currency | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    My First Gamble With Internet Based Currency Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window)...

  12. GE Scientist Stephan Biller Discusses the Industrial Internet | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Manufacturing Scientist Stephan Biller Discusses the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Manufacturing Scientist Stephan Biller Discusses the Industrial Internet Stephan Biller, Chief Manufacturing Scientist at GE Global Research, talked with the Farstuff Podcast about the

  13. Zephyr: A secure Internet process to streamline engineering

    SciTech Connect (OSTI)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E.

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  14. Industrial Dojo Program Fosters Industrial Internet Development | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Launches Cloud Foundry 'Industrial Dojo,' Contributes to Open Source to Foster Continued Development of the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Launches Cloud Foundry 'Industrial Dojo,' Contributes to Open Source to Foster Continued Development of the Industrial Internet

  15. Operational Experiences Tuning the ATF2 Final Focus Optics Towards Obtaining a 37nm Electron Beam IP Spot Size

    SciTech Connect (OSTI)

    White, Glen; Seryi, Andrei; Woodley, Mark; Bai, Sha; Bambade, Philip; Renier, Yves; Bolzon, Benoit; Kamiya, Yoshio; Komamiya, Sachio; Oroku, Masahiro; Yamaguchi, Yohei; Yamanaka, Takashi; Kubo, Kiyoshi; Kuroda, Shigeru; Okugi, Toshiyuki; Tauchi, Toshiaki; Marin, Eduardo; /CERN

    2012-07-06

    The primary aim of the ATF2 research accelerator is to test a scaled version of the final focus optics planned for use in next-generation linear lepton colliders. ATF2 consists of a 1.3 GeV linac, damping ring providing low-emittance electron beams (< 12pm in the vertical plane), extraction line and final focus optics. The design details of the final focus optics and implementation at ATF2 are presented elsewhere. The ATF2 accelerator is currently being commissioned, with a staged approach to achieving the design IP spot size. It is expected that as we implement more demanding optics and reduce the vertical beta function at the IP, the tuning becomes more difficult and takes longer. We present here a description of the implementation of the tuning procedures and describe operational experiences and performances.

  16. SN 2009ip: CONSTRAINTS ON THE PROGENITOR MASS-LOSS RATE

    SciTech Connect (OSTI)

    Ofek, E. O.; Lin, L.; Goegues, E.; Kouveliotou, C.; Kasliwal, M. M.; Cao, Y.

    2013-05-01

    Some supernovae (SNe) show evidence for mass-loss events taking place prior to their explosions. Measuring their pre-outburst mass-loss rates provides essential information regarding the mechanisms that are responsible for these events. Here we present XMM-Newton and Swift X-ray observations taken after the latest, and presumably the final, outburst of SN 2009ip. We use these observations as well as new near-infrared and visible-light spectra and published radio and visible-light observations to put six independent order-of-magnitude constraints on the mass-loss rate of the SN progenitor prior to the explosion. Our methods utilize the X-ray luminosity, the bound-free absorption, the H{alpha} luminosity, the SN rise time, free-free absorption, and the bolometric luminosity of the outburst detected prior to the explosion. Assuming spherical mass loss with a wind-density profile, we estimate that the effective mass-loss rate from the progenitor was between 10{sup -3} and 10{sup -2} M{sub Sun} yr{sup -1}, over a few years prior to the explosion, with a velocity of {approx}10{sup 3} km s{sup -1}. This mass-loss rate corresponds to a total circumstellar matter (CSM) mass of {approx}0.04 M{sub Sun }, within 6 Multiplication-Sign 10{sup 15} cm of the SN. We note that the mass-loss rate estimate based on the H{alpha} luminosity is higher by an order of magnitude. This can be explained if the narrow-line H{alpha} component is generated at radii larger than the shock radius, or if the CSM has an aspherical geometry. We discuss simple geometries which are consistent with our results.

  17. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  18. 2014 Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Wilson, E.; Engebrecht, C. Metzger; Horowitz, S.; Hendron, R.

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  19. Assessing Internet energy intensity: A review of methods and results

    SciTech Connect (OSTI)

    Coroama, Vlad C.; Hilty, Lorenz M.; Empa, Swiss Federal Laboratories for Materials Science and Technology, Lerchenfeldstr. 5, 9014 St. Gallen; Centre for Sustainable Communications, KTH Royal Institute of Technology, Lindstedtsvgen 5, 100 44 Stockholm

    2014-02-15

    Assessing the average energy intensity of Internet transmissions is a complex task that has been a controversial subject of discussion. Estimates published over the last decade diverge by up to four orders of magnitude from 0.0064 kilowatt-hours per gigabyte (kWh/GB) to 136 kWh/GB. This article presents a review of the methodological approaches used so far in such assessments: i) topdown analyses based on estimates of the overall Internet energy consumption and the overall Internet traffic, whereby average energy intensity is calculated by dividing energy by traffic for a given period of time, ii) model-based approaches that model all components needed to sustain an amount of Internet traffic, and iii) bottomup approaches based on case studies and generalization of the results. Our analysis of the existing studies shows that the large spread of results is mainly caused by two factors: a) the year of reference of the analysis, which has significant influence due to efficiency gains in electronic equipment, and b) whether end devices such as personal computers or servers are included within the system boundary or not. For an overall assessment of the energy needed to perform a specific task involving the Internet, it is necessary to account for the types of end devices needed for the task, while the energy needed for data transmission can be added based on a generic estimate of Internet energy intensity for a given year. Separating the Internet as a data transmission system from the end devices leads to more accurate models and to results that are more informative for decision makers, because end devices and the networking equipment of the Internet usually belong to different spheres of control. -- Highlights: Assessments of the energy intensity of the Internet differ by a factor of 20,000. We review topdown, model-based, and bottomup estimates from literature. Main divergence factors are the year studied and the inclusion of end devices. We argue

  20. Advantages of a leveled commitment contracting protocol

    SciTech Connect (OSTI)

    Sandholm, T.W.; Lesser, V.R.

    1996-12-31

    In automated negotiation systems consisting of self-interested agents, contracts have traditionally been binding. Such contracts do not allow agents to efficiently accommodate future events. Game theory has proposed contingency contracts to solve this problem. Among computational agents, contingency contracts are often impractical due to large numbers of interdependent and unanticipated future events to be conditioned on, and because some events are not mutually observable. This paper proposes a leveled commitment contracting protocol that allows self-interested agents to efficiently accommodate future events by having the possibility of unilaterally decommitting from a contract based on local reasoning. A decommitment penalty is assigned to both agents in a contract: to be freed from the contract, an agent only pays this penalty to the other party. It is shown through formal analysis of several contracting settings that this leveled commitment feature in a contracting protocol increases Pareto efficiency of deals and can make contracts individually rational when no full commitment contract can. This advantage holds even if the agents decommit manipulatively.

  1. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  2. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication

  3. A Discussion of Testing Protocols and LANL's Contribution to High

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Temperature Membranes | Department of Energy A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes A Discussion of Testing Protocols and LANL's Contribution to High Temperature Membranes Summary of LANL?s testing protocol work presented to the High Temperature Membrane Working Group Meeting, Orlando FL, October 17, 2003 htmwg_test_lanl_contrib.pdf (730.2 KB) More Documents & Publications A Discussion of Conductivity Testing in High Temperature Membranes

  4. Addendum to the Building America House Simulation Protocols | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Addendum to the Building America House Simulation Protocols Addendum to the Building America House Simulation Protocols The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  5. Protective Force Protocols for ESS Supported Performance Tests and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Exercises, March 12, 2007 | Department of Energy Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 March 12, 2008 The DOE/NNSA has an established process for determining the effectiveness of a site's overall protection system, and a vital part of this process is the use of performance testing. This document - Protective Force Protocols for Engagement

  6. Protocol for Addressing Induced Seismicity Associated with Enhanced

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal Systems (EGS) | Department of Energy Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) This document is intended to assist industry and regulators identify important issues and parameters that may be necessary for the evaluation and mitigation of adverse effects of induced seismicity. egs-is-protocol-final-draft-20110531.pdf (218.87 KB) More

  7. Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Operating Experience Report 2013-01 | Department of Energy Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 April, 2013 Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01 To support the

  8. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This initial protocol included simple planning steps that ... an Outreach and Communication Program ... Speech interference is not likely, as seismicity usually ...

  9. BPA Response to Comments on Oversupply Management Protocol

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind energy producers, regional utilities, interest groups and others submitted approximately 90 comments on Bonneville Power Administration's Feb. 7 proposed protocol for...

  10. Protocol, Qualification Standard for the Site Lead Program -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead...

  11. Standard Hydrogen Test Protocols for the NREL Sensor Testing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a ... Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for ...

  12. Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol...

    Broader source: Energy.gov (indexed) [DOE]

    Download the webinar slides from the U.S. Department of Energy Fuel Cell Technologies Office webinar, "Hydrogen Refueling Protocols," held February 22, 2013. Hydrogen Refueling ...

  13. Development of an Accelerated Ash-Loading Protocol for Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development of an Accelerated Ash-Loading Protocol for Diesel Particulate Filters Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER ...

  14. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER ...

  15. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  16. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing ...

  17. Protocol, Test Inspectors Guide - March 2008 | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide This Emergency...

  18. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for Required ... the Office of Environment, Safety and Health Assessments required reading program. ...

  19. Office of Environment, Safety and Health Assessments Protocol...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Environment, Safety and Health Assessments Protocol for the Development and ... (CRADs) used by the Office of Environment, Safety and Health Assessments (EA-30). ...

  20. Nevada State Protocol Agreement for Implementing the National...

    Open Energy Info (EERE)

    OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Nevada State Protocol Agreement for Implementing the National Historic Preservation...

  1. Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx

    Energy Savers [EERE]

    41210 1 EM Protocol for Application of Contingency and Management Reserve for the Acquisition of Capital Asset Projects This document provides guidance for the development and...

  2. A Protocol for Estimating and Mapping Global EGS Potential |...

    Open Energy Info (EERE)

    with public Reporting Codes * Present results using common visualization and data architecture The goal of the Protocol is the production of regional estimates and maps of EGS...

  3. The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary...

    Open Energy Info (EERE)

    Interface: Spreadsheet Website: www.ghgprotocol.orgcalculation-toolsall-tools Cost: Free References: Stationary Combustion Guidance1 The Greenhouse Gas Protocol tool for...

  4. The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigerati...

    Open Energy Info (EERE)

    Interface: Spreadsheet Website: www.ghgprotocol.orgcalculation-toolsall-tools Cost: Free References: Refrigerant Guide1 The Greenhouse Gas Protocol tool for refrigeration is...

  5. Chapter 17: Residential Behavior Protocol. The Uniform Methods...

    Broader source: Energy.gov (indexed) [DOE]

    17: Residential Behavior Protocol The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures Created as part of subcontract with period of ...

  6. Internet-Based Calibration of a Multifunction Calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-12-19

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multijunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  7. Internet-based calibration of a multifunction calibrator

    SciTech Connect (OSTI)

    BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

    2000-04-17

    A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

  8. GE Showcases Industrial Internet Innovations and Promotes Win-Win

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cooperation at 2015 TECHfest | GE Global Research Showcases Industrial Internet Innovations and Promotes Win-Win Cooperation at 2015 TECHfest Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Showcases Industrial Internet Innovations and Promotes Win-Win Cooperation at 2015 TECHfest GE China Technology Center teams

  9. High-Speed Network Enables Industrial Internet | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Unveils High-Speed Network Infrastructure to Connect Machines, Data and People at Light Speed to the Industrial Internet Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) GE Unveils High-Speed Network Infrastructure to Connect Machines, Data and People at Light Speed to the Industrial Internet New fiber optic network

  10. Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) – PROTOCOL – EA-31-01

    Broader source: Energy.gov [DOE]

    Office of Environment, Safety and Health Assessments Protocol for Site Leads, April 2015 (Revision 1) – PROTOCOL – EA-31-01

  11. Development of an Updated Induced Seismicity Protocol for the Application

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Microearthquake (MEQ) Monitoring for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report | Department of Energy Updated Induced Seismicity Protocol for the Application of Microearthquake (MEQ) Monitoring for Characterizing Enhanced Geothermal Systems; 2010 Geothermal Technology Program Peer Review Report Development of an Updated Induced Seismicity Protocol for the Application of Microearthquake (MEQ) Monitoring for Characterizing Enhanced

  12. Protocol, Appraisal Process Guide - April 2008 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide This process guide provides information about the Department of Energy's (DOE) Independent Oversight process implemented by the DOE Office of Emergency Management Oversight in conducting independent oversight appraisals of DOE emergency management programs. The Office of Emergency Management Oversight Appraisal Process Guide is a

  13. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  14. A closer look at the fluctuations in the brightness of SN 2009IP during its late 2012 eruption

    SciTech Connect (OSTI)

    Martin, J. C. [Barber Observatory, University of Illinois Springfield, Springfield, IL 62704 (United States); Hambsch, F.-J. [Remote Observatory, Atacama Desert, Chile Vereniging Voor Sterrenkunde (VVS), Oude Bleken 12, B-2400 Mol (Belgium); Margutti, R.; Soderberg, A. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02318 (United States); Tan, T. G. [Perth Exoplanet Survey Telescope, Perth (Australia); Curtis, I., E-mail: jmart5@uis.edu [Adelaide (Australia)

    2015-01-01

    The supernova (SN) impostor SN 2009ip has re-brightened several times since its initial discovery in 2009 August. During its last outburst in late 2012 September, it reached a peak brightness of m{sub v} ?13.5 (M{sub v} brighter than ?18), causing some to speculate that it had undergone a terminal core-collapse SN. Relatively high-cadence multi-wavelength photometry of the post-peak decline revealed bumps in brightness infrequently observed in other SNe IIn. These bumps occurred synchronously in all ultraviolet (UV) and optical bands with amplitudes of 0.10.4 mag at intervals of 1030 days. Episodic continuum brightening and dimming in the UV and optical with these characteristics is not easily explained within the context of models that have been proposed for the late September 2012 outburst of SN 2009ip. We also present evidence that the post-peak fluctuations in brightness occur at regular intervals and raise more questions about their origin.

  15. ACCELERATING VERY FAST GAS IN THE SUPERNOVA IMPOSTOR SN 2009ip WITH JETS FROM A STELLAR COMPANION

    SciTech Connect (OSTI)

    Tsebrenko, Danny; Soker, Noam E-mail: soker@physics.technion.ac.il

    2013-11-10

    Using hydrodynamic numerical simulations we show that high-velocity ejecta with v ? 10{sup 4} km s{sup 1} in the outbursts of the supernova impostor SN 2009ip and similar luminous blue variable (LBV) stars can be explained by the interaction of fast jets, having v {sub jet} ? 2000-3000 km s{sup 1}, with a circumbinary shell (extended envelope). The density profile in the shell is very steep such that the shock wave, that is excited by the jets' interaction with the shell, accelerates to high velocities as it propagates outward. The amount of very fast ejecta is small, but sufficient to account for some absorption lines. Such an extended envelope can be formed from the binary interaction and/or the unstable phase of the LBV primary star. The jets themselves are launched by the more compact secondary star near periastron passages.

  16. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    SciTech Connect (OSTI)

    Shue, Craig A; Kalafut, Prof. Andrew; Gupta, Prof. Minaxi

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  17. Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol

    SciTech Connect (OSTI)

    Osterwald, C. R.

    2008-03-01

    This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

  18. Subfreezing Start/Stop Protocol for and Advanced Metallic Open...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Subfreezing StartStop Protocol for and Advanced Metallic Open-Flowfield Fuel Cell Stack Part of a 100 million fuel cell award announced by DOE Secretary Bodman on Oct. 25, 2006. ...

  19. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Broader source: Energy.gov [DOE]

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  20. A Study of Transport Protocols for Wide Area Scientific Applications

    SciTech Connect (OSTI)

    Vishal Misra

    2011-03-01

    This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

  1. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    SciTech Connect (OSTI)

    Majer, Ernie; Nelson, James; Robertson-Tait, Ann; Savy, Jean; Wong, Ivan

    2012-01-01

    This Protocol is a living guidance document for geothermal developers, public officials, regulators and the general public that provides a set of general guidelines detailing useful steps to evaluate and manage the effects of induced seismicity related to EGS projects.

  2. The Development of Rapid Aging and Poisoning Protocols for Diesel

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aftertreatment Devices | Department of Energy The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices The Development of Rapid Aging and Poisoning Protocols for Diesel Aftertreatment Devices Presentation given at DEER 2006, August 20-24, 2006, Detroit, Michigan. Sponsored by the U.S. DOE's EERE FreedomCar and Fuel Partnership and 21st Century Truck Programs. 2006_deer_bunting.pdf (769.94 KB) More Documents & Publications CLEERS Aftertreatment Modeling and

  3. High-Performance Computing Data Center Metering Protocol | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy High-Performance Computing Data Center Metering Protocol High-Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High-Performance Computing (HPC) data center facilities and documents system strategies that have been used in Department of Energy data centers to increase data center energy efficiency. Download the guide. (1.34 MB) More Documents & Publications Liquid Cooling v. Air Cooling Evaluation in the Maui High-Performance

  4. House Simulation Protocols (Building America Benchmark) - Building America

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top Innovation | Department of Energy House Simulation Protocols (Building America Benchmark) - Building America Top Innovation House Simulation Protocols (Building America Benchmark) - Building America Top Innovation Photo of a house prototype. As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals.

  5. Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Catalysts | Department of Energy Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER 2007). 13-16 August, 2007, Detroit, Michigan. Sponsored by the U.S. Department of Energy's (DOE) Office of FreedomCAR and Vehicle Technologies (OFCVT). deer07_bunting_1.pdf (1.08 MB) More Documents

  6. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems by Ernie Majer, James Nelson, Ann Robertson-Tait, Jean Savy, and Ivan Wong January 2012 | DOE/EE-0662 Cover Image Courtesy of Katie L. Boyle, Lawrence Berkeley National Laboratory i i Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Preface In June 2009, the New York Times published an article about the public fear of geothermal development causing earthquakes. The article

  7. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect (OSTI)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  8. Self-referenced continuous-variable quantum key distribution protocol

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration ofmore » the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  9. Self-referenced continuous-variable quantum key distribution protocol

    SciTech Connect (OSTI)

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  11. Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015

    Broader source: Energy.gov [DOE]

    Office of Environment, Safety and Health Assessments Protocol for Oversight Activities, December 2015

  12. Development of characterization protocol for mixed liquid radioactive waste classification

    SciTech Connect (OSTI)

    Zakaria, Norasalwa; Wafa, Syed Asraf; Wo, Yii Mei; Mahat, Sarimah

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as problematic waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  13. Controls: The unsung hero of the industrial internet revolution | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Controls: The Unsung Hero of The Industrial Internet Revolution Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Controls: The Unsung Hero of The Industrial Internet Revolution Vince Epperson 2015.08.03 You've probably heard about Big Data, the Industrial Internet and the (Industrial) Internet of Things.

  14. DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11.pdf...

    Broader source: Energy.gov (indexed) [DOE]

    .pdf More Documents & Publications DOEMajorSiteFacilityContracts2-2011.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1)...

  15. How To Setup EA Landing Page As Default Home Page For Internet Explorer |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http://energy.gov/iea/. Once the EA site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 1: In Internet Explorer enter the URL http://energy.gov/iea/. Once the EA site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 2: Choose “Add or

  16. How To Setup EHSS Landing Page As Default Home Page For Internet Explorer |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http://energy.gov/ehss/. Once the EHSS site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 1: In Internet Explorer enter the URL http://energy.gov/ehss/. Once the EHSS site loads, click on the Home (Alt + M) drop-down list (highlighted with the red arrow and box). STEP 2: Choose “Add

  17. The HART{reg_sign} Protocol -- A solution enabling technology

    SciTech Connect (OSTI)

    Helson, R.B.

    1996-09-01

    HART{reg_sign} Field Communications Protocol is widely accepted in the industry as the standard for digitally enhanced 4--20mA communication with smart field instruments. A wide range of products from an increasing number of suppliers are available today, and many more are in development. The enhanced two-way communication capability of instruments using the HART protocol can significantly improve plant information management, provide solutions to today`s business challenges, and yield substantial cost savings. Initial installation/commissioning savings of $400 to $500 per instrument and annual maintenance/operations savings of $100 to $200 per instrument are commonly reported.

  18. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  19. CSEP Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tobin Richardson President & CEO, ZigBee Alliance Board Alternate, CSEP BoD Smart Energy Profile 2.0 * A conversion of ZigBee Smart Energy 1.x to IP * MAC/PHY (link layer) independent (internetworking) - intended to run over generic Internet Protocol stack * Mainstream protocols profiled * Focus on communications related to efficiency, usage, price communication, demand response and load control, and messaging * Secure * Optimized for embedded and battery-powered devices * Range of backhaul

  20. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing

  1. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  2. Control room envelope unfiltered air inleakage test protocols

    SciTech Connect (OSTI)

    Lagus, P.L.; Grot, R.A.

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  3. Localized radio frequency communication using asynchronous transfer mode protocol

    DOE Patents [OSTI]

    Witzke, Edward L.; Robertson, Perry J.; Pierson, Lyndon G.

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  4. Safeguards Agreement and Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-01-07

    To ensure that DOE complies with the Agreement Between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, and the subsidiary arrangements to the Agreement. Canceled by DOE O 142.2A. Cancels DOE 1270.2B.

  5. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  6. Superior Energy Performance Measurement and Verification Protocol for Industry

    Broader source: Energy.gov [DOE]

    This Measurement and Verification Protocol for Industry defines the procedures that will be used to confirm conformance with the energy performance level requirements of the Superior Energy Performance® (SEP™) Program. The Program has two paths. This document is structured to reflect those different paths.

  7. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    SciTech Connect (OSTI)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of

  8. ip_11.indd

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... which may be a new or improved machine, material, or process; a unique ... threat materials by matching the proton signals from the scanned items to those in a ...

  9. THE DIVERSITY OF MASSIVE STAR OUTBURSTS. I. OBSERVATIONS OF SN2009ip, UGC 2773 OT2009-1, AND THEIR PROGENITORS

    SciTech Connect (OSTI)

    Foley, Ryan J.; Berger, Edo; Challis, Peter J.; Soderberg, Alicia M.; Fox, Ori; Levesque, Emily M.; Ivans, Inese I.; Rhoads, James E.

    2011-05-01

    Despite both being outbursts of luminous blue variables (LBVs), SN 2009ip and UGC 2773 OT2009-1 have very different progenitors, spectra, circumstellar environments, and possibly physical mechanisms that generated the outbursts. From pre-eruption Hubble Space Telescope images, we determine that SN 2009ip and UGC 2773 OT2009-1 have initial masses of {approx}> 60 and {approx}> 25 M{sub sun}, respectively. Optical spectroscopy shows that at peak, SN 2009ip had a 10,000 K photosphere and its spectrum was dominated by narrow H Balmer emission, similar to classical LBV giant outbursts, also known as 'supernova impostors'. The spectra of UGC 2773 OT2009-1, which also have narrow H{alpha} emission, are dominated by a forest of absorption lines, similar to an F-type supergiant. Blueshifted absorption lines corresponding to ejecta at a velocity of 2000-7000 km s{sup -1} are present in later spectra of SN 2009ip-an unprecedented observation for LBV outbursts, indicating that the event was the result of a supersonic explosion rather than a subsonic outburst. The velocity of the absorption lines increases between two epochs, suggesting that there were two explosions in rapid succession. A rapid fading and rebrightening event concurrent with the onset of the high-velocity absorption lines is consistent with the double-explosion model. A near-infrared excess is present in the spectra and photometry of UGC 2773 OT2009-1 that is consistent with {approx}2100 K dust emission. We compare the properties of these two events and place them in the context of other known massive star outbursts such as {eta} Car, NGC 300 OT2008-1, and SN 2008S. This qualitative analysis suggests that massive star outbursts have many physical differences that can manifest as the different observables seen in these two interesting objects.

  10. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    SciTech Connect (OSTI)

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  11. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  12. Practical Physiological Monitoring Protocol for Heat Strain Control

    SciTech Connect (OSTI)

    Anderson, R B; Johnson, J S; Burastero, S R; Gilmore, O

    2003-07-01

    This protocol is indicated when employees are: (1) Exposed to Heat Stress above the TLV; (2) Performing low to moderate work rates with rare excursions to heavy rates; NOT for heavy and very heavy work rates or requiring peak outputs for extended periods; and, (3) Determined to need physiological heat strain monitoring by the cognizant Industrial Hygienist. The requirements are: (1) A work/rest regimen must be established at outset and adjusted as needed during operations (see Appendix A); (2) On-going data collection and review; (3) Rest times must be increased if indicated; (4) Intended for normal, healthy adults. Seasonal medical screening is recommended; and (5) Training for affected employees regarding this protocol, hydration, self-limitation, lifestyle effects and signs, symptoms and treatment of heat related illnesses. This protocol is to aid industrial hygienists in assessing individual physiological response to employee heat exposures, and provides guidance to identify and reduce heat strain as needed. Physiological monitoring is recommended when heat exposure exceeds the TLV by {ge} 2 C and/or when evaporative cooling is limited or eliminated. Typically, this occurs when the use of personal protective equipment includes impermeable or water vapor restrictive outer garments. This protocol is used to identify when heat strain may be excessive. This is determined through measurements taken during each rest period. If decision criteria are exceeded, changes in work practices shall be implemented immediately to reduce employee heat strain and prevent heat related illnesses up to and including heat stroke, a life threatening condition. This protocol may not be appropriate under all conditions. Sound Industrial Hygiene professional judgment is required. Because the measurements for this protocol occur during the rest phase of the work/rest regimen, the conditions affecting employee heat strain during the work phase must be carefully weighed. Work rate

  13. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  14. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  15. A Resource assessment protocol for GEO-ELEC | Open Energy Information

    Open Energy Info (EERE)

    Resource assessment protocol for GEO-ELEC Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: A Resource assessment protocol for GEO-ELEC Authors...

  16. Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Protocol for Hydrogen Storage Systems in SAE J2579 and GTR Requirements for Cycling Testing and Its Effects on Type 3 and 4 Containers Test Protocol for Hydrogen Storage ...

  17. Microsoft Word - Assessment-C-SiteVisitProtocol

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ATTACHMENT C DEPARTMENTAL EVALUATION AND SITE VISIT PROTOCOL 1. The Departmental Records Officer will provide in writing to the PRO a sixty day notice of intent to evaluate, along with recommended sites to be visited and areas to be examined. 2. The PRO will notify sites to be visited and coordinate mutually agreeable dates with the Departmental Records Officer. 3. The PRO will provide an overview of the organization's Records Management Program and make summaries of assessments available for

  18. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    SciTech Connect (OSTI)

    O`Connell, L.J.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  19. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect (OSTI)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  20. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures

    SciTech Connect (OSTI)

    Burgess, R.; Blake, C.; Tracy, C. E.

    2008-09-01

    This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

  1. Everything you might want to know about the Internet but are afraid to ask!. A new users resource

    SciTech Connect (OSTI)

    Thiel, E.

    1993-09-01

    This document is a guide to accessing the Internet and the services available on Internet. The document contains a short explanation of the Internet by E. Kroll and E. Hoffman, brief descriptions of the primary access tools, a glossary, answers to frequently asked questions about the Internet, J. Martin`s `Search for Internet Treasure` and other helpful information. The data access tools discussed in this document include Gopher, World Wide Web, WAIS, ASTRA, ARCHIE, WHOIS, NETSERV, and TRICKLE. The file transfer tool discussed is BITFTP. The two communication services discussed are NETNEWS and LISTSERV.

  2. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    SciTech Connect (OSTI)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  3. The Internet Café of the Nuclear World | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Internet Café of the Nuclear World The Internet Café of the Nuclear World July 19, 2012 - 12:25pm Addthis Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Participants in the 2012 Advanced Test Reactor National Scientific User Facility Users Week, held at Idaho National Laboratory in June. | Photo courtesy of the Idaho National Laboratory Karissa Marcum

  4. SBIR Phase II Final Report - Multi-Protocol Energy Management Gateway for Home-Area Networks

    SciTech Connect (OSTI)

    Hanna, Jason

    2015-02-06

    Significant amounts of electricity, natural gas, and heating oil are wasted by homeowners due to inefficient operation and inadequate maintenance of heating, ventilation, and air conditioning (HVAC) equipment. Coincident’s work under this award reduces energy waste, saves consumers money, and reduces carbon emissions. It does so in three ways: First, Coincident’s approach replaces the traditional thermostat with a wireless network of sensors and controllers that measure temperature, humidity and occupancy in multiple rooms in the house. The “Internet of Things” is a technology trend holding the promise of ubiquitous inexpensive sensors. The reality, however, is that energy and HVAC monitoring and management is a patchwork of incompatible protocols and expensive proprietary technologies. Coincident’s multi-protocol architecture, developed in part under this award tackles this problem and brings low cost interoperable sensor and control devices to market. Second, the Coincident system eliminates hard-to-program and rigid thermostat schedules and instead provides automatic operation of heating and cooling by combining individual temperature and comfort preferences with energy-saving targets, real-time utility use information, weather data, and room utilization patterns. Energy efficiency technology must be appealing to consumers otherwise it will not be used. The Coincident user interface has engaging features such as remote control from any smart phone or web browser and per-room performance breakdowns. Expected energy savings resulting from more efficient operation of heating and air conditioning equipment are in the range of 10-20%. Third, the Coincident system provides heating and air-conditioning contractors with fine-grained performance data for every residence they support (subject to customer privacy controls). This data is integrated from diverse networks within the residence and includes HVAC performance and fuel use data. This information allows

  5. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht, C. Metzger; Wilson, E.; Horowitz, S.

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program’s goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  6. Addendum to the Building America House Simulation Protocols

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  7. Verifying a Simplified Fuel Oil Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, Hugh; Dentz, Jordan; Doty, Chris

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  8. Verifying a Simplified Fuel Oil Flow Field Measurement Protocol

    SciTech Connect (OSTI)

    Henderson, H.; Dentz, J.; Doty, C.

    2013-07-01

    The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

  9. Non-PGM Catalyst Performance Targets and Test Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wednesday, January 21, 2015, 9:30 AM - 5:00 PM MST Los Alamos National Laboratory Los Alamos, New Mexico Non-PGM Catalyst Performance Targets Los Alamos National Laboratory Non-PGM Catalyst Performance Targets and Test Protocols Catalysis Working Group, January 21 st , 2015 5 Discussion of Non-PGM ORR Catalyst Targets Already addressed three times at CWG meetings in Arlington, VA on May 15, 2013; Golden, CO on December 18 th , 2013 (update); and Washington, D.C. on June 16, 2014 * Areal current

  10. Superior Energy Performance Measurement and Verification Protocol for Industry

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Superior Energy Performance Measurement and Verification Protocol for Industry November 19, 2012 Table of Contents ©2012, The Regents of the University of California Notice: this manuscript has been authored by employees of the Regents of the University of California, and others, under Contract No DE-AC02-05CH11231 with the U.S. Department of Energy, for the management and operation of the Lawrence Berkeley National Laboratory. The United State Government retains a non-exclusive, paid-up,

  11. Proposals for Non-PGM Catalyst Target and Test Protocols

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cell Tech Team Proposals for Non-PGM catalyst target and test protocols FCTT (USCAR) Shinichi Hirano (co-chair), Tarek Abdel-Baset, Balsu Lakshmanan, David Masten, Mark Mehall, Jim Waldecker, Anusorn Kongkanand* and Patrick Pietrasz* *OEM Contributor June 16, 2014 2 Fuel Cell Tech Team 1. Non-PGM ORR catalyst is expected to be an opportunity to enable further cost reduction of fuel cell system beyond an achievement of the low PGM loading ORR catalyst. 2. Therefore, target should be to

  12. NIST cooperative laboratory for OSI routing technology

    SciTech Connect (OSTI)

    Montgomery, D.

    1994-05-23

    This document is one of two reports on the Integrated ISIS protocol. Required by the IAB/IESG in order for an Internet routing protocol to advance to Draft Standard Status. Integrated ISIS is an Interior Gateway Protocol and is designed to carry both IP and ISO CLNP routing information. Integrated ISIS is currently designated as a Proposed Standard. The protocol was first published in RFC 1195. Internet Draft was published subsequently to RFC 1195 and documents the current version of the protocol. This report documents experience with Integrated ISIS. This includes reports on interoperability testing, field experience and the current state of Integrated ISIS implementations. It also presents a summary of the Integrated ISIS Management Information Base (MIB), and a summary of the Integrated ISIS authentication mechanism.

  13. International Workshops to Foster Implementation of the IAEA Additional Protocol

    SciTech Connect (OSTI)

    Killinger, Mark H.; Coates, Cameron W.; Bedke, Michael L.

    2003-07-14

    A country’s adherence to the International Atomic Energy Agency’s (IAEA) Additional Protocol is an important statement to the world of that country’s commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEA’s regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  14. The Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Metzger, C.; Norton, Paul

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every four years, the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the "average occupant" in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  15. Building America Indoor Temperature and Humidity Measurement Protocol

    SciTech Connect (OSTI)

    Engebrecht-Metzger, C.; Norton, P.

    2014-02-01

    When modeling homes using simulation tools, the heating and cooling set points can have a significant impact on home energy use. Every 4 years the Energy Information Administration (EIA) Residential Energy Consumption Survey (RECS) asks homeowners about their heating and cooling set points. Unfortunately, no temperature data is measured, and most of the time, the homeowner may be guessing at this number. Even one degree Fahrenheit difference in heating set point can make a 5% difference in heating energy use! So, the survey-based RECS data cannot be used as the definitive reference for the set point for the 'average occupant' in simulations. The purpose of this document is to develop a protocol for collecting consistent data for heating/cooling set points and relative humidity so that an average set point can be determined for asset energy models in residential buildings. This document covers the decision making process for researchers to determine how many sensors should be placed in each home, where to put those sensors, and what kind of asset data should be taken while they are in the home. The authors attempted to design the protocols to maximize the value of this study and minimize the resources required to achieve that value.

  16. Connecting to the Internet Securely: Windows 2000 CIAC-2321

    SciTech Connect (OSTI)

    Orvis, W; Call, K; Dias, J

    2002-03-12

    As the threat to computer systems increases with the increasing use of computers as a tool in daily business activities, the need to securely configure those systems becomes more important. There are far too many intruders with access to the Internet and the skills and time to spend compromising systems to not spend the time necessary to securely configure a system. Hand-in-hand with the increased need for security are an increased number of items that need to be securely configured. Windows 2000 has about seven hundred security related policy settings, up from seventy two in Windows NT. While Windows 2000 systems are an extension of the Windows NT 4 architecture, there are considerable differences between these two systems, especially in terms of system and security administration. Operational policy, system security, and file security are other areas where Windows 2000 has expanded considerably beyond the domain model of Windows NT 4. The Windows NT 4 Domain model consists of domains of workstations that, with a single login, share resources and are administered together. The database of user settings and credentials resides in the domain server. Domains can trust other domains to expand the sharing of resources between users of multiple domains. On Windows 2000, the domains still exist but multiple domains that share trust are combined into Domain Trees and Domain Forests depending on how the logical namespace is divided. These trees and forests are combined under a new object called Active Directory. Domains themselves are broken down into Organizational Units. As such, there are more levels at which security policies can be set and for which information sharing can be controlled.

  17. GEO-ENGINEERING MODELING THROUGH INTERNET INFORMATICS (GEMINI)

    SciTech Connect (OSTI)

    W. Lynn Watney; John H. Doveton

    2004-05-13

    GEMINI (Geo-Engineering Modeling through Internet Informatics) is a public-domain web application focused on analysis and modeling of petroleum reservoirs and plays (http://www.kgs.ukans.edu/Gemini/index.html). GEMINI creates a virtual project by ''on-the-fly'' assembly and analysis of on-line data either from the Kansas Geological Survey or uploaded from the user. GEMINI's suite of geological and engineering web applications for reservoir analysis include: (1) petrofacies-based core and log modeling using an interactive relational rock catalog and log analysis modules; (2) a well profile module; (3) interactive cross sections to display ''marked'' wireline logs; (4) deterministic gridding and mapping of petrophysical data; (5) calculation and mapping of layer volumetrics; (6) material balance calculations; (7) PVT calculator; (8) DST analyst, (9) automated hydrocarbon association navigator (KHAN) for database mining, and (10) tutorial and help functions. The Kansas Hydrocarbon Association Navigator (KHAN) utilizes petrophysical databases to estimate hydrocarbon pay or other constituent at a play- or field-scale. Databases analyzed and displayed include digital logs, core analysis and photos, DST, and production data. GEMINI accommodates distant collaborations using secure password protection and authorized access. Assembled data, analyses, charts, and maps can readily be moved to other applications. GEMINI's target audience includes small independents and consultants seeking to find, quantitatively characterize, and develop subtle and bypassed pays by leveraging the growing base of digital data resources. Participating companies involved in the testing and evaluation of GEMINI included Anadarko, BP, Conoco-Phillips, Lario, Mull, Murfin, and Pioneer Resources.

  18. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect (OSTI)

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  19. Standard Hydrogen Test Protocols for the NREL Sensor Testing Laboratory (Brochure), NREL (National Renewable Energy Laboratory)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydrogen Test Protocols for the NREL Sensor Testing Laboratory December 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Photo by Robert Burgess, NREL/PIX 18420 0 1 Standard Test Protocols for the NREL Hydrogen Sensor Test Laboratory Researchers at the NREL Hydrogen Safety Sensor Test Laboratory 1 developed a variety of test protocols to quantitatively assess critical

  20. Protocol for EM Review/Field Self-Assessment of Site Specific Quality

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assurance Programs/Quality Implementation Plans | Department of Energy Services » Program Management » Quality Assurance » Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans Review protocol and lines of inquiry that are used as basis for technical review and approval of site-specific quality assurance

  1. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Cancels DOE O 142.2. Admin Chg 1, 6-27-13.

  2. Voluntary Offer Safeguards Agreement and Additional Protocol with the International Atomic Energy Agency

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-15

    The Order defines requirements for Department of Energy (DOE) compliance with the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States, the Protocol to the Agreement, the Additional Protocol to the Agreement, and the Subsidiary Arrangements to the Agreement and Additional Protocol. Supersedes DOE O 142.2. Admin Chg 1, dated 6-27-13, Supersedes DOE O 142.1A. Certified 12-3-14.

  3. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    SciTech Connect (OSTI)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  4. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  5. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  6. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  7. Protocols for Thermoluninescence and Optically Stimulated Luminescence Research at DOSAR

    SciTech Connect (OSTI)

    Bernal, SM

    2004-10-11

    The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research at the Dosimetry Applications Research (DOSAR) facility complex. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and materials testing in a variety of radiation environments. Collaborations with the University of Tennessee-Knoxville (UTK) have also led to important contributions in the area of archaeometry, particularly as it relates to the use of radiation dosimetry to date archaeological artifacts. This manual is to serve as the primary instruction and operation manual for dosimetric and archaeometric research at DOSAR involving thermoluminescence (TL) and optically stimulated luminescence (OSL). Its purpose is to (1) provide protocols for common practices associated with the research, (2) outline the relevant organizational structure, (3) identify the Quality Assurance plan, and (4) describe all the procedures, operations, and responsibilities for safe and proper operation of associated equipment. Each person who performs research at DOSAR using TL/OSL equipment is required to read the latest revision of this manual and be familiar with its contents, and to sign and date the manual's master copy indicating that the manual has been read and understood. The TL/OSL Experimenter is also required to sign the manual after each revision to signify that the changes are understood. Each individual is responsible for completely understanding the proper operation of the TL/OSL equipment used and for following the guidance contained within this manual. The instructions, protocols, and operating procedures in this manual do not replace, supersede, or alter the hazard mitigation controls identified in the Research Safety Summary (''Thermoluminescence/Optically Stimulated

  8. The Development of a Small Engine Based Accelerated Ash Loading Protocol |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Accelerated Ash Loading Protocol The Development of a Small Engine Based Accelerated Ash Loading Protocol Presentation given at DEER 2006, August 20-24, 2006, Detroit, Michigan. Sponsored by the U.S. DOE's EERE FreedomCar and Fuel Partnership and 21st Century Truck Programs. 2006_deer_bunting.pdf (371.89 KB) More Documents & Publications The Development of a Small Engine Based Ash Loading Protocol Development of an Accelerated Ash-Loading Protocol for Diesel

  9. Impacts of the Kyoto Protocol on Energy Markets and Economic Activity

    Reports and Publications (EIA)

    1998-01-01

    Analyzes the impacts on the Kyoto Protocol on U.S. energy markets and the economy in the 2008-2012 time frame.

  10. Sandia to Discuss Energy-Storage Test Protocols at the European...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Discuss Energy-Storage Test Protocols at the European PV Solar Energy Conference - Sandia ... distributed energy resource (DER) operation and communication within the power system. ...