National Library of Energy BETA

Sample records for java double literal

  1. T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...

    Broader source: Energy.gov (indexed) [DOE]

    password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061...

  2. Java ########### Java ############### Java ##############

    E-Print Network [OSTI]

    Hagiya, Masami

    Java ########### ############### #### #### # ######### ###### Java ############### Java ############## ## ################################## ## Java ##################### #### Java ##### ########################### ######### ############ Stata # Abadi #### #### Qian

  3. T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy T-685: Cisco

  4. Explore Java What Is Java?

    E-Print Network [OSTI]

    Myers, Brad A.

    Explore Java Must Reads What Is Java? Download the Java Development Kit Install the Java SE Development Kit Create Your First Java Program Reserved Words in Java Most Popular Free Java Newsletter! By Category Enter email address Getting Started Programming Concepts Tutorials Java Syntax Building

  5. Prolog Java Prolog Java Prolog Cafe Prolog

    E-Print Network [OSTI]

    Banbara, Mutsunori

    0 Prolog Java Prolog Java Prolog Cafe Prolog WAM Java Java Prolog Cafe Prolog Java Prolog Cafe Java Prolog Prolog Cafe Java Java Prolog Prolog Prolog Cafe SAT Multisat We present the Prolog Cafe system that translates Prolog into Java via the WAM. Prolog Cafe has the advantages of portability, extensibility

  6. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-4(368) · Die C++-Funktion muss in Java als native deklariert werden. Geladen werden soll sie aus einer dynamischen Bibliothek libcppfunctions.so. SprachMix/JNI/C++fromJava/Main.java 7 public class Main 8 { 9 public native static double

  7. Java XMGR

    SciTech Connect (OSTI)

    Dr. George L. Mesina; Steven P. Miller

    2004-08-01

    The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

  8. Experto Universitario Java Enterprise Lenguaje Java Avanzado

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Lenguaje Java Avanzado Sesión 2: Colecciones de datos © 2012-2013 Depto. Ciencia de la Computación e IA #12;Experto Universitario Java Enterprise Lenguaje Java Avanzado Java Enterprise Lenguaje Java Avanzado © 2012-2013 Depto. Ciencia de la Computación e IA Colecciones

  9. Scrambled Elements Literate Software Systems

    E-Print Network [OSTI]

    Pike, Robert D.

    14 E C R U 37 A L E 57 I C E 77 R E N T © Literate Software Systems ACROSS 1. Relaxation locale 4. Fat-cleaving enzyme 67. "No man is an island" poet 69. Yearn 70. Scrambled element #44 74. Kind

  10. Eclipse Java highgrep Eclipse

    E-Print Network [OSTI]

    Chiba, Shigeru

    14 99-0553-0 15 2 6 #12;1 Unix grep Eclipse Java Java ( ) · · Java highgrep highgrep Eclipse #12.2 . . . . . . . . . . . . . . . . . . . . . . . . . . 48 A 52 #12;6 2.1 Eclipse . . . . . . . . . . . . . . . . . . . . 16 2.2 Eclipse Java #12;8 1 Unix grep [4] A A A A Eclipse Java #12;1 9 Java ( ) · · int Eclipse Java Java highgrep

  11. UTS: Library Developing the information literate person

    E-Print Network [OSTI]

    University of Technology, Sydney

    of subject content to relevant information sources. Case Study 1 - Undergraduate Subject: EconomicsUTS: Library Developing the information literate person: UTS Case Studies 2005 Update Developing the information literate person: UTS Case Studies (2005 Update) 1 #12;Developing the information literate person

  12. Lenguaje Java Avanzado 1 Introduccin al lenguaje Java.......................................................................................4

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Introducción al lenguaje Java.......................................................................................4 1.1 Java......................................................................................5 1.3 Componentes de un programa Java

  13. JavaKollektionen Java Collection Framework

    E-Print Network [OSTI]

    Schürmann, Michael

    459 JavaKollektionen Java Collection Framework Bereitstellung wichtiger Kollektionen (Listen Implementierung häufig benutzter Algorithmen (Suchen, Sortieren, kleines/grö�tes Element, ...) Basis: java.util.Collection #12;460 Schnittstelle für alle Kollektionsklassen (1) Schnittstelle java.util.Collection Grö�e der

  14. Vol. 4, No. 10, 2005 Reflection-based implementation of Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Vol. 4, No. 10, 2005 Reflection-based implementation of Java extensions: the double-dispatch use of Java without modifying the language nor the virtual machine. In this paper, we present the advan- tages these principles have been applied to develop an efficient and general double-dispatch solution for Java, and we

  15. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    optimization with the new Java 8 feature: type annotation.12] is an extension of Java type system and can be used withon State Of the Art in Java Program Analysis, SOAP ’13,

  16. Turbocharging the Chrysler 2. 2 liter engine

    SciTech Connect (OSTI)

    Allen, F.E.; Rinschler, G.L.

    1984-01-01

    A new turbocharged 2.2 liter engine has been developed by Chrysler Corporation. It is derived from the Chrysler 2.2 liter naturally aspirated four cylinder powerplant. A number of new and redesigned components were required to yield a durable, high performance.

  17. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming languages are likely to encounter projects in the near future that require knowledge of Java. Who Should

  18. Java Programming Certificate Program

    E-Print Network [OSTI]

    Loudon, Catherine

    Java Programming Certificate Program COMPUTER PROGRAMMING The Java programming language lies that fuel the Internet economy. In addition, the portability inherent in Java is useful for programming are likely to encounter projects in the near future that require knowledge of Java. Who Should Enroll

  19. Gnralits Java Threads

    E-Print Network [OSTI]

    Grigoras, .Romulus

    Généralités Java Threads POSIX Threads Autres approches Sixième partie Programmation multi-activités Java & Posix Threads Systèmes concurrents 2 / 55 #12;Généralités Java Threads POSIX Threads Autres approches Plan 1 Généralités 2 Java Threads Manipulation des activités Synchronisation (java d

  20. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  1. Java for High Performance Computing Java HPC Codes

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Motivation Java for High Performance Computing Java HPC Codes Performance Evaluation Conclusions Java for High Performance Computing: Myth or Reality? Guillermo López Taboada Grupo de Arquitectura de López Taboada Java for HPC: Myth or Reality? #12;Motivation Java for High Performance Computing Java HPC

  2. 2000-Liter-Gesellschaft --Entwicklungschance fr Nord und Sd

    E-Print Network [OSTI]

    Wehrli, Bernhard

    2000-Liter-Gesellschaft -- Entwicklungschance für Nord und Süd Die Schweizerische Umweltstiftung initiiert die Real-Vision der 2000-Liter- Gesellschaft um den Wasserverbrauch von weltweit rund 4'000 Litern pro Person und Tag auf 2'000 Liter zu reduzieren. Die 2000-Liter-Gesellschaft ist das

  3. New 11 liter Komatsu diesel engine

    SciTech Connect (OSTI)

    Mizusawa, M.; Tanosaki, T.; Kawase, M.; Oguchi, T.

    1984-01-01

    New 6 cylinder direct injection 11 liter diesel engines which have naturally aspirated, turbocharged, and turbocharged-aftercooled versions have been developed and moved in production at the end of 1983. The highest output of the turbocharged-aftercooled version is 276 kW (375 ps) at 2200 RPM. Based on Komatsu new technologies 125 mm bore diesel has been designed to meet the users' demands, such as compact in size, light in weight, extremely high performance, high reliability and durability. The turbocharged and turbocharged-aftercooled engines are characterized by the adoption of the ductile cast iron piston which is the first application into the high speed, four cycle diesels in production in the world, and which was enabled by Komatsu design and precision casting technologies. This paper also covers the other design aspects and performance characteristics.

  4. Analysing Java System Properties Implementation

    E-Print Network [OSTI]

    Nierstrasz, Oscar

    Analysing Java System Properties Implementation Supplementary documentation to the Bachelor. It introduces the Java Platform Debugger Architecture (JPDA), looks at the Java Debug Interface (JDI;Analysing Java System Properties Contents David Wettstein, 8. Dezember 2013 3 Contents 1 Standard System

  5. Optimizing Java Theory and Practice

    E-Print Network [OSTI]

    Budimliæ, Zoran

    Optimizing Java Theory and Practice Zoran Budimlic Ken Kennedy Rice University Computer Science popularity of the Internet has made an instant star of the Java programming language. Java's portability Java implementation, even with just­in­time compilation technology, is far behind the most popular

  6. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL and Java Database Systems Lecture 19 Natasha Alechina SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 SQL and Java SQL and Other

  7. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL and Java Database Systems Lecture 19 Natasha Alechina #12;SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 #12;SQL and Java SQL and Other

  8. Lenguaje Java Avanzado 1 Presentacin..................................................................................................................2

    E-Print Network [OSTI]

    Escolano, Francisco

    Lenguaje Java Avanzado Índice 1 Presentación herramientas útiles para probar y depurar aplicaciones Java y Java EE. Por último, se estudiará el acceso de sesión Materiales 1. Introducción al lenguaje Java apuntes traspas ejercicios 2. Marco de

  9. Java Security Final Project for ECE578

    E-Print Network [OSTI]

    Java Security Final Project for ECE578: Computer and Network Security by Douglas R. Dechow A Brief History of Java and Java Security The Java language and environment began as an outgrowth of a failed eventually become Java. Given that from the very beginning, the intended application domain for Oak (Java

  10. GRAPHICS PROGRAMMING Section A Java

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section A ­ Java 1 - Introduction 2 - Installation & First Programs 3 - GUI: Layout Managers 9 - GUI: JMenu Gary Hill December 2003 Java 1 of 1 #12;GRAPHICS PROGRAMMING 1, sample applications, and support for Java standards. Get started quickly using the included tutorials

  11. Java support on genepool: java6 (jdk1.6) will be removed on 08...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

  12. Java and the Java Virtual Machine Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    Java and the Java Virtual Machine Robert St¨ark, Joachim Schmid, Egon B¨orger April 4, 2003.3 Decomposing Java and the JVM . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Sources and literature Part I. Java 3. The imperative core JavaI of Java . . . . . . . . . . . . . . . . . . . . . . . . 33 3

  13. Java Vertexing Tools

    SciTech Connect (OSTI)

    Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

    2006-03-03

    This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

  14. SOK's Java Notebook1 Steven O. Kimbrough

    E-Print Network [OSTI]

    Kimbrough, Steven Orla

    SOK's Java Notebook1 Steven O. Kimbrough University of Pennsylvania 3620 Locust Walk, Suite 1300 . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 Sun's JDK . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 First Java Applet: \\Hello, world!" . . . . . . . . . . . . . . . . 5 1.3 \\Hello, world" Java application

  15. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory, Pizza is a strict superset of Java that incorporatesothreehigher-order function* *s, and ideas from.algebraic data types. Pizza is defined by translation into Java andPcompilesiintozza attempts to make

  16. The Java API Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    ,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1; //int in range document processing Java Bootcamp Dr. Papalaskari Villanova University imported automatically, includes a Random object named gen: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr

  17. 20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1(368) 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Compiled Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus

  18. 20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20-1 20 Kombination von C++ und Java Inhalt 20.1 Java Native Interface (JNI) 20.1.1 C++-Funktionen aus Java aufrufen 20.1.2 Java-Funktionen aus C++ aufrufen 20.2 gcj und das Cygnus Native Interface (CNI) 20.2.1 C++-Funktionen aus Java aufrufen 20.2.2 Java-Funktionen aus C

  19. Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System

    E-Print Network [OSTI]

    Franek, Frantisek

    Presenting JECA: A Java Error Correcting Algorithm for the Java Intelligent Tutoring System Edward context involving small Java programs. Furthermore, this paper presents JECA (Java Error Correction is to provide a foundation for the Java Intelligent Tutoring System (JITS) currently being field-tested. Key

  20. Frelsning 1-2 Sprkkonstruktioner i Java

    E-Print Network [OSTI]

    Interface i Java Betyder "gränssnitt" Innehåller ingen implementering Alla metoder är implicit publika och

  1. Simple Java Scripting version 1.3

    E-Print Network [OSTI]

    Carlsson, Gunnar

    BeanShell Simple Java Scripting version 1.3 1 #12;Table of Contents Table of Contents· Introduction and Run BeanShell The BeanShell GUI Java Statements and Expressions Useful BeanShell Commands Scripted Syntax· Standard Java Syntax Loosely Typed Java Syntax Exception Handling Basic Scoping of Variables

  2. The ACM Java Libraries Andrew Mertz

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    The ACM Java Libraries Andrew Mertz William Slough Nancy Van Cleave Mathematics and Computer;Introduction NetBeans and Java The ACM Java Task Force (JTF) Libraries Placing applets on web pages How to learn about the ACM libraries: This workshop Textbooks ACM Java Task Force Tutorial Javadoc

  3. Pizza into Java: Translating theory into practice

    E-Print Network [OSTI]

    Wadler, Philip

    Pizza into Java: Translating theory into practice Martin Odersky University of Karlsruhe Philip Wadler University of Glasgow Abstract Pizza is a strict superset of Java that incorporates three ideas types. Pizza is defined by translation into Java and compiles into the Java Virtual Machine

  4. 3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/13 David Keil Computer Science I Using Java 3. Intro to Java 8/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  5. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (364) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  6. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3(378) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  7. 3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1

    E-Print Network [OSTI]

    Keil, David M.

    3. Java basics David Keil Computer Science I 8/14 David Keil Computer Science I Using Java 3. Intro to Java 6/14 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 3. Java basics 1. Higher-level languages and compilation 2. Java programs and statements 3. Program documentation

  8. 20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI)

    E-Print Network [OSTI]

    Arndt, Holger

    20 Kombination von C++ und Java 20.1 Java Native Interface (JNI) 20-3 (360) 20.1 Java Native Interface (JNI) Der Standardweg zur Kombination von C++ und Java ist das Java Native Interface (JNI), das Bestandteil des JDK ist. 20.1.1 C++-Funktionen aus Java aufrufen · Gegeben sei die folgende kleine C

  9. Practical pluggable types for Java

    E-Print Network [OSTI]

    Papi, Matthew M

    2008-01-01

    This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

  10. java.sun.com/javaone/sf An Introduction To Software

    E-Print Network [OSTI]

    Xie, Tao

    java.sun.com/javaone/sf An Introduction To Software Agitation Alberto Savoia Chief Technology generations of colleagues · Do it for yourself Foo.java FooTest.java #12;java.sun.com/javaone/sf My View

  11. Literate Programming in C The CWEB System of Structured Software Documentation

    E-Print Network [OSTI]

    van Leeuwen, Marc

    Literate Programming in C The CWEB System of CWEB, a system* * that supports the concept of "literate programming" for programs written, CWEBis not a complicated system, and * *just a few simple commands suffice for practical programming

  12. An Introduction to JavaScript Godmar Back

    E-Print Network [OSTI]

    Back, Godmar

    An Introduction to JavaScript Godmar Back #12;JavaScript ­ The Basics · Standardized as ECMAScript

  13. Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona

    E-Print Network [OSTI]

    Escolano, Francisco

    Java Destilado Francisco Morero PeyronaFrancisco Morero Peyrona Sun AmbassadorSun Ambassador Sun Awarded EngineerSun Awarded Engineer III Jornadas de Tecnología JavaIII Jornadas de Tecnología Java www.jtech.ua.es/jornadaswww.jtech.ua.es/jornadas #12;Qué es JavaQué es Java Java Destilado #12;ComunidadComunidad Lenguaje

  14. JSetL: A Java Library for Supporting Declarative Programming in Java

    E-Print Network [OSTI]

    Rossi, Gianfranco

    JSetL: A Java Library for Supporting Declarative Programming in Java #3; G. Rossi y , E. Panegai, E present a Java library|called JSetL|that o#11;ers a number of facilities to support declarative, how these features can be exploited to support a real declarative programming style in Java. Keywords

  15. Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/

    E-Print Network [OSTI]

    Rutledge, Steven

    VCHILL Getting Started 1) Visit the Java VChill website at http://chill.colostate.edu/java/ 2) Click on "Launch VChill" (you will see Java start up * ) 3) Enter signon name (password dialog pops up bookmark case * If it does not, you may need to install Java first. Click on the Download Center link (in

  16. Musa hybrid cv. Blue Java (Cultivated) 3 

    E-Print Network [OSTI]

    James R. Manhart

    2011-08-10

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  17. Adaptive Java Optimisation using machine learning techniques 

    E-Print Network [OSTI]

    Long, Shun

    approach are implemented in a prototype Adaptive Optimisation Framework for Java (AOF-Java). The experimental results show that the heuristic random search algorithm can find, within a relatively small number of atttempts, good points in the large...

  18. Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda and the Message

    E-Print Network [OSTI]

    Dickens, Phillip M.

    1 Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda on these systems. In this article, we present JavaNOW (Java on Networks of Workstations), a Java based framework memory model but with a flexible set of primitive operations. JavaNOW provides a simple yet powerful

  19. PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE)

    E-Print Network [OSTI]

    Loudon, Catherine

    PO Box 6050, Irvine, CA 92616-6050 www.extension.uci.edu Java Enterprise Edition (Java EE) Technologies Certificate Program #12;UC Irvine Extension Certificate Program in Java Enterprise Edition (Java EE) Technologies 2 Revised: 11/09/09 OVERVIEW The Java Enterprise Edition (Java EE) Technologies

  20. JOP: A Java Optimized Processor Martin Schoeberl

    E-Print Network [OSTI]

    JOP: A Java Optimized Processor Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, AUSTRIA martin@jopdesign.com Abstract. Java is still not a common language for embedded systems. It posses of the Java Virtual Ma- chine with focus on real-time applications. This paper describes the architecture

  1. Introduction to Java March 1, 2001

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Introduction to Java March 1, 2001 CBRSS and the John M. Olin Institute for Strategic Studies Lars-Erik Cederman #12;Outline · Java ­ overview ­ simple structures ­ object-orientation ­ roulette example · How to compile etc. · Readings and documentation #12;Java · Conceived by Sun in the early 1990s · Became the new

  2. Decompiling Java Using Staged Encapsulation Jerome Miecznikowski

    E-Print Network [OSTI]

    Decompiling Java Using Staged Encapsulation Jerome Miecznikowski Laurie Hendren Sable Research,hendren]@sable.mcgill.ca Abstract This paper presents an approach to program structur­ ing for use in decompiling Java bytecode to Java source. The structuring approach uses three intermediate represen­ tations: (1) a list of typed

  3. JAVA PROGRAMMING University of Adelaide, Australia

    E-Print Network [OSTI]

    Hawick, Ken

    JAVA PROGRAMMING Ken Hawick University of Adelaide, Australia Present Address: Massey University, New Zealand Email k.a.hawick@massey.ac.nz Revised: September 2003 #12;COURSE OVERVIEW #12;Java in the Java programming language and environment, focusing on the core language features. A number of worked

  4. MAKING JAVA HARD REALTIME Peter Puschner

    E-Print Network [OSTI]

    MAKING JAVA HARD REAL­TIME Peter Puschner Institut fË?ur Technische Informatik Technische Universit,andyg@cs.york.ac.uk ABSTRACT Due to its portability and security the Java program­ ming language has become very popular. Standard Java is however not suited for programming hard real­time sys­ tems. To overcome this limitation

  5. GRAPHICS PROGRAMMING SECTION D -JAVA 3D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING SECTION D - JAVA 3D 1SECTION D - GRAPHICS 3-D........................................................................................... 2 30 Graphics 3D: Introduction to Java 3D........................................................................................ 78 ©Gary Hill September 2004 Java 3-D 1 of 13 #12;GRAPHICS PROGRAMMING SECTION D - GRAPHICS 3-D 30

  6. the Control on the Java Ic

    E-Print Network [OSTI]

    Rock, Chris

    1. Go to 2. Click o the Control on the Java Ic How To R Panel (from t con in Contro Reset You the Start Butt ol Panel ur Java Ca ton) che (Windows) 1 #12; 3. Unde 4. The T r Java Ca orary Internet ow will open ­ che (Win t Files" ­ Click ­ find "Delete dows) k on "Settings e

  7. GRAPHICS PROGRAMMING Section B Java 2D

    E-Print Network [OSTI]

    Hill, Gary

    GRAPHICS PROGRAMMING Section B ­ Java 2D 20 - Graphics2D: Introduction 21 - Graphics2D: Shapes 22 2D: General Path Curves 29 - Graphics 2D: Constructive Area Geometry Gary Hill December 2003 Java 2 Java initially through the Abstract Window Toolkit, which was extended to include swing, shortly

  8. Extending Java for Android Programming Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    Extending Java for Android Programming Yoonsik Cheon TR #12-13 April 2012 Keywords: application framework, domain specific language, Android, Java. 1998 CR Categories: D.2.3 [Software Engineering] Coding Java for Android Programming (An Extended Abstract) Yoonsik Cheon Department of Computer Science

  9. 2009 IBM Corporation 2009 IBM Corporation IMS and Java

    E-Print Network [OSTI]

    1 © 2009 IBM Corporation© 2009 IBM Corporation IMS and Java for Application Modernization Barbara November 4-5, 2009 This presentation discusses use of IMS and Java to modernize your applications. #12;2 2 IMS © 2009 IBM Corporation Agenda Java basics IMS Java basics IMS Java Applications IMS Database

  10. Introduction Java Bootcamp -Villanova University Dr. Papalaskari 1

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Introduction Java Bootcamp - Villanova University Dr. Papalaskari 1 CSC 2014 ­ Java Bootcamp Dr in this presentation are adapted from the slides accompanying Java Software Solutions by Lewis & Loftus Java Bootcamp Dr. Papalaskari Villanova University Introduction to Java Course website www

  11. A Type System for Object Initialization In the Java TM

    E-Print Network [OSTI]

    Mitchell, John C.

    A Type System for Object Initialization In the Java TM Bytecode Language Stephen N. Freund \\Lambda In the standard Java implementation, a Java language program is compiled to Java bytecode. This bytecode may be sent across the network to another site, where it is then executed by the Java Virtual Machine. Since

  12. ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications

    E-Print Network [OSTI]

    Chrzaszcz, Jacek

    ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications Aleksy Schubert1 static checking tools like ESC/Java2 can be used to ensure source code security properties of Java is further accompanied by a presentation on how these threats can be controlled by JML specifications and ESC/Java

  13. Supplement I.E: Create Shortcut for Java Applications on For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement I.E: Create Shortcut for Java Applications on Windows For Introduction to Java Programming By Y. Daniel Liang NOTE: You may use this supplement after Chapter 18, "Applets and Multimedia

  14. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK...

  15. JavaScript-to-Java Tips Learning new languages is inevitable over the course of

    E-Print Network [OSTI]

    Dahlquist, Kam D.

    play a very similar role, but they are more strictly required in Java Equality and inequality--Comparators

  16. A Java Agent-based MacroEconomic Laboratory

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Agent-based MacroEconomic Laboratory Pascal Seppecher May 2, 2012 Abstract This paper as a Java application (Jamel: Java Agent-based MacroEconomic Laboratory). This application, together

  17. Supplement: The & and | Operators For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    8 Supplement: The & and | Operators For Introduction to Java Programming By Y. Daniel Liang Java operations. See Supplement III.D, "Bit Manipulations," for details. #12;

  18. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  19. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  20. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  1. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  2. A Formal Framework for Java Separate Compilation

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    A Formal Framework for Java Separate Compilation Davide Ancona, Giovanni Lagorio, and Elena Zucca,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a formal notion, called compilation schema, allow- ing to specify di#11;erent possibilities for performing the overall process of Java compilation, which includes type-checking of source

  3. Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Java Instrumentation for Dynamic Analysis Jeff Perkins and Michael Ernst MIT CSAIL 14 Nov 2005 09:45Page 1 Jeff PerkinsJava Instrumentation for Dynamic Analysis #12;Java Instrumentation Approaches Instrument source files Java Debug Interface (JDI) Instrument class files 14 Nov 2005 09:45Page 2 Jeff

  4. Guide d'utilisation de SSJ Langage Java

    E-Print Network [OSTI]

    Vázquez-Abad, Felisa J.

    Guide d'utilisation de SSJ Langage Java 15 Janvier 2001 ­ Dans votre .cshrc, rajouter la ligne'un de xdvi guide.dvi & acroread guide.pdf & 1 Version Java Nous utilisons la version 1.2 de Java. Elle votre programme (par exemple Tulipe.java) utilisant les objets de SSJ, compiler simplement avec la

  5. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the link for your

  6. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.java.com/en/download/manual.jsp 2. Click the Windows 7, XP Online

  7. Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java.

    E-Print Network [OSTI]

    Sibille, Etienne

    Install Sun Java Plug-In for PRISM You will need administrator rights to your computer to install Java. Please contact your technical support group for assistance. 1. Go to the following web site to download the Sun Java plug-in. http://www.oracle.com/technetwork/java/javase/downloads/index.html 2. Next

  8. La programmation orientee objets et le langage Java

    E-Print Network [OSTI]

    Tichit, Laurent

    La programmation orient´ee objets et le langage Java Master Pro BBSG 2 Henri Garreta, Laurent Tichit D´epartement d'Informatique, Facult´e des Sciences de Luminy Cours 1: Java "sans les objets" c H. Garreta et L. Tichit, 2011-2012 POO et Java 1 / 32 #12;Java "sans les objets" Ressources Documentation www.dil.univ-mrs.fr/~tichit/java

  9. A comparison of C++, Java and Python 

    E-Print Network [OSTI]

    Chou, Ling

    1997-01-01

    of new OOP languages have emerged. These languages provide powerful application tools on some specific areas. Java and Python are two excellent next-generation languages. They inherit most praising features from C++, provide simpler user interfaces...

  10. Javarifier : inference of reference immutability in Java

    E-Print Network [OSTI]

    Quinonez, Jamie

    2008-01-01

    Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

  11. T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory- February 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.

  12. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Broader source: Energy.gov (indexed) [DOE]

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  13. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  14. Lab 6: Java API CSC1051 1/4

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    Lab 6: Java API CSC1051 1/4 Java derives much of its power from the many classes already defined in the Java API. But how are we ever to learn and use these classes if we don't know about them? Any text on Java can only begin to cover these classes and the methods defined in them. For a complete listing

  15. 4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1

    E-Print Network [OSTI]

    Keil, David M.

    4. Standard Java data types David Keil Computer Science I 6/13 David Keil Computer Science I Using Java 4. Standard types 6/13 1 David M. Keil, Framingham State University CSCI 152 Computer Science I Using Java 4. Standard Java data types 1. Java classes, objects, and methods 2. Numeric data types 3

  16. Implementing Continuation Marks in JavaScript John Clements

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    to adapt them to the Rhino implementation of JavaScript, a language that supports closuresImplementing Continuation Marks in JavaScript John Clements California Polytechnic State University the simplicity and utility of continuation marks by adapting them for JavaScript as frame-based stack marks using

  17. An Operational Semantics for JavaScript Sergio Maffeis1

    E-Print Network [OSTI]

    Mitchell, John C.

    that we considered include SpiderMonkey [17] (used by Firefox), the Rhino [4] implementation for JavaAn Operational Semantics for JavaScript Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 to JavaScript, as a basis for analyzing security properties of web applications and mashups. The se

  18. Designing Intelligent Agents Tutorial 1: Java Agent Package

    E-Print Network [OSTI]

    Alechina, Natasha

    G54DIA: Designing Intelligent Agents Tutorial 1: Java Agent Package Natasha Alechina School agent package(s) · agent toolkits · uk.ac.nott.cs.g54dia Java agent packages ­library package ­demo package © Brian Logan 2013 G54DIA Tutorial 1: Java Agent Package 2 #12;Implementing your agent · many

  19. JavaTM On Steroids: Sun's High-Performance

    E-Print Network [OSTI]

    Hölzle, Urs

    of research (Sun, Stanford, UCSB) #12;13HotChips IX Garbage Collector · accurate garbage collector · fastJavaTM On Steroids: Sun's High-Performance Java Implementation Urs Hölzle Lars Bak Steffen Grarup Robert Griesemer Srdjan Mitrovic Sun Microsystems 2HotChips IX History · First Java implementations

  20. Another Step Towards a Smart Compilation Manager for Java

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Another Step Towards a Smart Compilation Manager for Java G. Lagorio DISI - Universit`a di Genova Compilers General Terms Languages Keywords Java, separate compilation ABSTRACT In a recent work we have) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source

  1. Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds 1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  2. A Java Reinforcement Learning Module for the Recursive Porous

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit Facilitating Evaluation of free java-libraries for social- scientific agent based simulation, Tobias and Hoffman, 2004 in Repast Genetic Algorithm demo model OpenForecast demo model Java Object Oriented Neural Engine (JOONE

  3. Modularity for Java and How OSGi Can Help

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Modularity for Java and How OSGi Can Help DECOR October 28th , 2004 Richard S. Hall #12;Software environment #12;Focus of my research Popularized by Java because of its simple dynamic code loading mechanisms of modularity mechanism The Java world has many frameworks and systems reinventing this wheel e.g., component

  4. JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming

    E-Print Network [OSTI]

    Cook, Di

    JAVA GIS, Exploratory Spatial Data Analysis and Precision Farming Nicholas Lewin Dept of Statistics XGobi to JAVA, as a new implementation JGobi, as a companion to this package we would like to develop our own map applica­ tion, also in JAVA that would over come platform dependencies, as well

  5. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  6. JAVA CARD Tools for Together Control Center Wojciech Mostowski

    E-Print Network [OSTI]

    Mostowski, Wojciech

    JAVA CARD Tools for Together Control Center Wojciech Mostowski Chalmers University of Technology, G¨oteborg, Sweden Computing Science Department e-mail: woj@cs.chalmers.se Abstract This is a description of the JAVA CARD Tools package for Together Control Center. The package supports the development of JAVA CARD

  7. An efficient Java implementation of the immediate successors calculation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An efficient Java implementation of the immediate successors calculation Cl´ement Gu´erin, Karell an effective Java imple- mentation of the concept immediate successors calculation. It is based on the lattice Java library, developed by K. Bertet and the Limited Objects Access algorithm, proposed by C. Demko [5

  8. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  9. Using a Java Optimized Processor in a Real World Application

    E-Print Network [OSTI]

    Using a Java Optimized Processor in a Real World Application Martin Schoeberl JOP.design, Strausseng. 2-10/2/55, A-1050 Vienna, Austria martin@jopdesign.com Abstract -- Java, a popular programming language on desktop systems, is rarely used in embedded systems. Some features of Java, like thread support

  10. JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers

    E-Print Network [OSTI]

    Keinan, Alon

    JMatch: Java plus Pattern Matching Jed Liu Andrew C. Myers Computer Science Department Cornell University Abstract The JMatch language extends Java with iterable abstract pattern matching, pattern matching that is compatible with the data abstraction features of Java and makes iteration ab­ stractions

  11. A Java Processor Architecture for Embedded Real-Time Systems

    E-Print Network [OSTI]

    A Java Processor Architecture for Embedded Real-Time Systems Martin Schoeberl Institute of Computer conservative estimates. JOP (Java Optimized Processor) tackles this problem from the architectural perspective average case performance. This paper presents a Java processor designed for time-predictable execution

  12. Java Separate Type Checking is not Safe (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Java Separate Type Checking is not Safe (Extended Abstract) Davide Ancona, Giovanni Lagorio,lagorio,zuccag@disi.unige.it Abstract. Java supports separate type-checking in the sense that com- pilation can be invoked on a single in the environment. However, the Java speci#12;cation does not de#12;ne precise rules on how this process should

  13. Java: Semantics and Type Soundness Gaurav S. Kc

    E-Print Network [OSTI]

    Yang, Junfeng

    Java: Semantics and Type Soundness Gaurav S. Kc B. Eng., Department of Computing Imperial College of Science, Technology and Medicine e-mail: gsk1@doc.ic.ac.uk Abstract Java is a programming language of programming applications. The main problem with Java is that it has borrowed so many features from so many

  14. A Java Middleware Platform for Resource-Aware Distributed Applications

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

  15. Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2

    E-Print Network [OSTI]

    Modeling the Java Bytecode Verifier Mark C. Reynolds1 ,2 Computer Science Department Boston University Boston, US Abstract The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly

  16. Status Report: Specifying JavaScript with ML David Herman

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    - igator 2.0 web browser. Despite its name, the language has little to do with the Java programmingScript, the popular programming language for browser-based web applications. This "definitional interpreter" serves of the interesting new features of JavaScript 2.0. Section 4 describes the history of approaches to specifying Java

  17. The Java Market: Transforming the Internet into a Metacomputer

    E-Print Network [OSTI]

    Amir, Yair

    The Java Market: Transforming the Internet into a Metacomputer Yair Amir 1 , Baruch Awerbuch running on a producer's machine. The Java Market modifies the submitted application. It transforms of the time. This paper presents the Java Market, a system that allows organizations and Internet users

  18. AirJava: Networking for Smart Spaces Kevin L. Mills

    E-Print Network [OSTI]

    of building AirJava adapters today so researchers can begin experimenting with Smart Spaces. 1. Introduction propose a means of building AirJava adapters so researchers can begin experimenting with Smart SpacesAirJava: Networking for Smart Spaces Kevin L. Mills Information Technology Laboratory National

  19. First limit from a surface run of a 10 liter Dark Matter Time Projection Chamber

    E-Print Network [OSTI]

    Caldwell, Thomas S., Jr

    2009-01-01

    A 10 liter prototype Dark Matter Time Projection Chamber (DMTPC) is operated on the surface of the earth at 75 Torr using carbon-tetrafluoride (CF4) as a target material to obtain a 24.57 gram-day exposure. A limit is set ...

  20. Compare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax and features with Java

    E-Print Network [OSTI]

    Liang, Y. Daniel

    and features with Java C++ Java cout int x; cin >> x dynamically p->getArea(); or (*p).getArea() c.getArea(); delete p; c = null; Automatically removed PassCompare C++ Syntax and Features with Java Here is a brief summary that compares C++ syntax

  1. Java programming for high-performance

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    language to solv- ing large computational problems in science and en- gineering. Unless these issuesJava programming for high-performance numerical computing by J. E. Moreira S. P. Midkiff M. Gupta PTM language has taken off as a serious general-purpose programming language. Industry and academia alike have

  2. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  3. Java Therapy: Web-Based Robotic Rehabilitation

    E-Print Network [OSTI]

    Reinkensmeyer, David J.

    Java Therapy: Web-Based Robotic Rehabilitation David J. Reinkensmeyer, Clifton T. Pang, Jeff A performance, allowing users and their caregivers to assess rehabilitation progress via the Web. 1 are developing robotic devices, termed "rehabilitators", that physically interact with people to stimulate

  4. FIRE4, LiteRed and accompanying tools to solve integration by parts relations

    E-Print Network [OSTI]

    A. V. Smirnov; V. A. Smirnov

    2013-02-24

    New features of the Mathematica code FIRE are presented. In particular, it can be applied together with the recently developed code LiteRed by Lee in order to provide an integration by parts reduction to master integrals for quite complicated families of Feynman integrals. As as an example, we consider four-loop massless propagator integrals for which LiteRed provides reduction rules and FIRE assists to apply these rules. So, as a by-product one obtains a four-loop variant of the well-known three-loop computer code MINCER. We also describe various ways to find additional relations between master integrals for several families of Feynman integrals.

  5. MSc CSYM021 Java Programming GJH: 2008 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2008 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief A: 2D Right (East) Panel: The Java Swing application is to include a Java 2D graphics maze

  6. The state of the Java universe

    ScienceCinema (OSTI)

    None

    2011-10-06

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  7. The state of the Java universe

    SciTech Connect (OSTI)

    None

    2011-02-08

    Speaker Bio: James Gosling received a B.Sc. in computer science from the University of Calgary, Canada in 1977. He received a Ph.D. in computer science from Carnegie-Mellon University in 1983. The title of his thesis was The Algebraic Manipulation of Constraints. He has built satellite data acquisition systems, a multiprocessor version of UNIX®, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs, for UNIX systems. At Sun his early activity was as lead engineer of the NeWS window system. He did the original design of the Java programming language and implemented its original compiler and virtual machine. He has recently been a contributor to the Real-Time Specification for Java.

  8. An OpenMPlike Interface for Parallel Programming in Java M. E. Kambites

    E-Print Network [OSTI]

    Bull, Mark

    in­ clude JavaParty [15], HPJava [3], Titanium [19] and SPAR Java [18]. However, these are designed. The current implementations of Tita­ nium and SPAR are via compilation to C, and not Java. The remainder

  9. Review of Correspondence Analysis and Data Coding with Java and R

    E-Print Network [OSTI]

    Jan de Leeuw

    2011-01-01

    and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

  10. A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids

    E-Print Network [OSTI]

    De Sterck, Hans

    A Lightweight Java Taskspaces Framework for Scientific Computing on Computational Grids Appeared orientation and platform independence realized by implementation in Java. Grid administration tasks, Intertask Communication, Scalability, Java 1. INTRODUCTION Distributed computing on heterogeneous

  11. Exploring the Suitability of Existing Tools for Constructing Executable Java Slices

    E-Print Network [OSTI]

    Iyer, Divya

    2012-05-31

    Java is a managed programming language, and Java programs are executed in a virtual machine (VM) environment. Java VMs not only execute the primary application program, but also perform several other auxiliary tasks at runtime. Some...

  12. C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML

    E-Print Network [OSTI]

    Liang, Y. Daniel

    C:\\idrive\\web\\intro6e\\supplement\\Supplement6(d)JavaXML.doc Last printed Supplement VI.D: Java and XML For Introduction to Java Programming By Y. Daniel Liang This supplement introduces how to use Java is required for this supplement. To learn XML, please read Supplement VI.C, "XML." 0 Introduction

  13. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by...

  14. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  15. Main-Memory Management to Support Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Daynes, L.

    Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

  16. JWBS001C-142.tex WL041/Bidgoli WL041-Bidgoli.cls September 16, 2005 9:8 Char Count= 0 Hostile Java AppletsHostile Java Applets

    E-Print Network [OSTI]

    Evans, David

    Hostile Java AppletsHostile Java Applets David Evans, University of Virginia Introduction 126 Java 135 INTRODUCTION Java was introduced in 1995 as both a high-level pro- gramming language and an intermediate language, Java Virtual Machine language (JVML, sometimes called Java byte codes), and execution

  17. Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen , Victor S. Frost

    E-Print Network [OSTI]

    Kansas, University of

    Application of the Java Message Service in mobile monitoring environments Martin Kuehnhausen à on trains. The Java Message Service (JMS) presents a flexible transport layer for asynchronous communication

  18. T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26.

  19. Constructing Verifiably Correct Java Programs Using OCL and CleanJava

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java and supports Cleanroom- style functional program verification. The combination of OCL and Clean the correctness of code using a Cleanroom-style functional program verification technique. We use OCL language to support Cleanroom-style functional program verification [5] (see Sec- tion II-B for an overview

  20. JAVA Project IMIS 2009-2010 Page 1 sur 3 JAVA Project IMIS

    E-Print Network [OSTI]

    Marfisi-Schottman, Iza

    the flow of luggage and carts in the airport. Big luggage Batterie recharge Airplane 3Airplane 2Airplane 1-in desk. #12;JAVA Project ­ IMIS ­ 2009-2010 Page 2 sur 3 The carts run on a battery that needs to be recharged every few kilometers. When the chart detects that its battery is low, it goes to one

  1. Search strategies for Java bottleneck location by dynamic instrumentation

    E-Print Network [OSTI]

    Kelly, Paul H. J.

    instrumentation within a Java Virtual Ma- chine. Several options are available; our implementation used our VeneerSearch strategies for Java bottleneck location by dynamic instrumentation Douglas J Brear, Thibaut investigation of this interesting approach. 1 Introduction The idea of dynamically patching instrumentation code

  2. Granting Java Native Interface Developers Their Wishes Martin Hirzel

    E-Print Network [OSTI]

    Grimm, Robert

    , Sun's original FFI for Java, the Native Method In- terface [52, 53] (NMI), directly exposed Java. Furthermore, it constrains garbage collectors and just- in-time compilers, since changes to the data representation may break native code. In fact, NMI required a conserva- tive garbage collector because direct

  3. Garbage Collection for Memory-Constrained Java Virtual Machines

    E-Print Network [OSTI]

    Abdelrahman, Tarek S.

    the mod- ified collector in the Sun Microsystems JDK 1.2.2 using ap- plications from the SPECjvm98 collector for Java Virtual Machines (JVMs) that al- lows applications to run using less memory. The modified of Java programs, compared to existing GC al- gorithms. The majority of garbage collectors fall

  4. True Separate Compilation of Java Classes # DISI Universit

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes # D. Ancona DISI ­ Universit â?? a di Genova Via Dodecaneso compilation for a small but significant Java subset, in the sense that a single class declaration can be intra­checked (following the Cardelli's terminology) and compiled providing a minimal set of type requirements on missing

  5. Compositional Compilation for Java-like Languages through Polymorphic Bytecode

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Compositional Compilation for Java-like Languages through Polymorphic Bytecode extended version Dodecaneso, 35 16146 Genova, Italy zucca@disi.unige.it ABSTRACT We define compositional compilation compositional compilation is a highly desirable feature, in Java-like languages it can hardly be achieved

  6. Supplement: Using Packages For Introduction to Java Programming

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Supplement: Using Packages For Introduction to Java Programming By Y. Daniel Liang NOTE: If you wish to use packages to organize the classes in the text, read this supplement after Chapter 1:\\book. cd .. -- Changes to the parent directory. See Supplement I.C, "Creating, Compiling and Running Java

  7. Pace Web Server: A Pure Java Web Server

    E-Print Network [OSTI]

    Tao, Lixin

    Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya Srinivasaraghavan University 2003 #12;Abstract Pace Web Server: A Pure Java Web Server with a Servlet Container by Priya their products and services to their customers. An essential ingredient to the Internet has been the web server

  8. Retargeting Android Applications to Java Bytecode Damien Octeau

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    Retargeting Android Applications to Java Bytecode Damien Octeau Department of Computer Science Pennsylvania State University mcdaniel@cse.psu.edu ABSTRACT The Android OS has emerged as the leading platform for Smart- Phone applications. However, because Android applications are compiled from Java source

  9. Experiences in Implementing a Java Collaborative IDE over the Internet

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    1 Experiences in Implementing a Java Collaborative IDE over the Internet CHIEN-MIN WANG, SHUN of issues related to event broadcasting in a Java collaborative computing environment over the Internet. We technologies, communication over the Internet has become commonplace and collaboration via the Internet has

  10. Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation

    E-Print Network [OSTI]

    direct access to the Princeton Wordnet data, so as to help Java developers find the library 1 See Table 6- cess the information in the original Prince- ton Wordnet databases. From this compari- son emerges-coverage, easiest-to-use library available. A Java developer seeking to access the Prince- ton Wordnet is faced

  11. Amos II Java Interfaces Daniel Elin and Tore Risch

    E-Print Network [OSTI]

    Risch, Tore

    1 Amos II Java Interfaces Daniel Elin and Tore Risch Uppsala Database Laboratory Department-02-06 This report describes the external interfaces between Amos II and the programming lan- guage Java. There are also interfaces between Amos II and the programming languages C and Lisp, documented separately

  12. Java - Darajat Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8,OpenKentucky: EnergyFacilityIllinois:SouthLLC JumpNewJava

  13. Developing numerical libraries in Java RONALD F. BOISVERT1, JACK J. DONGARRA2, ROLDAN POZO1,

    E-Print Network [OSTI]

    Dongarra, Jack

    A. REMINGTON1 AND G.W. STEWART1;3 1Mathematical and Computational Sciences Division, Information. Finally, we outline the Java Numerical Toolkit1 JNT, which is meant to provide a base of computational;Developing numerical libraries in Java 2 2. NUMERICAL COMPUTING IN JAVA Java is both a computer language

  14. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    applications, J2SE (Java 2 Standard Edition) for the implementation of Java programs that can be executed.K. {page,tillich}@cs.bris.ac.uk Abstract. The Micro Edition of the Java 2 platform (J2ME) provides than the widely-used Bouncy Castle Lightweight Crypto API for J2ME. 1 Introduction The Java programming

  15. A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull

    E-Print Network [OSTI]

    Bull, Mark

    A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull EPCC, The King's Buildings Republic. email: xobdrzal@fi.muni.cz Abstract Increasing interest is being shown in the use of Java for large scale or Grande applications. This new use of Java places specific demands on the Java execution

  16. CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java)

    E-Print Network [OSTI]

    Hardy, Christopher R.

    CSCI 161: Introduction to Programming I Lab 1b: Hello, World (Eclipse, Java) Goals - to learn how to compile and execute a Java program Overview This activity will introduce you to the Java programming language. You will type in the Java program shown, compile it, and execute it. You will submit your project

  17. MSc CSYM021 Java Programming GJH: 2009 MSc Computing (Internet Technology)

    E-Print Network [OSTI]

    Hill, Gary

    MSc CSYM021 ­ Java Programming © GJH: 2009 MSc Computing (Internet Technology) CSYM 021 Java Office (Open 10:00 - 15:00)). Aim: Produce a technical report and accompanying application using Java 2D/3D. Brief Produce a technical report and accompanying application using Java 3D. The application

  18. Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS

    E-Print Network [OSTI]

    Environmental Monitoring of Lake Michigan Using CoastWatch Data and JAVA GIS George A. Leshkevich Observation Data) Statistics (Great Lakes Average Surface Water Temperature) JAVA GIS (JAVA Applet) CDAT activities. New utilities such as JAVA based interactive retrieval of physical parameters such as surface

  19. Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java

    E-Print Network [OSTI]

    Stroetmann, Karl

    Student's Project for Compiler Construction: Compiling a Fragment of SetlX to Java -- Task. This compiler takes as input a program written in the source language SetlX and produces as output Java source code, so the target language is Java. In order to execute the resulting Java programs, these programs

  20. C H A P T E R 1 What is Java 3D and

    E-Print Network [OSTI]

    Hill, Gary

    1 C H A P T E R 1 What is Java 3D and is it for me? 1.1 Strengths 2 1.2 Weaknesses 3 1.3 System Java 3D is an application programming interface (API) developed at Sun Microsystems for rendering interactive 3D graphics using the Java programming language. Java 3D is a client-side Java API. Other examples

  1. A Desktop 3D Printer in Safety-Critical Java

    E-Print Network [OSTI]

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Kongens Lyngby 2012 IMM-MSc-2012-critical use cases implemented according to the specification. This thesis presents a RepRap 3D desktop printer

  2. Object Co-location and Memory Reuse for Java Programs

    E-Print Network [OSTI]

    Lau, Francis C.M.

    : Memory allocator, garbage collector, mutator, Java, object co- location, memory reuse ACM Reference of a runtime system becomes increasingly signif- icant [Sun Microsystems 2003]. Our second goal is to find

  3. Spar: a set of extensions to Java for scientific computation

    E-Print Network [OSTI]

    Spar: a set of extensions to Java for scientific computation C. van Reeuwijk, F. Kuijlman, and H Executiontime(s) Number of processors HPF Spar Spar (no checks) Fortran/MPI 9. SPAR AND JVM 10. RELATED WORK #12

  4. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were...

  5. HEDGEHOG: Automatic Verification of Design Patterns in Java 

    E-Print Network [OSTI]

    Blewitt, Alex

    Design patterns are widely used by designers and developers for building complex systems in object-oriented programming languages such as Java. However, systems evolve over time, increasing the chance that the pattern ...

  6. Analysing, Profiling and Optimising Orthogonal Persistence for Java

    E-Print Network [OSTI]

    Cutts, Q.I.

    Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

  7. Swizzle barrier optimizations for orthogonal persistence in Java

    E-Print Network [OSTI]

    Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

    Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

  8. Termination Analysis of Java Bytecode Elvira Albert1

    E-Print Network [OSTI]

    Arenas, Puri

    program properties is often split into separately proving partial correctness and termination. ObjectTermination Analysis of Java Bytecode Elvira Albert1 , Puri Arenas1 , Michael Codish2 , Samir Abstract. Termination analysis has received considerable attention, traditionally in the context

  9. Java Expert GUI framework for CERN beam instrumentation systems

    E-Print Network [OSTI]

    Bart Pedersen, S; Jackson, S

    2011-01-01

    The CERN Beam Instrumentation Group’s software section has recently performed a study of the tools used to produce Java expert GUI applications. This paper will present the analysis that was made to understand the requirements for generic components and the resulting tools including a collection of Java components that have been made available for a wider audience. The paper will also discuss the prospect of using Maven as the deployment tool with its implications for developers and users.

  10. Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that

    E-Print Network [OSTI]

    Huang, Jianyu

    Disabling JAVA Updates If you open Kronos, and are unable to open any timecards you may have a version of Java that isn't compatible with Kronos. You (or the Administrator of the pc) will need to turn-off the Automatic Updates feature in Java. Follow the prompts below: 1. Close all Internet Explorer windows (to stop

  11. Experto Universitario Java Enterprise Validacin e internacionalizacin 2012-2013 Depto. Ciencia de la Computacin e IA Spring

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia #12;Experto Universitario Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia Java Enterprise Validación e internacionalización © 2012-2013 Depto. Ciencia de la Computación e IA

  12. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java propio de postgrado Experto Universitario en Desarrollo de Aplicaciones Web con Java EE y JavaScript conseguirás una formación en desarrollo de aplicaciones web con Java EE 7 (perfil web) y clientes Java

  13. 6.092 Introduction to Software Engineering in Java, January (IAP) 2009

    E-Print Network [OSTI]

    Jones, Evan

    This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

  14. Enhancing the Expressiveness of the CleanJava Language Melisa Vela and Yoonsik Cheon

    E-Print Network [OSTI]

    Cheon, Yoonsik

    for Java to support Cleanroom-style functional program verification that views a program as a mathematical function, CleanJava. I. INTRODUCTION In Cleanroom-style functional program verification, a pro- gram

  15. A distributed and hierarchical naming scheme for Java RMI with support for persistence and caching 

    E-Print Network [OSTI]

    Agni, Rohan Madhuker

    1998-01-01

    Java Remote Method Invocation (Java RMI) is a icrographics. distributed object technology that is going to play a pivotal role in the distributed object world of tomorrow. With the introduction of the Remote Object Activation API in the beta version...

  16. Java for Scientific Computation: Prospects and Henk J. Sips and Kees van Reeuwijk

    E-Print Network [OSTI]

    core language. Two such solutions are proposed in the Spar/Java project [14] and the Titanium project [16]. For example, a two-dimensional array in Spar/Java is declared and used as follows: int a

  17. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  18. Java in the High Performance Computing Arena: Research, Practice and Experience

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    Java in the High Performance Computing Arena: Research, Practice and Experience Guillermo L interest in Java for High Performance Computing (HPC) is based on the appealing features of this language in HPC. Keywords: Java, High Performance Computing, Performance Evaluation, Multi-core Architectures

  19. Introduction Copyright 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8

    E-Print Network [OSTI]

    Introduction Copyright © 1994, 1995 Sun Microsystems The JavaTM Language: An Overview 1 of 8, The HotJavaTM Browser: An Overview, describes a powerful application that demonstrates the power: An Overview Copyright © 1994, 1995 Sun Microsystems unsuitable, we designed Java as closely to C++ as possible

  20. The Use of Java in High Performance Computing: A Data Mining Example

    E-Print Network [OSTI]

    Walker, David W.

    The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

  1. Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent Recognition

    E-Print Network [OSTI]

    Franek, Frantisek

    Inside the Java Intelligent Tutoring System Prototype: Parsing Student Code Submissions with Intent., Hamilton, Ont., Canada, L8S 4L8 +1 (905) 525-9140 Ext. 23233 franek@mcmaster.ca ABSTRACT The "Java for students in their first programming course in JavaTM at the College and University level. This paper

  2. A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 A Java Library Implementation of the Gold-Food Economic Model in Repast and MASON Christopher K, 2008 Abstract We present a robust, extensible Java library for agent-based economic simulations et al. [8]. We implement the library on top of both the Repast and MASON agent-based Java toolkits

  3. The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer

    E-Print Network [OSTI]

    Gent, Universiteit

    The Java Machine Learning Library Thomas Abeel, Yvan Saeys and Yves Van de Peer Department of Plant.abeel@psb.ugent.be What is Java-ML? Motivation Code & Documentation Applications 1. Machine learning techniques: · 18: java doc and explanation of the algorithm · Generated API: from the source code · Changelog

  4. Sunda-Java trench kinematics, slab window formation and overriding plate deformation since the Cretaceous

    E-Print Network [OSTI]

    Müller, Dietmar

    Sunda-Java trench kinematics, slab window formation and overriding plate deformation since along the 3200 km long Sunda-Java trench, one of the largest subduction systems on Earth. Combining window underlying the Java­South Sumatra region, and we propose that decreased mantle wedge viscosities

  5. A generator of efficient strongly typed abstract syntax trees in Java

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A generator of efficient strongly typed abstract syntax trees in Java Mark van den Brand1 to extract, transform, store and pro- duce information that is key to their functionality. We present a Java a strongly typed data-structure with maximal sub-term sharing in Java. Practical experience shows

  6. Attacks on Java Card 3.0 Combining Fault and Logical Attacks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Attacks on Java Card 3.0 Combining Fault and Logical Attacks Guillaume Barbu1,2 , Hugues Thiebeauld://www.telecom-paristech.fr/ guillaume.barbu@telecom-paristech.fr Abstract. Java Cards have been threatened so far by attacks using ill it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification

  7. Jam -Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Jam - Designing a Java Extension with Mixins DAVIDE ANCONA, GIOVANNI LAGORIO and ELENA ZUCCA University of Genova In this paper we present Jam, an extension of the Java language supporting mixins, that is, parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration

  8. A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM

    E-Print Network [OSTI]

    Franek, Frantisek

    A Prototype for an Intelligent Tutoring System for Students Learning to Program in Java TM Edward R, L8S 4L8 +1 (905) 525­9140 Ext. 23233 franek@mcmaster.ca Abstract The ``Java TM Intelligent Tutoring in their first programming course in Java TM at the College and University level. This paper presents an overview

  9. JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frdric Guidec

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    JAMUS: Java Accommodation of Mobile Untrusted Software Nicolas Le Sommer and Frédéric Guidec (Java Accommodation of Mobile Un- trusted Software) platform we tackle these problems based on a contractual approach of resource manage- ment and access control. JAMUS can accommodate mo- bile Java

  10. (c) 2001, Laszlo Gulyas, Harvard University Installing a development environment for Java

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    (c) 2001, Laszlo Gulyas, Harvard University 1/19 Installing a development environment for Java This document will guide you through the process of installing a comfortable development environment for Java hard disk space (additional 120Mb for Java documentation)2 ·CD-ROM drive or good internet connection

  11. Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave

    E-Print Network [OSTI]

    Van Cleave, Nancy K.

    Using the ACM Java Libraries in CS 1 Andrew Mertz, William Slough, and Nancy Van Cleave aemertz University Charleston, IL 61920 Abstract The Java language is commonly used in CS 1 courses, though its of these challenges, the ACM established the Java Task Force to study the problem. The work of this committee resulted

  12. Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda

    E-Print Network [OSTI]

    Dongarra, Jack

    Java Access to Numerical Libraries Henri Casanova \\Lambda Jack Dongarra \\Lambda y David M. Doolin \\Lambda May 31, 1997 Abstract It is a common and somewhat erroneous belief that Java will always be ``too the question of scientific computing via Java: NetSolve and f2j. The approaches taken by these two projects

  13. A Java-based system support for distributed applications on the Internet

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Java-based system support for distributed applications on the Internet D. Hagimont1 , D. It provides the same abstraction and interface as the RMI service of Java, but it extends the functionality on top of Java. It has been evaluated by comparison with RMI using a benchmark and validated by porting

  14. Java Objects Communication on a High Performance Network Luc Courtrai, Yves Maheo, Frederic Raimbault

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Java Objects Communication on a High Performance Network Luc Courtrai, Yves Mah´eo, Fr. Recent works show the interest in Java for cluster programming. One of the main issues is to handle an alternative to the standard serialization process through the proposal of a Java object communication library

  15. IBM COBOL for AIX Integrating IBM COBOL for AIX with Java

    E-Print Network [OSTI]

    IBM COBOL for AIX Integrating IBM COBOL for AIX with Java By: Gaby Baghdadi Level: Introductory April 2010 #12;Integrating IBM COBOL for AIX with Java, Page 2 of 32 Copyright © 2010, IBM® Corporation........................................................................ 8 COBOL class used with a Java client

  16. A Freeware Java Tool for Spatial Point Analysis of Neuronal Barry G. Condron

    E-Print Network [OSTI]

    Condron, Barry

    NEWS ITEM A Freeware Java Tool for Spatial Point Analysis of Neuronal Structures Barry G. Condron, a freeware tool, called PAJ, has been developed. This Java-based tool takes 3D Cartesian coordinates as input in Java that is based on previously described statistical analysis (Diggle 2003). In PAJ, data is copied

  17. JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications

    E-Print Network [OSTI]

    Livshits, Ben

    widely used to enable Web 2.0, the performance of JavaScript is now a concern of ven- dors of every majorJSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications Paruj {livshits,zorn}@microsoft.com Abstract JavaScript is widely used in web-based applications

  18. An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications

    E-Print Network [OSTI]

    Wagner, Flávio Rech

    An Infrastructure for Hardware-Software Co-design of Embedded Real-Time Java Applications Elias of Kansas, USA dandrews@ittc.ku.edu Abstract The partitioning of applications into hardware and software in hardware in the context of the Real Time Specification for Java (RTSJ) standard. There is a Java class

  19. An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing Projects

    E-Print Network [OSTI]

    Gray, Jeffrey G.

    An Automated System for Converting App Inventor Apps to Java Interface For Creating and Managing of Computer Science Graphical Environment For Creating Layouts MIT App Inventor An Automated System for Converting App Inventor Apps to JavaAn Automated System for Converting App Inventor Apps to JavaAn Automated

  20. r-Java 2.0: the nuclear physics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Aims:] We present r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations as well as a suite of other analysis tools. [Methods:] Equipped with a straightforward graphical user interface, r-Java 2.0 is capable of; simulating nuclear statistical equilibrium (NSE), calculating r-process abundances for a wide range of input parameters and astrophysical environments, computing the mass fragmentation from neutron-induced fission as well as the study of individual nucleosynthesis processes. [Results:] In this paper we discuss enhancements made to this version of r-Java, paramount of which is the ability to solve the full reaction network. The sophisticated fission methodology incorporated into r-Java 2.0 which includes three fission channels (beta-delayed, neutron-induced and spontaneous fission) as well as computation of the mass fragmentation is compared to the upper limit on mass fission approximation. The effects of including beta-delayed neutron emission on r-process yield is studied. The role of coulomb interactions in NSE abundances is shown to be significant, supporting previous findings. A comparative analysis was undertaken during the development of r-Java 2.0 whereby we reproduced the results found in literature from three other r-process codes. This code is capable of simulating the physical environment of; the high-entropy wind around a proto-neutron star, the ejecta from a neutron star merger or the relativistic ejecta from a quark nova. As well the users of r-Java 2.0 are given the freedom to define a custom environment. This software provides an even platform for comparison of different proposed r-process sites and is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  1. Sustainability Double Degree Double Degree Info

    E-Print Network [OSTI]

    Grünwald, Niklaus J.

    Sustainability Double Degree Double Degree Info: · 36 credits in B for graduation. Sustainability Core: Take each course below for a total of 17 -20 credits. Term/Grade Course _____ ____ *NR 350 (4) Sustainable

  2. Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51 for PC and Macrequires additional configuration before it will allow InfoView to

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Java Plug-in Configuration for Version 7, Update 51 or Later Java Plug-in Version7, Update 51. Open the Java Control Panel. · PC: o Click on Start Menu o Click on "Control Panel" o Click on the "Java" icon · Mac: o Click on Apple icon on upper left screen o Go to System Preferences o Click

  3. Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html

    E-Print Network [OSTI]

    Nourbakhsh, Illah

    Java interface programming: Everything off the best website I've ever found: http://www-lia.deis.unibo.it/Misc/SW/Java/tutorial/html/native1.1/implementing/index.html Table of Contents Java Native Interface Programming The JDK1.1 supports the Java Native Interface (JNI). On one hand, the JNI defines a standard naming and calling convention so

  4. Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat

    E-Print Network [OSTI]

    Java Virtual-Machine Support for Portable Worst-Case Execution-Time Analysis I. Bate, G. Bernat@vmars.tuwien.ac.at Abstract The current trend towards the usage of Java in real-time, supported by two specifications (Real-Time Java and Real- Time Core extensions for the Java platform) requires ade- quate schedulability analysis

  5. PERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS

    E-Print Network [OSTI]

    Murphy, John

    relevant projects. OrWell [3] is a monitoring environment for CORBA distributed applications, which uses attached to the existing objects. In addition, it is not clear whether the monitoring environmentPERFORMANCE MONITORING OF JAVA COMPONENT-ORIENTED DISTRIBUTED APPLICATIONS Adrian Mos, John Murphy

  6. Towards a Smart Compilation Manager for Java (Extended Abstract)

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    Towards a Smart Compilation Manager for Java (Extended Abstract) Giovanni Lagorio DISI - Universit differently from the program obtained recompiling all the sources from scratch? We say that a compilation the sources for which the recompilation would be unde- fined: indeed, when the entire compilation fails, so

  7. Recent Advances in Java Technology Theory, Application, Implementation

    E-Print Network [OSTI]

    Power, James

    Recent Advances in Java Technology Theory, Application, Implementation James F. Power John T: Theory, Application, Implementation James F. Power and John T. Waldron (Eds.) First Edition, 2002 trademarks of Sun Microsystems, Inc. in the U.S. and other countries. This work is independent of Sun

  8. Static Information Flow Analysis for Java Department of Computer Science

    E-Print Network [OSTI]

    Bystroff, Chris

    Static Information Flow Analysis for Java Yin Liu Department of Computer Science Rensselaer their usage in software practice. This paper proposes run-time information flow models, and new static in software practice. We propose a new static information flow analysis towards this goal. This analysis

  9. Coalgebras and Monads in the Semantics of Java

    E-Print Network [OSTI]

    Poll, Erik

    of sequential Java from a combined coal- gebraic/monadic perspective. It turns out that these separate Jacobs and Erik Poll). Preprint submitted to Elsevier Science 5th February 2002 #12;type, describing with parameters. It has become standard in semantics to describe the result type on the right hand side

  10. HEP data analysis using jHepWork and Java

    E-Print Network [OSTI]

    S. Chekanov

    2009-02-09

    A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

  11. Producer Individual License Application Java Desktop App Entered demographic data

    E-Print Network [OSTI]

    Demurjian, Steven A.

    TESTING Producer ­ Individual License Application ­ Java Desktop App 7/21/2004 Entered demographic... On `Next', license attachment screen, added a cert letter: Still need to accommodate multiple authorities;On "Submit/Next" ­ Pulled up license with Inquiry tool. Some fields need widening. Didn't pick up

  12. A Java-based Science Portal for Neutron Scattering Experiments

    E-Print Network [OSTI]

    Vazhkudai, Sudharshan

    A Java-based Science Portal for Neutron Scattering Experiments Sudharshan S. Vazhkudai James A scattering facility recently commissioned by the US Department of Energy (DOE). The neutron beam produced (SNS) [14] is a large-scale leading- edge neutron scattering facility that hopes to fundamen- tally

  13. CSC 2014 Java Bootcamp Dr. Mary-Angela Papalaskari

    E-Print Network [OSTI]

    Papalaskari, Mary-Angela

    in range [0,1,2,3] float b = gen.nextFloat(); //float in range [0,1),eg: 0.4589 int c = gen.nextInt(4) + 1 University imported automatically, includes String and Math classes #12;The Math Class · The Math class: · Use Random method nextInt()to generate a random number: Java Bootcamp Dr. Papalaskari Villanova

  14. Functional Java Bytecode Christopher LEAGUE Valery TRIFONOV Zhong SHAO

    E-Print Network [OSTI]

    flow explicit, verification simple, and that is well-suited for translation into lower as one component in a sophisticated type-preserving compiler for Java class files. Though our that the just-in-time compiler, a considerably large and complex piece of software, does not introduce security

  15. ADistributed Computer Algebra System Based on Maple and Java 1

    E-Print Network [OSTI]

    ADistributed Computer Algebra System Based on Maple and Java 1 Wolfgang Schreiner Research Distributed Maple is a system for writing parallel programs in the computer algebra system Maple. It allows scheduler from Maple and implements a parallel programming model on top. The system is portable to most

  16. Building Web Applications with Servlets and JavaServer Pages

    E-Print Network [OSTI]

    Janzen, David

    ://www.rational.com/corpinfo/college_relations/seed/ #12;Web Development Overview · static html ­ text file containing html tags created manually ­ may a web browser ­ Java applets #12;Static HTML web browser web server _____.htmlrequest URL response HTML #12;Dynamic HTML web browser web server _____.html request URL response HTML _____.jsp _____.class

  17. Thinking in Java, 2nd Edition, Release 11

    E-Print Network [OSTI]

    Sherrill, David

    ever written on Java. Ravindra Pai, Oracle Corporation, SUNOS product line This is the best book, software, white papers, interviews, product reviews, Web links, code samples, a forum, and regular articles-too-distant future. Randall R. Hawley, Automation Technician, Eli Lilly & Co. The best computer book writing I have

  18. r-Java 2.0: the astrophysics

    E-Print Network [OSTI]

    M. Kostka; N. Koning; Z. Shand; R. Ouyed; P. Jaikumar

    2014-02-16

    [Context:] This article is the second in a two part series introducing r-Java 2.0, a nucleosynthesis code for open use that performs r-process calculations and provides a suite of other analysis tools. [Aims:] The first paper discussed the nuclear physics inherent to r-Java 2.0 and in this article the astrophysics incorporated into the software will be detailed. [Methods:] R-Java 2.0 allows the user to specify the density and temperature evolution for an r-process simulation. Defining how the physical parameters (temperature and density) evolve can effectively simulate the astrophysical conditions for the r-process. Within r-Java 2.0 the user has the option to select astrophysical environments which have unique sets of input parameters available for the user to adjust. In this work we study three proposed r-process sites; neutrino-driven winds around a proto-neutron star, ejecta from a neutron star merger and ejecta from a quark nova. The underlying physics that define the temperature and density evolution for each site is described in this work. [Results:] In this paper a survey of the available parameters for each astrophysical site is undertaken and the effect on final r-process abundance is compared. The resulting abundances for each site are also compared to solar observations both independently and in concert. R-Java 2.0 is available for download from the website of the Quark-Nova Project: http://quarknova.ucalgary.ca/

  19. EOUG2000: Web publishing using PL/SQL and JAVA

    E-Print Network [OSTI]

    Grancher, Eric

    2000-01-01

    At CERN, as increasingly elsewhere, server based applications using the PL/SQL cartridge and Java are preferred as they make minimum demands on the client and ease maintenance. The PL/SQL cartridge, the original method offered by Oracle, has proved reliable and effective. We have used it to build web applications for more than four years. Newer applications are using Servlets together with the application server. This paper presents the different techniques that we designed and the pitfalls that we encountered in diverse projects such as a technology transfer database, a product management tool and a system to keep track of physics events. Important considerations are security, ease of maintenance, transaction handling and modularity. Most of the experience has been gained using the PL/SQL cartridge and this will be contrasted and compared with the newer Java techniques…

  20. Von MiniJava zur MiniJVM

    E-Print Network [OSTI]

    Seidl, Helmut

    Maschinen­Instruktionen können MiniJava­Programme beliebig komplex sein :­( Idee: #15; Gib formale Regeln an #12; Architektur der JVM: Code 1 2 3 0 54 SP 54 Store PC 17 0 1 2 3 17 12 #12; Code = enthält JVM entsprechenden Operationen auf Store aus. Konvention: 14 #12; 54 3 2 1 0 54 1 2 3 0 Store Store = Stack SP 54 15

  1. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode |9: IBM Java

  2. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle Solaris Java

  3. Double Muscling in Cattle. 

    E-Print Network [OSTI]

    Kieffer, Nat M.; Cartwright, T.C.

    1980-01-01

    ,;J Cover photo: This lO-month-old bull is the product of a two-breed cross. He shows classic symptoms of double muscling and illustrates that the double-muscled gene is the same in different breeds of cattlr Double Muscling ......... In Cattle... Nat M. Kieffer Professor T. C. Cartwright Professor The Texas Agricultural Experiment Station (Department of Animal Science) 2 Contents 2 Summary 3 Introduction 3 Historical Background 4 Physical Characteristics of Double-Muscled Cattle 4...

  4. Chromosome doubling method

    DOE Patents [OSTI]

    Kato, Akio

    2006-11-14

    The invention provides methods for chromosome doubling in plants. The technique overcomes the low yields of doubled progeny associated with the use of prior techniques for doubling chromosomes in plants such as grasses. The technique can be used in large scale applications and has been demonstrated to be highly effective in maize. Following treatment in accordance with the invention, plants remain amenable to self fertilization, thereby allowing the efficient isolation of doubled progeny plants.

  5. Introduction JAVA Georges Linares IUP GMI Universit d'Avignon et des Pays de Vaucluse

    E-Print Network [OSTI]

    Linarès, Georges

    Introduction à JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse Modélisation Objet #12;Introduction à JAVA Historique ­ Les langages objets Simula 67 (trop tôt) Smalltalk utilisé ... et JAVA Georges Linares ­ IUP GMI ­ Université d'Avignon et des Pays de Vaucluse #12

  6. Java and JVM in a Nutshell Robert Stark, Joachim Schmid, Egon Borger

    E-Print Network [OSTI]

    Börger, Egon

    in a Nutshell execJavaT = execJavaStmT context(pos) = if pos = firstPos restbody/pos Bstm Exp then restbody/pos else restbody/up(pos) yieldUp(result) = restbody := restbody[result/up(pos)] pos := up(pos) yield(result) = restbody := restbody[result/pos] execJavaExpI = case context(pos) of lit yield(JLS(lit)) loc yield

  7. CJC: An Extensible Checker for the CleanJava Annotation Language

    E-Print Network [OSTI]

    Cheon, Yoonsik

    language for the Java programming language to support a Cleanroom-style functional program verification from the Cleanroom Software Engineering [1] that emphasizes defect prevention rather than defect

  8. Java on the MScIT Course at the University of Glasgow

    E-Print Network [OSTI]

    Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

    Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

  9. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java University of Alicante Experto Java Expert Web application with JavaEE and JavaScript development NEWS CONTENTS FACULTY CALENDAR REGISTRATION applications with Java EE and JavaScript. If you are interested in staying informed about this title you can

  10. Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly

    E-Print Network [OSTI]

    Hardy, Christopher R.

    1 Introduction to Java Programming for Networking (Lab 2b) Dr. Nazli MollahReferences: "An Intro to Network Programming with Java", Jan Graba; "Network Programming & Distr. Computing", Reilly & Reilly Lab 2b Objectives: Familiarizing yourself with the: java.net package · which contains the Inet

  11. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  12. A Desktop 3D Printer in Safety-Critical Java Trur Biskopst Strm

    E-Print Network [OSTI]

    Schoeberl, Martin

    A Desktop 3D Printer in Safety-Critical Java Tórur Biskopstø Strøm Department of Informatics according to the specification. In this paper we present a 3D printer and its safety-critical Java level 1 evaluate the specification by implementing a RepRap 3D desktop printer as a use case. A RepRap is a desktop

  13. T-641: Oracle Java SE Critical Patch Update Advisory- June 2011

    Broader source: Energy.gov [DOE]

    This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). Where the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Partial" instead of "Complete", and the corresponding CVSS Base score is 7.5 instead of 10 respectively. For issues in Deployment, fixes are only made available for JDK and JRE 6. Users should use the Java Web Start in JRE 6 and the new Java Plug-in introduced in 6 Update 10. CVE-2011-0862, CVE-2011-0873, CVE-2011-0815, CVE-2011-0817, CVE-2011-0863, CVE-2011-0864, CVE-2011-0802, CVE-2011-0814, CVE-2011-0871, CVE-2011-0786, CVE-2011-0788, CVE-2011-0866, CVE-2011-0868, CVE-2011-0872, CVE-2011-0867, CVE-2011-0869, and CVE-2011-0865

  14. An on-the-y Reference Counting Garbage Collector for Java Yossi Levanoni Erez Petrank y

    E-Print Network [OSTI]

    Petrank, Erez

    An on-the- y Reference Counting Garbage Collector for Java Yossi Levanoni #3; Erez Petrank y compete with any tracing algorithm. We have implemented our algorithm on SUN's Java Virtual Machine 1 for realistic benchmarks. Thus, a clever design of eÆcient memory management and garbage collector

  15. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    Daume III, Hal

    a system to dynamically add language labels for whole documents and text fragments. We have experi­ mented with several client/server configu­ rations, and present the results of tradeoffs made between labelling to the base Java package 1 making the package usable for multilingual 1 A few pointers to online Java

  16. C Compiler Targeting the Java Virtual Machine Senior Honors Thesis (Advisor: Javed A. Aslam)

    E-Print Network [OSTI]

    C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A to compile once and execute across many different platforms. With the emergence of the Internet by Sun Microsystems to address this "Write Once, Run Anywhere" problem. What sets a compiled Java program

  17. True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ?

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    True Separate Compilation of Java Classes Davide Ancona, Giovanni Lagorio, and Elena Zucca ? DISI,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a type system modeling true separate compilation for a small but signi#12;cant Java's terminology) and compiled providing a minimal set of type requirements on missing classes. These requirements

  18. Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1

    E-Print Network [OSTI]

    Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

  19. Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev

    E-Print Network [OSTI]

    Sawin, Jason

    Improved Static Resolution of Dynamic Class Loading in Java Jason Sawin Atanas Rountev Ohio State. Unfor- tunately, the vast majority of static analyses for Java handle this feature either unsoundly or overly conser- vatively. We present a set of techniques for static reso- lution of dynamic

  20. GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri

    E-Print Network [OSTI]

    Chu, Hao-hua

    GUI Migration across Heterogeneous Java Profiles Candy Wong, Hao-hua Chu, Masaji Katagiri Do-platform graphical user interface (GUI) development tools do not support migrate-able GUIs as they do not consider that can be migrated across heterogeneous Java profiles. In this paper, we will focus on two major problems

  1. Preliminary Assessment of the Java Intelligent Tutoring System Edward R. Sykes

    E-Print Network [OSTI]

    Franek, Frantisek

    Computing and Engineering Sciences, Sheridan College, 1430 Trafalgar Road, Oakville, Ont., Canada, L6H 2L1 of Computing and Software, Faculty of Science, McMaster University, 1280 Main Street W., Hamilton, Ont., Canada the growing trend of the Java programming language and to promote web-based personalized education, the Java

  2. Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl

    E-Print Network [OSTI]

    Ábrahám, Erika

    Termination Graphs for Java Bytecode M. Brockschmidt, C. Otto, C. von Essen, and J. Giesl LuFG Informatik 2, RWTH Aachen University, Germany Abstract. To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all pos- sible runs of the program

  3. Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale

    E-Print Network [OSTI]

    Bader, David A.

    Kronos: A Java-Based Software System for the Processing and Retrieval of Large Scale AVHRR Data and preprocessing, indexing and storage, search and processing engine, and a Java interface. We illustrate the power of Maryland, College Park, MD 20742 March 4, 1999 1UMIACS and Department of Electrical Engineering 2Department

  4. Grain - A Java Analysis Framework for Total Data Readout

    E-Print Network [OSTI]

    P. Rahkila

    2007-11-21

    Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

  5. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 4: Threads

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 4: Threads #12;4.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with JavaOperating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Single and Multithreaded Processes #12

  6. Experto Universitario Java Enterprise Componentes de presentacin 2012-2013 Depto. Ciencia de la Computacin e IA Sesin 1

    E-Print Network [OSTI]

    Escolano, Francisco

    Experto Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Universitario Java Enterprise Componentes de presentación © 2012-2013 Depto. Ciencia de la Computación e IA Sesión 1 Experto Universitario Java Enterprise · Framewoks RIA basados en el servidor · Características

  7. Programao Grfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO

    E-Print Network [OSTI]

    Barbosa, Alberto

    Programação Gráfica 3D com OpenGL, Open Inventor e Java 3D ALESSANDRO L. BICHO ½ LUIZ GONZAGA DA estudado a Open Inventor, uma ØÓÓÐ Ø orientada a objetos construída sobre a OpenGL, contemplando funções a Java 3D, que é fortemente inspirada na Open Inventor. Ela é a biblioteca padrão da linguagem Java para

  8. The number of cells in the human body is literally astronomical, about three orders of magnitude more than the number of stars in the Milky Way. Yet,

    E-Print Network [OSTI]

    Boal, David

    1 The number of cells in the human body is literally astronomical, about three orders of magnitude more than the number of stars in the Milky Way. Yet, for their immense number, the variety of cells is much smaller: only about 200 different cell types are represented in the collection of about 1014 cells

  9. The Java-Sumatra Aerial Mega-Tramway

    E-Print Network [OSTI]

    Alexander Bolonkin; Richard Cathcart

    2007-01-09

    A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

  10. Abbreviation List/Glossary Acid flask A three liter round bottom flask used to hold the approximately 0.6%

    E-Print Network [OSTI]

    and second bottles of a bottle pair. Used to determine the quality of analysis (both individual pair quality-titration drift often seen with our titration systems. Constant-volume mercury manometer (CMM) For the purpose double-column mercury manometer. One column is kept under vacuum, and the other contains the sample gas

  11. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Nueva - 1 5 Experto Java Universidad de Alicante El Centro de Formación Continua de la Universidad de Alicante ha aprobado el proyecto de título propio de Experto en Desarrollo de Aplicaciones Web con Java EE

  12. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java tutorización. Todos ellos tienen una gran experiencia docente y profesional en el campo de Java Enterprise Aplicaciones para Dispositivos Móviles. Profesor del Experto Java desde 2010. http://www.frangarcia.net Aitor

  13. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universidad de Alicante Experto Java Experto Desarrollo Aplicaciones Web con JavaEE y JavaScript NOTICIAS CONTENIDOS PROFESORADO CALENDARIO MATRÍCULA BECAS NOTICIAS Y EVENTOS 1 8 / 0 6 / 2 0 1 4 Matriculación en el Experto Java Ya está disponible

  14. Neutrinoless double beta decay

    E-Print Network [OSTI]

    K. Zuber

    2012-01-23

    The physics potential of neutrinoless double beta decay is discussed. Furthermore, experimental considerations are presented as well as the current status of experiments. Finally an outlook towards the future, work on nuclear matrix elements and alternative processes is given.

  15. Double Beta Decay

    E-Print Network [OSTI]

    Steven R. Elliott; Petr Vogel

    2002-02-27

    The motivation, present status, and future plans of the search for the neutrinoless double beta decay are reviewed. It is argued that, motivated by the recent observations of neutrino oscillations, there is a reasonable hope that neutrinoless double beta decay corresponding to the neutrino mass scale suggested by oscillations, of about 50 meV, actually exists. The challenges to achieve the sensitivity corresponding to this mass scale, and plans to overcome them, are described.

  16. Interactive visualization for geoscience education: Java-based instructional tools for introductory geology 

    E-Print Network [OSTI]

    Nevorotina, Anna

    2001-01-01

    Two web-based interactive visualization tools were developed to support problem-based learning in tertiary introductory geoscience classes. The presented tools were designed using the Java[TM] programming language, following guidelines for good...

  17. A distributed hard real-time Java system for high mobility components 

    E-Print Network [OSTI]

    Rho, Sangig

    2005-02-17

    applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide...

  18. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  19. 6.092 Introduction to Software Engineering in Java, January (IAP) 2008

    E-Print Network [OSTI]

    Akeju, Usman O.

    This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

  20. Towards OpenMP for Java J. M. Bull and M. D. Westhead

    E-Print Network [OSTI]

    Bull, Mark

    ] and SPAR Java [14]. However, these are designed prin­ cipally for distributed systems, and unlike our proposal, involve genuine language extensions. The current im­ plementations of Titanium and SPAR are via

  1. A matterless double slit

    E-Print Network [OSTI]

    B. King; A. Di Piazza; C. H. Keitel

    2013-01-29

    Double-slits provide incoming photons with a choice. Those that survive the passage have chosen from two possible paths which interfere to distribute them in a wave-like manner. Such wave-particle duality continues to be challenged and investigated in a broad range of disciplines with electrons, neutrons, helium atoms, C60 fullerenes, Bose-Einstein condensates and biological molecules. All variants have hitherto involved material constituents. We present a matterless double-slit scenario in which photons generated from virtual electron-positron pair annihilation in head-on collisions of a probe laser field with two ultra-intense laser beams form a double-slit interference pattern. Such electromagnetic fields are predicted to induce material-like behaviour in the vacuum, supporting elastic scattering between photons. Our double-slit scenario presents on the one hand a realisable method to observe photon-photon scattering, and demonstrates on the other, the possibility of both controlling light with light and non-locally investigating features of the quantum vacuum's structure.

  2. Double resonator cantilever accelerometer

    DOE Patents [OSTI]

    Koehler, D.R.

    1982-09-23

    A digital quartz accelerometer includes a pair of spaced double-ended tuning forks fastened at one end to a base and at the other end through a spacer mass. Transverse movement of the resonator members stresses one and compresses the other, providing a differential frequency output which is indicative of acceleration.

  3. Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    Heinrich Päs; Werner Rodejohann

    2015-07-01

    We review the potential to probe new physics with neutrinoless double beta decay $(A,Z) \\to (A,Z+2) + 2 e^-$. Both the standard long-range light neutrino mechanism as well as short-range mechanisms mediated by heavy particles are discussed. We also stress aspects of the connection to lepton number violation at colliders and the implications for baryogenesis.

  4. Neutrinoless double beta decay

    E-Print Network [OSTI]

    Petr Vogel

    2006-11-17

    The status of the search for neutrinoless double beta decay is reviewed. The effort to reach the sensitivity needed to cover the effective Majorana neutrino mass corresponding to the degenerate and inverted mass hierarchy is described. Various issues concerning the theory (and phenomenology) of the relation between the $0\

  5. Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    Päs, Heinrich

    2015-01-01

    We review the potential to probe new physics with neutrinoless double beta decay $(A,Z) \\to (A,Z+2) + 2 e^-$. Both the standard long-range light neutrino mechanism as well as short-range mechanisms mediated by heavy particles are discussed. We also stress aspects of the connection to lepton number violation at colliders and the implications for baryogenesis.

  6. WHY SEARCH FOR DOUBLE BETA DECAY?

    E-Print Network [OSTI]

    Kayser, B.

    2010-01-01

    the search for neutrinoless double beta decay may prove verySearching for neutrinoless double beta decay is the onlysensitivity of neutrinoless double beta decay. The potential

  7. 11 Das Package java.io 11.1 Streams 11-3(188) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io

    E-Print Network [OSTI]

    Arndt, Holger

    Stream wie System.in liefert einen Strom aus Bytes. · Ein InputStreamReader wandelt einen Bytestrom in einen.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); JavaIO/Files/FileBsp2.java 12 String file

  8. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 1: Introduction

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 1: Introduction #12;1.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 1: Introduction What Operating Systems Do Computer-System

  9. The Java programming language is acheiving greater accep-tance in high-end embedded systems such as cellphones and

    E-Print Network [OSTI]

    Bhattacharyya, Shuvra S.

    been explored recently. TurboJ [4] speeds up execution by compiling bytecode to native code aheadAbstract The Java programming language is acheiving greater accep- tance in high-end embedded and bytecode. Bytecode is object code that is processed by a program, referred to as the Java Virtual Machine

  10. Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia

    E-Print Network [OSTI]

    Gilbes, Fernando

    Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

  11. Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Application

    E-Print Network [OSTI]

    Levin, Judith G.

    Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Entrez Utilities Web Service using Axis2 for Java. Preinstalled Software You should have Apache Axis2.sh shell script file on Linux) in the bin directory of Axis2 installation. You will use it to generate Web

  12. Double Beta Decay Experiments

    SciTech Connect (OSTI)

    Nanal, Vandana [Dept. of Nuclear and Atomic Physics, Tata Institute of Fundamental Research, Mumbai 400 005 (India)

    2011-11-23

    At present, neutrinoless double beta decay is perhaps the only experiment that can tell us whether the neutrino is a Dirac or a Majorana particle. Given the significance of the 0{nu}{beta}{beta}, there is a widespread interest for these rare event studies employing a variety of novel techniques. This paper describes the current status of DBD experiments. The Indian effort for an underground NDBD experiment at the upcoming INO laboratory is also presented.

  13. for doubling solar panel

    E-Print Network [OSTI]

    An outline for doubling solar panel efficiency C o l o ra do S c ho o l of M i ne s Ma g a z i ne Take a look at a solar panel on a sunny Colorado day and, if you're like most people, you won't see physics professor and solar energy researcher, who admits to checking out his panels and their energy

  14. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 19: Real-Time Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 19: Real-Time Systems #12;19.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006Operating System Concepts with Java ­ 7th Edition, Nov 15

  15. E S P A O L V A L E N C I E N G L I S H Experto Java

    E-Print Network [OSTI]

    Escolano, Francisco

    E S P A Ñ O L V A L E N C I À E N G L I S H Experto Java Universitat d'Alacant Experto Java Becas Java Universitat d'Alacant Carretera de Sant Vicent del Raspeig s/n 03690 Sant Vicent del Raspeig

  16. Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V. Artigas M. Snir R. D. Lawrence

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Java Programming for High Performance Numerical Computing J. E. Moreira S. P. Midkiff M. Gupta P. V for enhancing Web content, Java has taken off as a serious general­ purpose programming language. Industry and academia alike have expressed great interest in using Java as a programming language for scientific

  17. SpoonEMF, une brique logicielle pour l'utilisation de l'IDM dans le cadre de la ringnierie de programmes Java5

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    programmes Java5 Olivier Barais Projet Triskell/IRISA campus de Beaulieu. F - 35 042 Rennes Cedex barais'IDM dans le cadre de la réingénierie d'applications écrites en Java. L'accent dans cette courte réutilisation d'outils comme l'analyseur syntaxique de code Java5 (parser) ou le générateur de code (pretty

  18. Hanford’s Supplemental Treatment Project: Full-Scale Integrated Testing of In-Container-Vitrification and a 10,000-Liter Dryer

    SciTech Connect (OSTI)

    Witwer, Keith S.; Dysland, Eric J.; Garfield, J. S.; Beck, T. H.; Matyas, Josef; Bagaasen, Larry M.; Cooley, Scott K.; Pierce, Eric M.; Kim, Dong-Sang; Schweiger, Michael J.

    2008-02-22

    The GeoMelt® In-Container Vitrification™ (ICV™) process was selected by the U.S. Department of Energy (DOE) in 2004 for further evaluation as the supplemental treatment technology for Hanford’s low-activity waste (LAW). Also referred to as “bulk vitrification,” this process combines glass forming minerals, LAW, and chemical amendments; dries the mixture; and then vitrifies the material in a refractory-lined steel container. AMEC Nuclear Ltd. (AMEC) is adapting its GeoMelt ICV™ technology for this application with technical and analytical support from Pacific Northwest National Laboratory (PNNL). The DVBS project is funded by the DOE Office of River Protection and administered by CH2M HILL Hanford Group, Inc. The Demonstration Bulk Vitrification Project (DBVS) was initiated to engineer, construct, and operate a full-scale bulk vitrification pilot-plant to treat up to 750,000 liters of LAW from Waste Tank 241-S-109 at the DOE Hanford Site. Since the beginning of the DBVS project in 2004, testing has used laboratory, crucible-scale, and engineering-scale equipment to help establish process limitations of selected glass formulations and identify operational issues. Full-scale testing has provided critical design verification of the ICV™ process before operating the Hanford pilot-plant. In 2007, the project’s fifth full-scale test, called FS-38D, (also known as the Integrated Dryer Melter Test, or IDMT,) was performed. This test had three primary objectives: 1) Demonstrate the simultaneous and integrated operation of the ICV™ melter with a 10,000-liter dryer, 2) Demonstrate the effectiveness of a new feed reformulation and change in process methodology towards reducing the production and migration of molten ionic salts (MIS), and, 3) Demonstrate that an acceptable glass product is produced under these conditions. Testing was performed from August 8 to 17, 2007. Process and analytical results demonstrated that the primary test objectives, along with a dozen supporting objectives, were successfully met. Glass performance exceeded all disposal performance criteria. A previous issue with MIS containment was successfully resolved in FS-38D, and the ICV™ melter was integrated with a full-scale, 10,000-liter dryer. This paper describes the rationale for performing the test, the purpose and outcome of scale-up tests preceding it, and the performance and outcome of FS-38D.

  19. Hanford's Supplemental Treatment Project: Full-Scale Integrated Testing of In-Container-Vitrification and a 10,000-Liter Dryer

    SciTech Connect (OSTI)

    Witwer, K.S.; Dysland, E.J.; Garfield, J.S.; Beck, T.H.; Matyas, J.; Bagaasen, L.M.; Cooley, S.K.; Pierce, E.; Kim, D.S.; Schweiger, M.J.

    2008-07-01

    The GeoMelt{sup R} In-Container Vitrification{sup TM} (ICV{sup TM}) process was selected by the U.S. Department of Energy (DOE) in 2004 for further evaluation as the supplemental treatment technology for Hanford's low-activity waste (LAW). Also referred to as 'bulk vitrification', this process combines glass forming minerals, LAW, and chemical amendments; dries the mixture; and then vitrifies the material in a refractory-lined steel container. AMEC Nuclear Ltd. (AMEC) is adapting its GeoMelt ICV{sup TM} technology for this application with technical and analytical support from Pacific Northwest National Laboratory (PNNL). The DVBS project is funded by the DOE Office of River Protection and administered by CH2M HILL Hanford Group, Inc. The Demonstration Bulk Vitrification Project (DBVS) was initiated to engineer, construct, and operate a full-scale bulk vitrification pilot-plant to treat up to 750,000 liters of LAW from Waste Tank 241-S-109 at the DOE Hanford Site. Since the beginning of the DBVS project in 2004, testing has used laboratory, crucible-scale, and engineering-scale equipment to help establish process limitations of selected glass formulations and identify operational issues. Full-scale testing has provided critical design verification of the ICV{sup TM} process before operating the Hanford pilot-plant. In 2007, the project's fifth full-scale test, called FS-38D, (also known as the Integrated Dryer Melter Test, or IDMT,) was performed. This test had three primary objectives: 1) Demonstrate the simultaneous and integrated operation of the ICV{sup TM} melter with a 10,000- liter dryer, 2) Demonstrate the effectiveness of a new feed reformulation and change in process methodology towards reducing the production and migration of molten ionic salts (MIS), and, 3) Demonstrate that an acceptable glass product is produced under these conditions. Testing was performed from August 8 to 17, 2007. Process and analytical results demonstrated that the primary test objectives, along with a dozen supporting objectives, were successfully met. Glass performance exceeded all disposal performance criteria. A previous issue with MIS containment was successfully resolved in FS-38D, and the ICV{sup TM} melter was integrated with a full-scale, 10,000-liter dryer. This paper describes the rationale for performing the test, the purpose and outcome of scale-up tests preceding it, and the performance and outcome of FS-38D. (authors)

  20. Jens Muller Wilhelm G. Spruth Anwendungs-und Transaktionsisolation unter Java

    E-Print Network [OSTI]

    Spruth, Wilhelm G.

    an overview of the solutions that are presently available or under discus- sion. J. M¨uller (k) · W.G. Spruth¨ubingen, Sand 13, 72076 T¨ubingen, Deutschland E-Mail: mail@jensmueller.com W.G. Spruth Institut f¨ur InformatikJens M¨uller · Wilhelm G. Spruth Anwendungs- und Transaktionsisolation unter Java Zusammenfassung

  1. JITProf: Pinpointing JIT-unfriendly JavaScript Code Michael Pradel

    E-Print Network [OSTI]

    Sen, Koushik

    that cause perfor- mance problems in the Firefox and Chrome browsers, and we apply the approach to popular a modern web browser. Another key reason behind the popularity of JavaScript among programmers is that it is a flexible, dynamically typed language. For example, programmers can add and delete object properties

  2. Optimization Coaching for JavaScript Vincent St-Amour1

    E-Print Network [OSTI]

    Tobin-Hochstadt, Sam

    Optimization Coaching for JavaScript Vincent St-Amour1 and Shu-yu Guo2 1 PLT @ NortheasternScript depends heavily on highly optimizing just-in-time compilers. Such compilers, like all compilers, can silently fall back to generating conservative, low-performance code during optimization. As a result, pro

  3. A Tested Semantics for Getters, Setters, and Eval in JavaScript

    E-Print Network [OSTI]

    Krishnamurthi, Shriram

    present S5, a semantics for the strict mode of the ECMAScript 5.1 (JavaScript) programming language. S5 shrinks the large source language into a manageable core through an implemented trans- formation programming languages, so their study is likely to have broad applicability. Categories and Subject

  4. Application layer thread migration in Java Project report for Advanced Topics in PLT

    E-Print Network [OSTI]

    migration that have been already explored. The primary reason that we want to explore application levelApplication layer thread migration in Java Project report for Advanced Topics in PLT Nikhil Sarda from various sources. One of the primary challenges of computer science today is the development

  5. Run-time Modification of the Class Hierarchy in a Live Java Development Environment

    E-Print Network [OSTI]

    Goldman, Kenneth J.

    1 Run-time Modification of the Class Hierarchy in a Live Java Development Environment Joel R. Louis {jbrandt, kjg}@wustl.edu Abstract Class hierarchy design is central to object-oriented software work on live development environments to allow run-time modification of the class hierarchy. The result

  6. Automatic Feedback-Directed Object Inlining in the Java HotSpotTM Virtual Machine

    E-Print Network [OSTI]

    Mössenböck, Hanspeter

    to be replaced by address arithmetic. We implemented this optimization for Sun Microsystems' Java HotSpotTM VM analysis. The garbage collector ensures that groups of colocated objects are not split: it copies groups This work was supported by Sun Microsystems, Inc. c ACM, 2007. This is the author's version of the work

  7. Semi-Automatic Region-Based Memory Management for Real-Time Java Embedded Systems

    E-Print Network [OSTI]

    Salagnac, Guillaume

    , our system behaves as efficiently as a garbage collector in terms of memory consumption. Our analysis garbage collectors (GC) is further- more hindered by hardware limitations, and embedded sys- tems analysis tool, we provide an environ- ment where all memory operations run in predictable time, 1http://java.sun

  8. Realtime Garbage Collection for a Multithreaded Java Microcontroller S. Fuhrmann, M. Pfeffer, J. Kreuzinger, Th. Ungerer

    E-Print Network [OSTI]

    Ungerer, Theo

    collection. Java lacks explicit memory release methods and therefore a garbage collector is needed to reclaim of garbage collectors in multithreaded hardware with real­time require­ ments. Current approaches investigate­threaded Alpha processor of DEC/Compaq [9] and Sun's MAJC­5200 processor, which feature two 4­threaded

  9. A Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard, and Anders Mller

    E-Print Network [OSTI]

    Møller, Anders

    by the Danish National Research Foundation. #12;description of the XACT runtime system. We present a suitableA Runtime System for XML Transformations in Java Aske Simon Christensen, Christian Kirkegaard system where the operations can be performed efficiently. The system, named XACT, is based on a notion

  10. A Language Identification Application Built on the Java Client/Server Platform

    E-Print Network [OSTI]

    constructed a system to dynamically add language labels for whole documents and text fragments. We have experi labelling accuracy and the size/completeness of the language models. 1 Introduction In the 1.1 release been added to the base Java package 1 making the package usable for multilingual 1A few pointers

  11. A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML

    E-Print Network [OSTI]

    Lee, Chan-Su

    A Kickball Game for Ankle Rehabilitation by JAVA, JNI and VRML Hyungjeen Choi , Jeha Ryu environment that can be applied to the ankle rehabilitation procedure. We developed a virtual football stadium of the ankle rehabilitation procedures. Keywords: ankle rehabilitation, virtual environment, VRML, JNI, K

  12. Effects of Static Type Specialization on Java Generic Collections (Technical Report)

    E-Print Network [OSTI]

    Machkasova, Elena

    specialization and suggest criteria for selecting groups of classes for performance improvements. As an example, we compare different ways of specializing subsets of the Java collections library and present-needed software development tool that allow programmers to combine the convenience of generic programming

  13. Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia

    E-Print Network [OSTI]

    Manga, Michael

    Modeling study of growth and potential geohazard for LUSI mud volcano: East Java, Indonesia Bambang., Wisma Mulia 22nd Floor, JI. Jend. Gatot Subroto 42, 12710 Jakarta, Indonesia b Bakosurtanal, Jl. Jakarta-Bogor Km. 46, 16911 Cibinong, Indonesia c Applied Geology Research Division, Institute of Technology

  14. Ground deformation associated with the eruption of Lumpur Sidoarjo mud volcano, east Java, Indonesia

    E-Print Network [OSTI]

    Aoki, Yosuke

    , Indonesia Yosuke Aoki , Teguh Purnama Sidiq 1 Earthquake Research Institute, University of Tokyo, 1-1 Yayoi. With this background, the eruption of Lumpur Sidoarjo (LUSI), eastern Java Island, Indonesia, pro- vides us), which yields good coherence even in vegetated regions like Indonesia. While Rudolph et al. (2013) used

  15. Modeling and Implementing Software Architecture with Acme and ArchJava

    E-Print Network [OSTI]

    Garlan, David

    Modeling and Implementing Software Architecture with Acme and ArchJava Marwan Abi-Antoun Jonathan+@cs.cmu.edu schmerl+@cs.cmu.edu nnahas@acm.org ttt@alumni.carnegiemellon.edu ABSTRACT We demonstrate a tool to incrementally synchronize an Acme architectural model described in the Acme Architectural Description Language

  16. Design Space Exploration for Java Processors with Cross-Profiling Martin Schoeberl

    E-Print Network [OSTI]

    Schoeberl, Martin

    systems (e.g., in the automotive and airborne domain), almost all mobile phones already contain a JVM-profiling is a technique that executes a program on a host platform, but collects profiling information for the target platform. Cross-profiling not only eases the detection of performance bottlenecks in embedded Java software

  17. Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Automatic Test Factoring for Java David Saff Shay Artzi Jeff H. Perkins Michael D. Ernst MIT {saff,artzi,jhp,mernst}@csail.mit.edu Abstract Test factoring creates fast, focused unit tests from slow system-wide tests; each new unit test exercises only a subset of the functionality exercised

  18. Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators

    E-Print Network [OSTI]

    Robert R. Tucci

    2008-02-17

    This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

  19. License Usage and Changes: A Large-Scale Study of Java Projects on GitHub

    E-Print Network [OSTI]

    Poshyvanyk, Denys

    License Usage and Changes: A Large-Scale Study of Java Projects on GitHub Christopher Vendome1 -- 4 University of Victoria, BC, Canada Abstract--Software licenses determine, from a legal point of view, under which conditions software can be integrated, used, and above all, redistributed. Licenses

  20. SAT-based Termination Analysis for Java Bytecode with AProVE

    E-Print Network [OSTI]

    Ábrahám, Erika

    SAT-based Termination Analysis for Java Bytecode with AProVE Carsten Fuhs LuFG Informatik 2, RWTH solving engines for the search problems in automated termination analysis. Consequently, the performance of current termination tools heavily relies on the speed of modern SAT solvers on the corresponding SAT

  1. Building Interactive Animations using VRML and Java FABIANA SALDANHA TAMIOSSO 1 , ALBERTO BARBOSA RAPOSO 1 ,

    E-Print Network [OSTI]

    de Figueiredo, Luiz Henrique

    are pre­ sented in Section 5. 2 VRML The main goal of the current version of VRML -- 2.0 -- is to provide the definition of a Java program to process and generate events that determine the behavior of scene elements as built­in tools for Web browsers and as autonomous tools. In this paper we present strategies we have

  2. Self-accounting as Principle for Portable CPU Control in Java

    E-Print Network [OSTI]

    Binder, Walter

    Self-accounting as Principle for Portable CPU Control in Java Walter Binder1 and Jarle Hulaas2 1 the threads of an application com- ponent aggregate the information of their respective CPU consumption within 1 Introduction Accounting and controlling the resource consumption of applications and of individual

  3. COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode

    E-Print Network [OSTI]

    Zanardini, Damiano

    COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode E. Albert1 and termination together is interesting, as both analyses share most of the machinery to, respectively, infer cost analysis share most of the system machinery, as they need to consider and infer roughly the same

  4. Detecting Concurrency Errors in Client-side JavaScript Web Applications

    E-Print Network [OSTI]

    issues are becoming more serious for web applications because a new web standard, HTML5, allows webDetecting Concurrency Errors in Client-side JavaScript Web Applications Shin Hong, Yongbae Park.park@kaist.ac.kr, moonzoo@cs.kaist.ac.kr Abstract--As web technologies have evolved, the complexity of dynamic web

  5. Neutrinoless Double Phys 135c Spring 2007

    E-Print Network [OSTI]

    Golwala, Sunil

    Neutrinoless Double Beta Decay Phys 135c Spring 2007 Michael Mendenhall #12;Theory Overview #12 beta decays #12;neutrinoless double beta decays n e- p beta decay e #12;neutrinoless double beta decays n e- p beta decay e n e- p n e- p double beta decay e e #12;neutrinoless double beta decays n e- p

  6. Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia 

    E-Print Network [OSTI]

    Adhyaksawan, Rahadian

    2002-01-01

    The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide...

  7. Designing and developing portable large-scale JavaScript web applications within the Experiment Dashboard framework

    E-Print Network [OSTI]

    Andreeva, J; Karavakis, E; Kokoszkiewicz, L; Nowotka, M; Saiz, P; Tuckett, D

    2012-01-01

    Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Comp...

  8. Double acting bit holder

    DOE Patents [OSTI]

    Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

    1994-01-01

    A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

  9. Double Chooz: Latest results

    E-Print Network [OSTI]

    J. I. Crespo-Anadón; for the Double Chooz collaboration

    2014-12-11

    The latest results from the Double Chooz experiment on the neutrino mixing angle $\\theta_{13}$ are presented. A detector located at an average distance of 1050 m from the two reactor cores of the Chooz nuclear power plant has accumulated a live time of 467.90 days, corresponding to an exposure of 66.5 GW-ton-year (reactor power $\\times$ detector mass $\\times$ live time). A revised analysis has boosted the signal efficiency and reduced the backgrounds and systematic uncertainties compared to previous publications, paving the way for the two detector phase. The measured $\\sin^2 2\\theta_{13} = 0.090^{+0.032}_{-0.029}$ is extracted from a fit to the energy spectrum. A deviation from the prediction above a visible energy of 4 MeV is found, being consistent with an unaccounted reactor flux effect, which does not affect the $\\theta_{13}$ result. A consistent value of $\\theta_{13}$ is measured in a rate-only fit to the number of observed candidates as a function of the reactor power, confirming the robustness of the result.

  10. Species Doubling and Chiral Lagrangians

    E-Print Network [OSTI]

    Michael Creutz; Michel Tytgat

    1996-05-15

    Coupling gauge fields to the chiral currents from an effective Lagrangian for pseudoscalar mesons naturally gives rise to a species doubling phenomenon similar to that seen with fermionic fields in lattice gauge theory.

  11. Predicting Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    M. Hirsch; Ernest Ma; J. W. F. Valle; A. Villanova del Moral

    2005-07-12

    We give predictions for the neutrinoless double beta decay rate in a simple variant of the A_4 family symmetry model. We show that there is a lower bound for the neutrinoless double beta decay amplitude even in the case of normal hierarchical neutrino masses, corresponding to an effective mass parameter |m_{ee}| >= 0.17 \\sqrt{\\Delta m^2_{ATM}}. This result holds both for the CP conserving and CP violating cases. In the latter case we show explicitly that the lower bound on |m_{ee}| is sensitive to the value of the Majorana phase. We conclude therefore that in our scheme, neutrinoless double beta decay may be accessible to the next generation of high sensitivity experiments.

  12. New Double Soft Emission Theorems

    E-Print Network [OSTI]

    Freddy Cachazo; Song He; Ellis Ye Yuan

    2015-03-16

    We study the behavior of the tree-level S-matrix of a variety of theories as two particles become soft. By analogy with the recently found subleading soft theorems for gravitons and gluons, we explore subleading terms in double soft emissions. We first consider double soft scalar emissions and find subleading terms that are controlled by the angular momentum operator acting on hard particles. The order of the subleading theorems depends on the presence or not of color structures. Next we obtain a compact formula for the leading term in a double soft photon emission. The theories studied are a special Galileon, DBI, Einstein-Maxwell-Scalar, NLSM and Yang-Mills-Scalar. We use the recently found CHY representation of these theories in order to give a simple proof of the leading order part of all these theorems

  13. Double stranded nucleic acid biochips

    DOE Patents [OSTI]

    Chernov, Boris; Golova, Julia

    2006-05-23

    This invention describes a new method of constructing double-stranded DNA (dsDNA) microarrays based on the use of pre-synthesized or natural DNA duplexes without a stem-loop structure. The complementary oligonucleotide chains are bonded together by a novel connector that includes a linker for immobilization on a matrix. A non-enzymatic method for synthesizing double-stranded nucleic acids with this novel connector enables the construction of inexpensive and robust dsDNA/dsRNA microarrays. DNA-DNA and DNA-protein interactions are investigated using the microarrays.

  14. Neutrinoless Double Beta Decay Constraints

    E-Print Network [OSTI]

    Hiroaki Sugiyama

    2003-07-25

    A brief overview is given of theoretical analyses with neutrinoless double beta decay experiments. Theoretical bounds on the ``observable'', _betabeta, are presented. By using experimental bounds on _betabeta, allowed regions are obtained on the m_l-cos{2theta_12} plane, where m_l stands for the lightest neutrino mass. It is shown that Majorana neutrinos can be excluded by combining possible results of future neutrinoless double beta decay and {}^3H beta decay experiments. A possibility to constrain one of two Majorana phases is discussed also.

  15. Neutrinoless double beta decay experiments

    E-Print Network [OSTI]

    K. Zuber

    2006-10-04

    The study of neutrinoless double beta decay is of outmost importance for neutrino physics. It is considered to be the gold plated channel to probe the fundamental character of neutrinos and to determine the neutrino mass. From the experimental point about nine different isotopes are explored for the search. After a general introduction follows a short discussion on nuclear matrix element calculations and supportive measurements. The current experimental status of double beta searches is presented followed by a short discussion of the ideas and proposals for large scale experiments.

  16. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 11: File System Implementation

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 11: File System Implementation #12;11.2 Silberschatz, Galvin and Gagne ©2007Operating;11.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  17. Silberschatz, Galvin and Gagne 2007Operating System Concepts with Java 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures #12;2.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 2: Operating-System Structures Operating System

  18. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 13: I/O Systems

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 13: I/O Systems #12;13.2 Silberschatz, Galvin and Gagne ©2007Operating System Concepts;13.3 Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Objectives

  19. 11 Datenstrme und Dateien 11.1 Streams 11-3(190) Durch Vererbung werden diverse Streams fr konkrete Anwendungen erzeugt und im Package java.io als

    E-Print Network [OSTI]

    Arndt, Holger

    verschachtelt werden. · Ein einfacher InputStream wie System.in liefert einen Strom aus Bytes. · Ein Input.out.println(datei.length()); 28 System.out.println(new Date(datei.lastModified())); Dateien/JavaIO/File/FileBsp2.java 12 String

  20. U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code5:Oracle Java

  1. Constraining neutrinoless double beta decay

    E-Print Network [OSTI]

    L. Dorame; D. Meloni; S. Morisi; E. Peinado; J. W. F. Valle

    2011-11-23

    A class of discrete flavor-symmetry-based models predicts constrained neutrino mass matrix schemes that lead to specific neutrino mass sum-rules (MSR). We show how these theories may constrain the absolute scale of neutrino mass, leading in most of the cases to a lower bound on the neutrinoless double beta decay effective amplitude.

  2. What can we learn from neutrinoless double beta decay experiments?

    E-Print Network [OSTI]

    Bahcall, John N.

    2009-01-01

    Limits From Neutrinoless Double-Beta Decay (Rev. ),” ina next generation neutrinoless double beta decay search andPARTICLES? NO NEUTRINOLESS DOUBLE BETA DECAY AND INVERTED

  3. A Search for Neutrinoless Double Beta Decay of Te-130

    E-Print Network [OSTI]

    Bryant, Adam Douglas

    2010-01-01

    far unobserved, neutrinoless double beta decay is a possibleright for the neutrinoless double beta decay of 130 Te. Thisprocess, with neutrinoless double beta decay being the most

  4. Nuclear matrix elements for double beta decay

    E-Print Network [OSTI]

    Vadim Rodin

    2009-10-30

    The present status of calculations of the nuclear matrix elements for neutrinoless double beta decay is reviewed. A proposal which allows in principle to measure the neutrinoless double beta decay Fermi matrix element is briefly described.

  5. Minimal Doubling and Point Splitting

    SciTech Connect (OSTI)

    Creutz, M.

    2010-06-14

    Minimally-doubled chiral fermions have the unusual property of a single local field creating two fermionic species. Spreading the field over hypercubes allows construction of combinations that isolate specific modes. Combining these fields into bilinears produces meson fields of specific quantum numbers. Minimally-doubled fermion actions present the possibility of fast simulations while maintaining one exact chiral symmetry. They do, however, introduce some peculiar aspects. An explicit breaking of hyper-cubic symmetry allows additional counter-terms to appear in the renormalization. While a single field creates two different species, spreading this field over nearby sites allows isolation of specific states and the construction of physical meson operators. Finally, lattice artifacts break isospin and give two of the three pseudoscalar mesons an additional contribution to their mass. Depending on the sign of this mass splitting, one can either have a traditional Goldstone pseudoscalar meson or a parity breaking Aoki-like phase.

  6. Neutrinoless Double Beta Decay Experiments

    E-Print Network [OSTI]

    Alberto Garfagnini

    2014-08-11

    Neutrinoless double beta decay is the only process known so far able to test the neutrino intrinsic nature: its experimental observation would imply that the lepton number is violated by two units and prove that neutrinos have a Majorana mass components, being their own anti-particle. While several experiments searching for such a rare decay have been performed in the past, a new generation of experiments using different isotopes and techniques have recently released their results or are taking data and will provide new limits, should no signal be observed, in the next few years to come. The present contribution reviews the latest public results on double beta decay searches and gives an overview on the expected sensitivities of the experiments in construction which will be able to set stronger limits in the near future.

  7. LaTTe: A Java VM JustinTime Compiler with Fast and Efficient Register Allocation \\Lambda

    E-Print Network [OSTI]

    Kim, Taejeong

    LaTTe: A Java VM Just­in­Time Compiler with Fast and Efficient Register Allocation \\Lambda Byung­Sun model, a lightweight mon­ itor, a fast mark­and­sweep garbage collector, and an on­demand exception that the current LaTTe JVMs achieve performance better than or comparable to the latest SUN JIT compilers (JDK 1

  8. A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a

    E-Print Network [OSTI]

    Vuille, Mathias

    of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d DepartmentA severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

  9. Implementation of Resource Adapter for SAP R/3 and generation of java-proxy class of BAPIs

    E-Print Network [OSTI]

    Moeller, Ralf

    SAP as their Enterprise Information System. Integrating the EIS with the existing Application Server-Oriented approach in accessing the data from the EIS. For the SAP system, java-proxy class of BAPIs can be generated to access the data from SAP R/3. My project work is concerned with developing a Resource Adapter for SAP

  10. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 15: Security

    E-Print Network [OSTI]

    Bezrukov, Sergei

    with Java ­ 7th Edition, Nov 15, 2006 Chapter 15: Security The Security Problem Program Threats System Edition, Nov 15, 2006 Program Threats Trojan Horse Code segment that misuses its environment Exploits Edition, Nov 15, 2006 C Program with Buffer-overflow Condition #12;15.10 Silberschatz, Galvin and Gagne

  11. Java Printing

    E-Print Network [OSTI]

    User

    2009-09-09

    O. O. (14). O. (9). O. O. O. (8). O. (13). (4). (5). O. (10). (7). (12). O. (1). O. (11). (6). O. O. O. (3). (2). O. Problem 3: From ILT: A25 d .08165. A25 := 0.08165. A32 d .

  12. Java Printing

    E-Print Network [OSTI]

    User

    2010-11-30

    O. O. (5). O. O. (9). (3). (1). O. (6). (8). O. (7). O. O. O. (2). (4). 1) Huntington Bank offers an account that pays 4%, compounded daily. They decide to change to.

  13. Java Printing

    E-Print Network [OSTI]

    richard

    2014-10-09

    (1). > > > (4). (3). (2). 1) Lafayette Savings Bank offers an account that pays a nominal rate of i% per year, compounded daily. A deposit of $1,000 made on ...

  14. Java Printing

    E-Print Network [OSTI]

    User

    2008-10-22

    O. (8). (12). (9). (7). O. O. O. O. (10). O. O. (2). (4). (16). (11). (13). (5). (1). (14). O. O. O. O. (3). O. (15). O. (6). O. O. O. FV:=(i,PV,n,Y)->(1+i)^n*PV-((1+i)^n-1)*Y/i;.

  15. Java Printing

    E-Print Network [OSTI]

    Math

    2012-12-12

    (3). > > > > > (7). > (6). > > (2). (4). > (5). > (1). 1)At the end of year 1 I deposit $1,000 into an account that is earning 4% interest compounded annually. At the ...

  16. Identification of earthquakes that generate tsunamis in Java and Nusa Tenggara using rupture duration analysis

    SciTech Connect (OSTI)

    Pribadi, S., E-mail: sugengpribadimsc@gmail.com [Tsunami Warning Information Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No. 2, Jakarta13920 and Graduate Student of Earth Sciences, Faculty of Earth Sciences and Technology, Bandung Institute of T (Indonesia); Puspito, N. T.; Yudistira, T.; Afnimar,; Ibrahim, G. [Global Geophysics Research Group, Faculty of Mining and Petroleum Engineering, Bandung Institute of Technology (ITB), Jalan Ganesha 10, Bandung 40132 (Indonesia); Laksono, B. I. [Database Maintenance Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No.2, Jakarta 13920 (Indonesia); Adnan, Z. [Database Maintenance Division, Indonesian Meteorological Climatological and Geophysical Agency (BMKG), Jalan Angkasa I No. 2, Jakarta 13920 and Graduate Student of Earth Sciences, Faculty of Earth Sciences and Technology, Bandung Institute of Technol (Indonesia)

    2014-09-25

    Java and Nusa Tenggara are the tectonically active of Sunda arc. This study discuss the rupture duration as a manifestation of the power of earthquake-generated tsunami. We use the teleseismic (30° - 90°) body waves with high-frequency energy Seismometer is from IRIS network as amount 206 broadband units. We applied the Butterworth high bandpass (1 - 2 Hz) filtered. The arrival and travel times started from wave phase of P - PP which based on Jeffrey Bullens table with TauP program. The results are that the June 2, 1994 Banyuwangi and the July 17, 2006 Pangandaran earthquakes identified as tsunami earthquakes with long rupture duration (To > 100 second), medium magnitude (7.6 < Mw < 7.9) and located near the trench. The others are 4 tsunamigenic earthquakes and 3 inland earthquakes with short rupture duration start from To > 50 second which depend on its magnitude. Those events are located far from the trench.

  17. Understanding resonance graphs using Easy Java Simulations (EJS) and why we use EJS

    E-Print Network [OSTI]

    Wee, Loo Kang; Chew, Charles; Wong, Darren; Tan, Samuel

    2015-01-01

    This paper reports a computer model- simulation created using Easy Java Simulation (EJS) for learners to visualize how the steady-state amplitude of a driven oscillating system varies with the frequency of the periodic driving force. The simulation shows (N=100) identical spring-mass systems being subjected to (1) periodic driving force of equal amplitude but different driving frequencies and (2) different amount of damping. The simulation aims to create a visually intuitive way of understanding how the series of amplitude versus driving frequency graphs are obtained by showing how the displacement of the system changes over time as it transits from the transient to the steady state. A suggested how to use the model is added to help educators and students in their teaching and learning, where we explained the theoretical steady state equation, time conditions when the model starts allowing data recording of maximum amplitudes to closely match the theoretical equation and steps to collect different runs of deg...

  18. Neutrinoless Double Beta Decay: Present and Future

    E-Print Network [OSTI]

    Oliviero Cremonesi

    2002-10-04

    Present status, and future plans for Double Beta Decay searches are reviewed. Given the recent observations of neutrino oscillations, a possibility to observe $\\beta\\beta(0\

  19. Review of double beta decay experiments

    E-Print Network [OSTI]

    A. S. Barabash

    2014-03-12

    The brief review of current experiments on search and studying of double beta decay processes is done. Best present limits on $\\langle m_{\

  20. Double perovskite catalysts for oxidative coupling

    DOE Patents [OSTI]

    Campbell, Kenneth D. (Charleston, WV)

    1991-01-01

    Alkali metal doped double perovskites containing manganese and at least one of cobalt, iron and nickel are useful in the oxidative coupling of alkane to higher hydrocarbons.

  1. Predicting neutrinoless double beta decay

    SciTech Connect (OSTI)

    Hirsch, M.; Villanova del Moral, A.; Valle, J.W.F. [AHEP Group, Instituto de Fisica Corpuscular - C.S.I.C./Universitat de Valencia, Edificio Institutos de Paterna, Apt 22085, E-46071 Valencia (Spain); Ma, Ernest [Physics Department, University of California, Riverside, California 92521 (United States); Institute for Particle Physics Phenomenology, University of Durham, Durham, DH1 3LE (United Kingdom)

    2005-11-01

    We give predictions for the neutrinoless double beta decay rate in a simple variant of the A{sub 4} family symmetry model. We show that there is a lower bound for the {beta}{beta}{sub 0{nu}} amplitude even in the case of normal hierarchical neutrino masses, corresponding to an effective mass parameter vertical bar m{sub ee} vertical bar {>=}0.17{radical}({delta}m{sub ATM}{sup 2}). This result holds both for the CP conserving and CP violating cases. In the latter case we show explicitly that the lower bound on vertical bar m{sub ee} vertical bar is sensitive to the value of the Majorana phase. We conclude therefore that in our scheme, {beta}{beta}{sub 0{nu}} may be accessible to the next generation of high sensitivity experiments.

  2. Double-Disk Dark Matter

    E-Print Network [OSTI]

    Fan, JiJi; Randall, Lisa; Reece, Matthew

    2013-01-01

    Based on observational tests and constraints on halo structure, dark matter is generally taken to be cold and essentially collisionless. On the other hand, given the large number of particles and forces in the visible world, a more complex dark sector could be a reasonable or even likely possibility. This hypothesis leads to testable consequences, perhaps portending the discovery of a rich hidden world neighboring our own. We consider a scenario that readily satisfies current bounds that we call Partially Interacting Dark Matter (PIDM). This scenario contains self-interacting dark matter, but it is not the dominant component. Even if PIDM contains only a fraction of the net dark matter density, comparable to the baryonic fraction, the subdominant component's interactions can lead to interesting and potentially observable consequences. Our primary focus will be the special case of Double-Disk Dark Matter (DDDM), in which self-interactions allow the dark matter to lose enough energy to lead to dynamics similar ...

  3. The tropical double description method

    E-Print Network [OSTI]

    Allamigeon, Xavier; Goubault, Eric

    2010-01-01

    We develop a tropical analogue of the classical double description method allowing one to compute an internal representation (in terms of vertices) of a polyhedron defined externally (by inequalities). The heart of the tropical algorithm is a characterization of the extreme points of a polyhedron in terms of a system of constraints which define it. We show that checking the extremality of a point reduces to checking whether there is only one minimal strongly connected component in an hypergraph. The latter problem can be solved in almost linear time, which allows us to eliminate quickly redundant generators. We report extensive tests (including benchmarks from an application to static analysis) showing that the method outperforms experimentally the previous ones by orders of magnitude. The present tools also lead to worst case bounds which improve the ones provided by previous methods.

  4. Double Integrals: GENERAL REGION The main difficulty in evaluating a double integral

    E-Print Network [OSTI]

    Knopf, Dan

    Double Integrals: GENERAL REGION The main difficulty in evaluating a double integral was being able to compute the single variable integrals that arose because the double integral could written as repeated single variable integrals and either choice of order of integration used. So we could always choose

  5. Double bevel construction of a diamond anvil

    DOE Patents [OSTI]

    Moss, W.C.

    1988-10-11

    A double or multiple bevel culet geometry is used on a diamond anvil in a high pressure cell apparatus to provide increased sample pressure and stability for a given force applied to the diamond tables. Double or multiple bevel culet geometries can also be used for sapphire or other hard crystal anvils. Pressures up to and above 5 Megabars can be reached. 8 figs.

  6. Double beta decay: experiments and theory review

    E-Print Network [OSTI]

    A. Nucciotti

    2007-07-28

    Neutrinoless double beta decay is one of the most powerful tools to set the neutrino mass absolute scale and establish whether the neutrino is a Majorana particle. After a summary of the neutrinoless double beta decay phenomenology, the present status of the experimental search for this rare decay is reported and the prospects for next generation experiments are reviewed.

  7. Neutrinoless double beta decay and neutrino physics

    E-Print Network [OSTI]

    Werner Rodejohann

    2012-08-20

    The connection of neutrino physics with neutrinoless double beta decay is reviewed. After presenting the current status of the PMNS matrix and the theoretical background of neutrino mass and lepton mixing, we will summarize the various implications of neutrino physics for double beta decay. The influence of light sterile neutrinos and other exotic modifications of the three neutrino picture is also discussed.

  8. Reliability Estimation for Double Containment Piping

    SciTech Connect (OSTI)

    L. Cadwallader; T. Pinna

    2012-08-01

    Double walled or double containment piping is considered for use in the ITER international project and other next-generation fusion device designs to provide an extra barrier for tritium gas and other radioactive materials. The extra barrier improves confinement of these materials and enhances safety of the facility. This paper describes some of the design challenges in designing double containment piping systems. There is also a brief review of a few operating experiences of double walled piping used with hazardous chemicals in different industries. This paper recommends approaches for the reliability analyst to use to quantify leakage from a double containment piping system in conceptual and more advanced designs. The paper also cites quantitative data that can be used to support such reliability analyses.

  9. 63.152: Computer Science I Using Java Spring 2008 Framingham State College

    E-Print Network [OSTI]

    Keil, David M.

    an existing text file: Choose File / Open and navigate the directory. To save a file: 1. To save a new file or to save an existing file under a different name from before, choose File / Save As. Enter the name of your. Pitfall: If you omit the double quotes, your file will be saved with a second extension, .txt. (Often

  10. Neutrinoless Double Beta Decay in Light of SNO Salt Data

    E-Print Network [OSTI]

    Murayama, Hitoshi

    2009-01-01

    Limits From Neutrinoless Double-Beta Decay (Rev. ),” incan also cause neutrinoless double-beta decay (see e.g. , [LBNL-53996 Neutrinoless Double Beta Decay in Light of SNO

  11. Resonance and Double Negative Behavior in Metamaterials

    E-Print Network [OSTI]

    Yue Chen; Robert P. Lipton

    2013-05-03

    A generic class of metamaterials is introduced and is shown to exhibit frequency dependent double negative effective properties. We develop a rigorous method for calculating the frequency intervals where either double negative or double positive effective properties appear and show how these intervals imply the existence of propagating Bloch waves inside sub-wavelength structures. The branches of the dispersion relation associated with Bloch modes are shown to be explicitly determined by the Dirichlet spectrum of the high dielectric phase and the generalized electrostatic spectra of the complement.

  12. Neutrinoless Double Beta Decay and Neutrino Masses

    E-Print Network [OSTI]

    Michael Duerr

    2012-06-04

    Neutrinoless double beta decay is a promising test for lepton number violating physics beyond the standard model of particle physics. There is a deep connection between this decay and the phenomenon of neutrino masses. In particular, we will discuss the relation between neutrinoless double beta decay and Majorana neutrino masses provided by the so-called Schechter--Valle theorem in a quantitative way. Furthermore, we will present an experimental cross check to discriminate neutrinoless double beta decay from unknown nuclear background using only one isotope, i.e., within one experiment.

  13. Development of double-decker pulse radiolysis

    SciTech Connect (OSTI)

    Kan, K.; Kondoh, T.; Yang, J.; Ogata, A.; Norizawa, K.; Yoshida, Y. [Institute of Scientific and Industrial Research, Osaka University, Osaka (Japan)

    2012-07-15

    Double-decker pulse radiolysis (DDPR), which utilizes double-decker electron beams, was investigated to develop a new pulse radiolysis with a high time resolution. The double-decker electron beams were generated by injecting two UV pulses into a photocathode radio-frequency gun. In the pulse radiolysis, one electron beam was used as a pump beam, and the other was converted to a probe pulse. Finally, as its first application, the DDPR was successfully used for observing solvated electrons in water, with a 10%-90% rise time of 8.6 ps.

  14. Double-reed exhaust valve engine

    DOE Patents [OSTI]

    Bennett, Charles L.

    2015-06-30

    An engine based on a reciprocating piston engine that extracts work from pressurized working fluid. The engine includes a double reed outlet valve for controlling the flow of low-pressure working fluid out of the engine. The double reed provides a stronger force resisting closure of the outlet valve than the force tending to open the outlet valve. The double reed valve enables engine operation at relatively higher torque and lower efficiency at low speed, with lower torque, but higher efficiency at high speed.

  15. Search for: "neutrinoless double beta decay" | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    neutrinoless double beta decay" Find + Advanced Search Advanced Search All Fields: "neutrinoless double beta decay" Title: Full Text: Bibliographic Data: Creator Author: Name...

  16. SciTech Connect: "neutrinoless double beta decay"

    Office of Scientific and Technical Information (OSTI)

    neutrinoless double beta decay" Find + Advanced Search Term Search Semantic Search Advanced Search All Fields: "neutrinoless double beta decay" Semantic Semantic Term Title:...

  17. Double-Disk Dark Matter

    E-Print Network [OSTI]

    JiJi Fan; Andrey Katz; Lisa Randall; Matthew Reece

    2013-07-31

    Based on observational constraints on large scale structure and halo structure, dark matter is generally taken to be cold and essentially collisionless. On the other hand, given the large number of particles and forces in the visible world, a more complex dark sector could be a reasonable or even likely possibility. This hypothesis leads to testable consequences, perhaps portending the discovery of a rich hidden world neighboring our own. We consider a scenario that readily satisfies current bounds that we call Partially Interacting Dark Matter (PIDM). This scenario contains self-interacting dark matter, but it is not the dominant component. Even if PIDM contains only a fraction of the net dark matter density, comparable to the baryonic fraction, the subdominant component's interactions can lead to interesting and potentially observable consequences. Our primary focus will be the special case of Double-Disk Dark Matter (DDDM), in which self-interactions allow the dark matter to lose enough energy to lead to dynamics similar to those in the baryonic sector. We explore a simple model in which DDDM can cool efficiently and form a disk within galaxies, and we evaluate some of the possible observational signatures. The most prominent signal of such a scenario could be an enhanced indirect detection signature with a distinctive spatial distribution. Even though subdominant, the enhanced density at the center of the galaxy and possibly throughout the plane of the galaxy can lead to large boost factors, and could even explain a signature as large as the 130 GeV Fermi line. Such scenarios also predict additional dark radiation degrees of freedom that could soon be detectable and would influence the interpretation of future data, such as that from Planck and from the Gaia satellite. We consider this to be the first step toward exploring a rich array of new possibilities for dark matter dynamics.

  18. Double layer capacitors : automotive applications and modeling

    E-Print Network [OSTI]

    New, David Allen, 1976-

    2004-01-01

    This thesis documents the work on the modeling of double layer capacitors (DLCs) and the validation of the modeling procedure. Several experiments were conducted to subject the device under test to a variety of ...

  19. Double logarithmic asymptotic behavior in quantum chromodynamics

    SciTech Connect (OSTI)

    Kirschner, R.

    1981-08-01

    The double logarithmic contributions to the quark-(anti)quark scattering and annihilation amplitudes are summed to all orders in quantum chromodynamics. The results are a generalization of the calculations of Gorshkov et al. in the case of quantum electrodynamics.

  20. Double bevel construction of a diamond anvil

    DOE Patents [OSTI]

    Moss, W.C.

    1987-02-06

    Use of double or multiple bevel culet geometry on a diamond anvil to provide increased sample pressure and stability for a given force applied to the diamond tables. 7 figs.

  1. CP Violation in Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    T. Fukuyama; K. Matsuda; H. Nishiura

    1997-08-19

    We argue three-flavour neutrino mixing. We consider the neutrinos as Majorana particles and see how the neutrinoless double beta decay constrains the neutrino mixing angles. Our formulation is widely valid and is applied to the neutrino oscillation experiment.

  2. Phenomenology of neutrinoless double beta decay

    E-Print Network [OSTI]

    Gómez-Cadenas, J J

    2015-01-01

    This paper reviews the current status and future outlook of neutrinoless double beta decay searches, which try to provide an answer to the fundamental question of whether neutrinos are Dirac or Majorana particles.

  3. Probing neutrinoless double beta decay with SNO+

    E-Print Network [OSTI]

    Evelina Arushanova; Ashley R. Back

    2015-05-01

    Probing neutrinoless double beta decay is one of the primary goals for SNO+, SNOLAB's multi-purpose neutrino detector. In order to achieve this goal the SNO detector has been adapted so that it can be filled with Te-loaded liquid scintillator. During the initial double beta phase the target loading is 0.3% natural Te, which equates to $\\sim790$ kg of double beta isotope. Estimating the sensitivity to neutrinoless double beta decay requires a well understood background model. For SNO+ this is provided by a comprehensive study considering all possible background contributions, whether they originate from within the liquid scintillator cocktail, the surrounding parts of the detector or other irreducible backgrounds. Given these considerations, for five years running in the initial phase, the expected sensitivity is $T_{1/2}^{0\

  4. Phenomenology of neutrinoless double beta decay

    E-Print Network [OSTI]

    J. J. Gómez-Cadenas; Justo Martín-Albo

    2015-02-25

    This paper reviews the current status and future outlook of neutrinoless double beta decay searches, which try to provide an answer to the fundamental question of whether neutrinos are Dirac or Majorana particles.

  5. Probing neutrinoless double beta decay with SNO+

    E-Print Network [OSTI]

    Arushanova, Evelina

    2015-01-01

    Probing neutrinoless double beta decay is one of the primary goals for SNO+, SNOLAB's multi-purpose neutrino detector. In order to achieve this goal the SNO detector has been adapted so that it can be filled with Te-loaded liquid scintillator. During the initial double beta phase the target loading is 0.3% natural Te, which equates to $\\sim790$ kg of double beta isotope. Estimating the sensitivity to neutrinoless double beta decay requires a well understood background model. For SNO+ this is provided by a comprehensive study considering all possible background contributions, whether they originate from within the liquid scintillator cocktail, the surrounding parts of the detector or other irreducible backgrounds. Given these considerations, for five years running in the initial phase, the expected sensitivity is $T_{1/2}^{0\

  6. Double shell tank waste analysis plan

    SciTech Connect (OSTI)

    Mulkey, C.H.; Jones, J.M.

    1994-12-15

    Waste analysis plan for the double shell tanks. SD-WM-EV-053 is Superseding SD-WM-EV-057.This document provides the plan for obtaining information needed for the safe waste handling and storage of waste in the Double Shell Tank Systems. In Particular it addresses analysis necessary to manage waste according to Washington Administrative Code 173-303 and Title 40, parts 264 and 265 of the Code of Federal Regulations.

  7. Neutrinoless double beta decay with scalar bilinears

    E-Print Network [OSTI]

    H. V. Klapdor-Kleingrothaus; U. Sarkar

    2002-11-18

    One possible probe to physics beyond the standard model is to look for scalar bilinears, which couple to two fermions of the standard model. We point out that the scalar bilinears allow new diagrams contributing to the neutrinoless double beta decay. The upper bound on the neutrinoless double beta decay lifetime would then give new constraints on the ratio of the masses of these scalars to their couplings to the fermions.

  8. Neutrinoless Double Beta Decay and CP Violation

    E-Print Network [OSTI]

    Patrick J. O'Donnell; Utpal Sarkar

    1993-05-27

    We study the relation between the Majorana neutrino mass matrices and the neutrinoless double beta decay when CP is not conserved. We give an explicit form of the decay rate in terms of a rephasing invariant quantity and demonstrate that in the presence of CP violation it is impossible to have vanishing neutrinoless double beta decay in the case of two neutrino generations (or when the third generation leptons do not mix with other leptons and hence decouple).

  9. Searches for neutrinoless double beta decay

    E-Print Network [OSTI]

    B. Schwingenheuer

    2012-01-24

    Neutrinoless double beta decay is a lepton number violating process whose observation would also establish that neutrinos are their own anti-particles. There are many experimental efforts with a variety of techniques. Some (EXO, Kamland-Zen, GERDA phase I and CANDLES) started take data in 2011 and EXO has reported the first measurement of the half life for the double beta decay with two neutrinos of $^{136}$Xe. The sensitivities of the different proposals are reviewed.

  10. Wavelength-doubling optical parametric oscillator

    DOE Patents [OSTI]

    Armstrong, Darrell J. (Albuquerque, NM); Smith, Arlee V. (Albuquerque, NM)

    2007-07-24

    A wavelength-doubling optical parametric oscillator (OPO) comprising a type II nonlinear optical medium for generating a pair of degenerate waves at twice a pump wavelength and a plurality of mirrors for rotating the polarization of one wave by 90 degrees to produce a wavelength-doubled beam with an increased output energy by coupling both of the degenerate waves out of the OPO cavity through the same output coupler following polarization rotation of one of the degenerate waves.

  11. Ortho-positronium observation in the Double Chooz Experiment

    E-Print Network [OSTI]

    Y. Abe; J. C. dos Anjos; J. C. Barriere; E. Baussan; I. Bekman; M. Bergevin; T. J. C. Bezerra; L. Bezrukov; E. Blucher; C. Buck; J. Busenitz; A. Cabrera; E. Caden; L. Camilleri; R. Carr; M. Cerrada; P. -J. Chang; E. Chauveau; P. Chimenti; A. P. Collin; E. Conover; J. M. Conrad; J. I. Crespo-Anadon; K. Crum; A. S. Cucoanes; E. Damon; J. V. Dawson; J. Dhooghe; D. Dietrich; Z. Djurcic; M. Dracos; M. Elnimr; A. Etenko; M. Fallot; F. von Feilitzsch; J. Felde; S. M. Fernandes; V. Fischer; D. Franco; M. Franke; H. Furuta; I. Gil-Botella; L. Giot; M. Goger-Neff; L. F. G. Gonzalez; L. Goodenough; M. C. Goodman; C. Grant; N. Haag; T. Hara; J. Haser; M. Hofmann; G. A. Horton-Smith; A. Hourlier; M. Ishitsuka; J. Jochum; C. Jollet; F. Kaether; L. N. Kalousis; Y. Kamyshkov; D. M. Kaplan; T. Kawasaki; E. Kemp; H. de Kerret; D. Kryn; M. Kuze; T. Lachenmaier; C. E. Lane; T. Lasserre; A. Letourneau; D. Lhuillier; H. P. Lima Jr; M. Lindner; J. M. Lopez-Castano; J. M. LoSecco; B. Lubsandorzhiev; S. Lucht; J. Maeda; C. Mariani; J. Maricic; J. Martino; T. Matsubara; G. Mention; A. Meregaglia; T. Miletic; R. Milincic; A. Minotti; Y. Nagasaka; Y. Nikitenko; P. Novella; L. Oberauer; M. Obolensky; A. Onillon; A. Osborn; C. Palomares; I. M. Pepe; S. Perasso; P. Pfahler; A. Porta; G. Pronost; J. Reichenbacher; B. Reinhold; M. Rohling; R. Roncin; S. Roth; B. Rybolt; Y. Sakamoto; R. Santorelli; A. C. Schilithz; S. Schonert; S. Schoppmann; M. H. Shaevitz; R. Sharankova; S. Shimojima; D. Shrestha; V. Sibille; V. Sinev; M. Skorokhvatov; E. Smith; J. Spitz; A. Stahl; I. Stancu; L. F. F. Stokes; M. Strait; A. Stuken; F. Suekane; S. Sukhotin; T. Sumiyoshi; Y. Sun; R. Svoboda; K. Terao; A. Tonazzo; H. H. Trinh Thi; G. Valdiviesso; N. Vassilopoulos; C. Veyssiere; M. Vivier; S. Wagner; N. Walsh; H. Watanabe; C. Wiebusch; L. Winslow; M. Wurm; G. Yang; F. Yermia; V. Zimmer

    2014-10-07

    The Double Chooz experiment measures the neutrino mixing angle $\\theta_{13}$ by detecting reactor $\\bar{\

  12. The search for neutrinoless double beta decay

    E-Print Network [OSTI]

    J. J. Gomez-Cadenas; J. Martin-Albo; M. Mezzetto; F. Monrabal; M. Sorel

    2012-01-16

    In the last two decades the search for neutrinoless double beta decay has evolved into one of the highest priorities for understanding neutrinos and the origin of mass. The main reason for this paradigm shift has been the discovery of neutrino oscillations, which clearly established the existence of massive neutrinos. An additional motivation for conducting such searches comes from the existence of an unconfirmed, but not refuted, claim of evidence for neutrinoless double decay in $^{76}\\text{Ge}$. As a consequence, a new generation of experiments, employing different detection techniques and $\\beta\\beta$ isotopes, is being actively promoted by experimental groups across the world. In addition, nuclear theorists are making remarkable progress in the calculation of the neutrinoless double beta decay nuclear matrix elements, thus eliminating a substantial part of the theoretical uncertainties affecting the particle physics interpretation of this process. In this report, we review the main aspects of the double beta decay process and some of the most relevant experiments. The picture that emerges is one where searching for neutrinoless double beta decay is recognized to have both far-reaching theoretical implications and promising prospects for experimental observation in the near future.

  13. The role of literal meaning in metaphor 

    E-Print Network [OSTI]

    Coleman, Martin Allen

    1996-01-01

    or original meaning of words remain active in their metaphorical setting. " ' This is a foundational premise of his theory of metaphor. Next Davidson considers the notion that metaphor is a kind of ambiguity, and it derives its force Jrom a wavering between...

  14. Recent Results in Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    Lisa J. Kaufman

    2013-05-14

    The search for neutrinoless double beta decay is a rich source for new physics. The observation of this decay will lead to understanding of the absolute mass scale of neutrinos, the Majorana nature of the neutrino (whether the neutrino is its own anti-particle), and lepton number violation. Double beta decay is being investigated around the world by several experiments using different candidate isotopes. There has been much progress made in experimental techniques recently such that achieving sensitivity to neutrino masses at 50 meV and below will be possible in the near future. A summary of recent results in neutrinoless double beta decay is discussed with a look toward the experimental goals for the future.

  15. Phenomenology of neutrinoless double beta decay

    E-Print Network [OSTI]

    M. Hirsch

    2006-09-15

    Neutrinoless double beta decay violates lepton number by two units, a positive observation therefore necessarily implies physics beyond the standard model. Here, three possible contributions to neutrinoless double beta decay are briefly reviewed: (a) The mass mechanism and its connection to neutrino oscillations; (b) Left-right symmetric models and the lower limit on the right-handed W boson mass; and (c) R-parity violating supersymmetry. In addition, the recently published ``extended black box'' theorem is briefly discussed. Combined with data from oscillation experiments this theorem provides proof that the neutrinoless double beta decay amplitude must receive a non-zero contribution from the mass mechanism, if neutrinos are indeed Majorana particles.

  16. Precision Muon Reconstruction in Double Chooz

    E-Print Network [OSTI]

    Double Chooz collaboration; Y. Abe; J. C. dos Anjos; J. C. Barriere; E. Baussan; I. Bekman; M. Bergevin; T. J. C. Bezerra; L. Bezrukov; E. Blucher; C. Buck; J. Busenitz; A. Cabrera; E. Caden; L. Camilleri; R. Carr; M. Cerrada; P. -J. Chang; E. Chauveau; P. Chimenti; A. P. Collin; E. Conover; J. M. Conrad; J. I. Crespo-Anadón; K. Crum; A. Cucoanes; E. Damon; J. V. Dawson; D. Dietrich; Z. Djurcic; M. Dracos; M. Elnimr; A. Etenko; M. Fallot; F. von Feilitzsch; J. Felde; S. M. Fernandes; V. Fischer; D. Franco; M. Franke; H. Furuta; I. Gil-Botella; L. Giot; M. Göger-Neff; L. F. G. Gonzalez; L. Goodenough; M. C. Goodman; C. Grant; N. Haag; T. Hara; J. Haser; M. Hofmann; G. A. Horton-Smith; A. Hourlier; M. Ishitsuka; J. Jochum; C. Jollet; F. Kaether; L. N. Kalousis; Y. Kamyshkov; D. M. Kaplan; T. Kawasaki; E. Kemp; H. de Kerret; D. Kryn; M. Kuze; T. Lachenmaier; C. E. Lane; T. Lasserre; A. Letourneau; D. Lhuillier; H. P. Lima Jr; M. Lindner; J. M. López-Casta no; J. M. LoSecco; B. Lubsandorzhiev; S. Lucht; J. Maeda; C. Mariani; J. Maricic; J. Martino; T. Matsubara; G. Mention; A. Meregaglia; T. Miletic; R. Milincic; A. Minotti; Y. Nagasaka; Y. Nikitenko; P. Novella; M. Obolensky; L. Oberauer; A. Onillon; A. Osborn; C. Palomares; I. M. Pepe; S. Perasso; P. Pfahler; A. Porta; G. Pronost; J. Reichenbacher; B. Reinhold; M. Röhling; R. Roncin; S. Roth; B. Rybolt; Y. Sakamoto; R. Santorelli; A. C. Schilithz; S. Schönert; S. Schoppmann; M. H. Shaevitz; R. Sharankova; S. Shimojima; V. Sibille; V. Sinev; M. Skorokhvatov; E. Smith; J. Spitz; A. Stahl; I. Stancu; L. F. F. Stokes; M. Strait; A. Stüken; F. Suekane; S. Sukhotin; T. Sumiyoshi; Y. Sun; R. Svoboda; K. Terao; A. Tonazzo; H. H. Trinh Thi; G. Valdiviesso; N. Vassilopoulos; C. Veyssiere; M. Vivier; S. Wagner; H. Watanabe; C. Wiebusch; L. Winslow; M. Wurm; G. Yang; F. Yermia; V. Zimmer

    2014-08-15

    We describe a muon track reconstruction algorithm for the reactor anti-neutrino experiment Double Chooz. The Double Chooz detector consists of two optically isolated volumes of liquid scintillator viewed by PMTs, and an Outer Veto above these made of crossed scintillator strips. Muons are reconstructed by their Outer Veto hit positions along with timing information from the other two detector volumes. All muons are fit under the hypothesis that they are through-going and ultrarelativistic. If the energy depositions suggest that the muon may have stopped, the reconstruction fits also for this hypothesis and chooses between the two via the relative goodness-of-fit. In the ideal case of a through-going muon intersecting the center of the detector, the resolution is ~40 mm in each transverse dimension. High quality muon reconstruction is an important tool for reducing the impact of the cosmogenic isotope background in Double Chooz.

  17. The double-beta decay: Theoretical challenges

    SciTech Connect (OSTI)

    Horoi, Mihai

    2012-11-20

    Neutrinoless double beta decay is a unique process that could reveal physics beyond the Standard Model of particle physics namely, if observed, it would prove that neutrinos are Majorana particles. In addition, it could provide information regarding the neutrino masses and their hierarchy, provided that reliable nuclear matrix elements can be obtained. The two neutrino double beta decay is an associate process that is allowed by the Standard Model, and it was observed for about ten nuclei. The present contribution gives a brief review of the theoretical challenges associated with these two process, emphasizing the reliable calculation of the associated nuclear matrix elements.

  18. On the neutrinoless double ?{sup +}/EC decays

    SciTech Connect (OSTI)

    Suhonen, Jouni

    2013-12-30

    The neutrinoless double positron-emission/electron-capture (0??{sup +}/EC) decays are studied for the magnitudes of the involved nuclear matrix elements (NMEs). Decays to the ground state, 0{sub gs}{sup +}, and excited 0{sup +} states are discussed. The participant many-body wave functions are evaluated in the framework of the quasiparticle random-phase approximation (QRPA). Effective, G-matrix-derived nuclear forces are used in realistic single-particle model spaces. The channels ?{sup +}?{sup +}, ?{sup +}EC, and the resonant neutrinoless double electron capture (R0?ECEC) are discussed.

  19. Silberschatz, Galvin and Gagne 2007Operating System Concepts with Java 7th Edition, Nov 15, 2006 Chapter 16: Distributed System Structures

    E-Print Network [OSTI]

    Bezrukov, Sergei

    Silberschatz, Galvin and Gagne ©2007Operating System Concepts with Java ­ 7th Edition, Nov 15, 2006 Chapter 16: Distributed System Structures #12;16.2 Silberschatz, Galvin and Gagne ©2007Operating System of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

  20. Proc. of the ACM Conf. on OO Programming, Systems, Languages, and Applications (OOPSLA'01), ACM Copyright. Regression Test Selection for Java Software

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    Copyright. Regression Test Selection for Java Software Mary Jean Harrold harrold@cc.gatech.edu James A of the software--this process is called regression test selection. A safe regression- test-selection algorithm selects every test case in the test suite that may reveal a fault in the modified software. Safe

  1. MAC 5765 -Sistemas de Middleware Avancados -Segundo Semestre de 2002 Segundo Exercicio-Programa: Invocador Java/IIOP para o JBoss

    E-Print Network [OSTI]

    Reverbel, Francisco

    standard, isto ´e, FooInvoker especifica sua interface de gerenciamento implemen- tando uma interface Java cujo nome ´e FooInvokerMBean. · Cada invocador ´e espec´ifico para um certo protocolo (JRMPInvoker, HTTPInvoker, . . . ) e permite que clientes remotos utilizem esse protocolo para acessar uma interface de

  2. The COBRA Double Beta Decay Experiment

    SciTech Connect (OSTI)

    Dawson, J. V. [Department of Physics and Astronomy, University of Sussex, Brighton. BN1 9QH (United Kingdom)

    2007-03-28

    The progress of the COBRA neutrinoless double beta decay experiment is discussed. Potential backgrounds are described. Estimates on the contamination levels of 214Bi in the detectors have been made using previously acquired low background data. New crystals with a different passivation material show an improved background count rate of approximately one order of magnitude.

  3. Double tracks test site characterization report

    SciTech Connect (OSTI)

    NONE

    1996-05-01

    This report presents the results of site characterization activities performed at the Double Tracks Test Site, located on Range 71 North, of the Nellis Air Force Range (NAFR) in southern Nevada. Site characterization activities included reviewing historical data from the Double Tracks experiment, previous site investigation efforts, and recent site characterization data. The most recent site characterization activities were conducted in support of an interim corrective action to remediate the Double Tracks Test Site to an acceptable risk to human health and the environment. Site characterization was performed using a phased approach. First, previously collected data and historical records sere compiled and reviewed. Generalized scopes of work were then prepared to fill known data gaps. Field activities were conducted and the collected data were then reviewed to determine whether data gaps were filled and whether other areas needed to be investigated. Additional field efforts were then conducted, as required, to adequately characterize the site. Characterization of the Double Tracks Test Site was conducted in accordance with the US Department of Energy`s (DOE) Streamlined Approach for Environmental Restoration (SAFER).

  4. Cretan Hieroglyphic Wool Units (LANA, double mina)

    E-Print Network [OSTI]

    Younger, John G.

    2005-01-01

    Minoan Hieroglyphic document CHIC *089, on analogy with Linear A and B wool documents, records the wool of a certain type of cloth as the equivalent in weight of 3 double minas, that is 1 wool unit (or the wool from 4 sheep).

  5. Scale evolution of double parton correlations

    E-Print Network [OSTI]

    Tomas Kasemets

    2014-11-17

    We review the effect of scale evolution on a number of different correlations in double parton scattering (DPS). The strength of the correlations generally decreases with the scale but at a rate which greatly varies between different types. Through studies of the evolution, an understanding of which correlations can be of experimental relevance in different processes and kinematical regions is obtained.

  6. Neutrinoless double beta decay in seesaw models

    E-Print Network [OSTI]

    Mattias Blennow; Enrique Fernandez-Martinez; Jacobo Lopez-Pavon; Javier Menendez

    2014-05-12

    We study the general phenomenology of neutrinoless double beta decay in seesaw models. In particular, we focus on the dependence of the neutrinoless double beta decay rate on the mass of the extra states introduced to account for the Majorana masses of light neutrinos. For this purpose, we compute the nuclear matrix elements as functions of the mass of the mediating fermions and estimate the associated uncertainties. We then discuss what can be inferred on the seesaw model parameters in the different mass regimes and clarify how the contribution of the light neutrinos should always be taken into account when deriving bounds on the extra parameters. Conversely, the extra states can also have a significant impact, cancelling the Standard Model neutrino contribution for masses lighter than the nuclear scale and leading to vanishing neutrinoless double beta decay amplitudes even if neutrinos are Majorana particles. We also discuss how seesaw models could reconcile large rates of neutrinoless double beta decay with more stringent cosmological bounds on neutrino masses.

  7. Double Tracks revegetation and monitoring plan

    SciTech Connect (OSTI)

    NONE

    1997-07-01

    This document is a reclamation plan for short-term and long-term stabilization of land disturbed by activities associated with interim clean-up of radionuclide-contaminated surface soil at the Double Tracks site. This document has been prepared to provide general reclamation practices and procedures that will be followed during restoration of the cleanup site. Reclamation demonstration plots were established near the site in the fall of 1994 to evaluate the performance of several native species and to evaluate different irrigation strategies. Results of the study at Double Tracks, as well as the results from numerous studies conducted at other sites (Area 11 and Area 19 of the Nevada Test Site), have been summarized and incorporated into this final reclamation plan for the interim cleanup of the Double Tracks site, located northwest of the Nevada Test Site on the Nellis Air Force Range. Surface soils at Double Tracks were contaminated as a result of the detonation of a device containing plutonium and depleted uranium using chemical explosives. The total amount of Pu deposited on the site was between 980 and 1,600 grams and was scattered downwind south of the detonation site. Short-term stabilization consists of the application of a chemical soil stabilizer that is applied immediately following excavation of the contaminated soils to minimize Pu resuspension. Long-term stabilization is accomplished by the establishment of a permanent vegetation.

  8. Double layer capacitor prospects look good

    SciTech Connect (OSTI)

    1995-07-01

    The Fourth International Seminar in Double Layer Capacitors and similar energy devices has been sponsored again by Dr. S.P. Wolsky and Dr. Nikola Marincic. The seminar was held in December 1994, at Deerfield Beach, FL. This report provides a brief description of information on supercapacitors.

  9. Diapycnal advection by double diffusion and turbulence in the ocean

    E-Print Network [OSTI]

    St. Laurent, Louis C

    1999-01-01

    Observations of diapycnal mixing rates are examined and related to diapycnal advection for both double-diffusive and turbulent regimes. The role of double-diffusive mixing at the site of the North Atlantic Tracer Release ...

  10. The effects of double-diffusion on a baroclinic vortex

    E-Print Network [OSTI]

    Smith, Wendy Marie

    1987-01-01

    Laboratory experiments were performed to study the combined effects of double-diffusion and rotation on an oceanic intrusion. Intrusions are driven across density-compensated fronts by the divergence of the double-diffusive ...

  11. National CHP Roadmap: Doubling Combined Heat and Power Capacity...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHP Roadmap: Doubling Combined Heat and Power Capacity in the United States by 2010, March 2001 National CHP Roadmap: Doubling Combined Heat and Power Capacity in the United States...

  12. Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools

    E-Print Network [OSTI]

    Sanchez, Arturo; The ATLAS collaboration

    2015-01-01

    We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based H->ZZ->llqq analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online; this presentation describes the tests and plans and future upgrades.

  13. Exploring JavaScript and ROOT technologies to create Web-based ATLAS analysis and monitoring tools

    E-Print Network [OSTI]

    Sanchez, Arturo; The ATLAS collaboration

    2015-01-01

    We explore the potentialities of current web applications to create online interfaces that allow the visualization, interaction and real physics cut-based analysis and monitoring of processes trough a web browser. The project consists in the initial development of web-based and cloud computing services to allow students and researches to perform fast and very useful cut-based analysis on a browser, reading and using real data and official Monte-Carlo simulations stored in ATLAS computing facilities. Several tools are considered: ROOT, JavaScript and HTML. Our study case is the current cut-based $H \\rightarrow ZZ \\rightarrow llqq$ analysis of the ATLAS experiment. Preliminary but satisfactory results have been obtained online.

  14. Computer code for double beta decay QRPA based calculations

    E-Print Network [OSTI]

    Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

    the experimental bound [11] on neutrinoless double beta decay (## 0# ). The only way out would be to have two

  15. Neutrinoless Double Beta Decay and Physics Beyond the Standard Model

    E-Print Network [OSTI]

    Frank F. Deppisch; Martin Hirsch; Heinrich Päs

    2012-08-03

    Neutrinoless double beta decay is the most powerful tool to probe not only for Majorana neutrino masses but for lepton number violating physics in general. We discuss relations between lepton number violation, double beta decay and neutrino mass, review a general Lorentz invariant parametrization of the double beta decay rate, highlight a number of different new physics models showing how different mechanisms can trigger double beta decay, and finally discuss possibilities to discriminate and test these models and mechanisms in complementary experiments.

  16. Sensitivity of CUORE to Neutrinoless Double-Beta Decay

    E-Print Network [OSTI]

    Alessandria, F.

    2013-01-01

    of CUORE to Neutrinoless Double-Beta Decay b c,:L d e f F .s t results on neutrinoless double beta decay of T e w i t hthe study of neutrinoless double beta decay, J . C r y s t .

  17. The Majorana Neutrinoless Double-Beta Decay Experiment

    E-Print Network [OSTI]

    Washington at Seattle, University of - Department of Physics, Electroweak Interaction Research Group

    The Majorana Neutrinoless Double-Beta Decay Experiment Pre-conceptual Design Proposal November 22 Motivation for Neutrinoless Double-Beta Decay Experiments . . . . . . . . . 4 2.1.1 Community Guidance Neutrinoless Double-Beta Decay Results . . . . . . . . . . . . . . . . . . . . 12 2.5 Next

  18. Double pulse Thomson scattering system at RTP

    SciTech Connect (OSTI)

    Beurskens, M.N.; Barth, C.J.; Chu, C.C.; Donne, A.J.; Herranz, J.A.; Lopes Cardozo, N.J.; van der Meiden, H.J.; Pijper, F.J. [FOM-Instituut voor Plasmafysica `Rijnhuizen`, Associatie Euratom-FOM, 3430 BE Nieuwegein (The Netherlands)] [FOM-Instituut voor Plasmafysica `Rijnhuizen`, Associatie Euratom-FOM, 3430 BE Nieuwegein (The Netherlands)

    1997-01-01

    In this article a double pulse multiposition Thomson scattering diagnostic, under construction at RTP, is discussed. Light from a double pulsed ruby laser (pulse separation: 10{endash}800 {mu}s, max. 2{times}12.5 J) is scattered by the free electrons of the tokamak plasma and relayed to a Littrow polychromator for spectral analysis. The spectrally resolved light is recorded by two ICCD detectors. Simulations show that the system sensitivity will be such that electron temperatures in the range of 100 eV{endash}7 keV can be determined with an accuracy as good as 2{percent}{endash}3{percent} for electron densities of 10{sup 20} m{sup {minus}3}, with a spatial resolution down to 2.6 mm. With this diagnostic the dynamics of small scale structures in the electron temperature profile will be studied. {copyright} {ital 1997 American Institute of Physics.}

  19. JUNO and Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    Shao-Feng Ge; Werner Rodejohann

    2015-07-20

    We study the impact of the precision determination of oscillation parameters in the JUNO experiment on half-life predictions for neutrinoless double beta decay. We show that the solar neutrino mixing angle can be measured by JUNO with below 1% uncertainty. This implies in particular that the minimal value of the effective mass in the inverted mass ordering will be known essentially without uncertainty. We demonstrate that this reduces the range of half-life predictions in order to test this value by a factor of two. The remaining uncertainty is caused by nuclear matrix elements. This has important consequences for future double beta decay experiments that aim at ruling out the inverted mass ordering or the Majorana nature of neutrinos.

  20. Fermion Doubling in Loop Quantum Gravity

    E-Print Network [OSTI]

    Jacob Barnett; Lee Smolin

    2015-07-05

    In this paper, we show that the Hamiltonian approach to loop quantum gravity has a fermion doubling problem. To obtain this result, we couple loop quantum gravity to a free massless scalar and a chiral fermion field, gauge fixing the many fingered time gauge invariance by interpreting the scalar field as a physical clock. We expand around a quantum gravity state based on a regular lattice and consider the limit where the bare cosmological constant is large but the fermonic excitations have energies low in Planck units. We then make the case for identifying the energy spectrum in this approximation with that of a model of lattice fermion theory which is known to double.

  1. Importance of neutrinoless double beta decay

    E-Print Network [OSTI]

    Utpal Sarkar

    2007-12-17

    A natural explanation for the smallness of the neutrino mass requires them to be Majorana particles violating lepton number by two units. Since lepton number violation can have several interesting consequences in particle physics and cosmology, it is of utmost importance to find out if there is lepton number violation in nature and what is its magnitude. The neutrinoless double beta decay experiment can answer these questions: if there is lepton number violation and if neutrinos are Majorana particles. In addition, the magnitude of neutrinoless double beta decay will constrain any other lepton number violating processes. This lepton number violation may also be relatd to the matter-antimatter asymmetry of the universe, dark matter and cosmological constant.

  2. JUNO and Neutrinoless Double Beta Decay

    E-Print Network [OSTI]

    Ge, Shao-Feng

    2015-01-01

    We study the impact of the precision determination of oscillation parameters in the JUNO experiment on half-life predictions for neutrinoless double beta decay. We show that the solar neutrino mixing angle can be measured by JUNO with below 1% uncertainty. This implies in particular that the minimal value of the effective mass in the inverted mass ordering will be known essentially without uncertainty. We demonstrate that this reduces the range of half-life predictions in order to test this value by a factor of two. The remaining uncertainty is caused by nuclear matrix elements. This has important consequences for future double beta decay experiments that aim at ruling out the inverted mass ordering or the Majorana nature of neutrinos.

  3. Recombination energy in double white dwarf formation

    E-Print Network [OSTI]

    Nandez, Jose L A; Lombardi, James C

    2015-01-01

    In this Letter we investigate the role of recombination energy during a common envelope event. We confirm that taking this energy into account helps to avoid the formation of the circumbinary envelope commonly found in previous studies. For the first time, we can model a complete common envelope event, with a clean compact double white dwarf binary system formed at the end. The resulting binary orbit is almost perfectly circular. In addition to considering recombination energy, we also show that between 1/4 and 1/2 of the released orbital energy is taken away by the ejected material. We apply this new method to the case of the double-white dwarf system WD 1101+364, and we find that the progenitor system at the start of the common envelope event consisted of a $\\sim1.5M_\\odot$ red giant star in a $\\sim 30$ day orbit with a white dwarf companion.

  4. Simulation of Double-Pulse Laser Ablation

    SciTech Connect (OSTI)

    Povarnitsyn, Mikhail E.; Khishchenko, Konstantin V.; Levashov, Pavel R. [Joint Institute for High Temperatures of RAS, Izhorskaya 13 Bldg 2, Moscow, 125412 (Russian Federation); Itina, Tatian E. [Laboratoire Hubert Curien, UMR CNRS 5516, 18 rue Benoit Lauras, Bat. F, 42000, St-Etienne (France)

    2010-10-08

    We investigate the physical reasons of a strange decrease in the ablation depth observed in femtosecond double-pulse experiments with increasing delay between the pulses. Two ultrashort pulses of the same energy produce the crater which is less than that created by a single pulse. Hydrodynamic simulation shows that the ablation mechanism is suppressed when the delay between the pulses exceeds the electron-ion relaxation time. In this case, the interaction of the second laser pulse with the expanding target material leads to the formation of the second shock wave suppressing the rarefaction wave created by the first pulse. The modeling of the double-pulse ablation for different delays between pulses confirms this explanation.

  5. Double Talk: Asturias's America in Cuculcán

    E-Print Network [OSTI]

    Unruh, Vicky

    1992-09-01

    Vicky Unruh, University of Kansas Double Talk: Asturias's America in Cuculcan^ M iguel Angel Asturias's Cuculcan, a dra- matic collage of color, sound, motion, and words, is his most overtly ethnographic play, and, as a product of his... vanguardist years, it is also the most radically experimental. Cuculcan did not appear in print until 1948,2 but Asturias de- scribed the work in progress in a 1932 journalis- tic essay, "Las posibilidades de un teatro americano."3 Although both Cuculcan...

  6. Double-clad nuclear fuel safety rod

    DOE Patents [OSTI]

    McCarthy, William H. (Los Altos, CA); Atcheson, Donald B. (Cupertino, CA); Vaidyanathan, Swaminathan (San Jose, CA)

    1984-01-01

    A device for shutting down a nuclear reactor during an undercooling or overpower event, whether or not the reactor's scram system operates properly. This is accomplished by double-clad fuel safety rods positioned at various locations throughout the reactor core, wherein melting of a secondary internal cladding of the rod allows the fuel column therein to shift from the reactor core to place the reactor in a subcritical condition.

  7. Neutrinoless Double Beta Decay and its "Inverse"

    E-Print Network [OSTI]

    Clemens A. Heusch; Peter Minkowski

    1996-11-18

    Recent considerations by these authors pointed out the attractive features which a search for the exchange of heavy Majorana neutrinos could have for solving the mass and the lepton number puzzles for all neutrinos, in TeV-level electron-electron scattering. In the present note, we show that, contrary to subsequently published arguments, non-observation of neutrinoless double beta decay has, to date, no bearing on the promise of this important task for future linear electron colliders.

  8. Tetraquark Production in Double Parton Scattering

    E-Print Network [OSTI]

    F. Carvalho; E. R. Cazaroto; V. P. Gonçalves; F. S. Navarra

    2015-11-23

    We develop a model to study tetraquark production in hadronic collisions. We focus on double parton scattering and formulate a version of the color evaporation model for the production of the $X(3872)$ and of the $T_{4c}$ tetraquark, a state composed by the $c \\bar{c} c \\bar{c}$ quarks. We find that the production cross section grows rapidly with the collision energy $\\sqrt{s}$ and make predictions for the forthcoming higher energy data of the LHC.

  9. Neutrinoless Double Beta Decay in Particle Physics

    E-Print Network [OSTI]

    Werner Rodejohann

    2010-11-22

    Neutrinoless double beta decay is a process of fundamental importance for particle physics. It can be mediated by light massive Majorana neutrinos (standard interpretation) or by something else (non-standard interpretations). We review its dependence on the neutrino parameters, its complementarity to other observables sensitive to neutrino mass, and emphasize its ability to distinguish different neutrino mass models. Then we discuss mechanisms different from light Majorana neutrino exchange, and show what can be learned from those and how they could be tested.

  10. Vibration of Generalized Double Well Oscillators

    E-Print Network [OSTI]

    Grzegorz Litak; Marek Borowiec; Arkadiusz Syta

    2006-10-20

    We have applied the Melnikov criterion to examine a global homoclinic bifurcation and transition to chaos in a case of a double well dynamical system with a nonlinear fractional damping term and external excitation. The usual double well Duffing potential having a negative square term and positive quartic term has been generalized to a double well potential with a negative square term and a positive one with an arbitrary real exponent $q > 2$. We have also used a fractional damping term with an arbitrary power $p$ applied to velocity which enables one to cover a wide range of realistic damping factors: from dry friction $p \\to 0$ to turbulent resistance phenomena $p=2$. Using perturbation methods we have found a critical forcing amplitude $\\mu_c$ above which the system may behave chaotically. Our results show that the vibrating system is less stable in transition to chaos for smaller $p$ satisfying an exponential scaling low. The critical amplitude $\\mu_c$ as an exponential function of $p$. The analytical results have been illustrated by numerical simulations using standard nonlinear tools such as Poincare maps and the maximal Lyapunov exponent. As usual for chosen system parameters we have identified a chaotic motion above the critical Melnikov amplitude $\\mu_c$.

  11. A background free double beta decay experiment

    E-Print Network [OSTI]

    Ioannis Giomataris

    2010-12-20

    We present a new detection scheme for rejecting backgrounds in neutrino less double beta decay experiments. It relies on the detection of Cherenkov light emitted by electrons in the MeV region. The momentum threshold is tuned to reach a good discrimination between background and good events. We consider many detector concepts and a range of target materials. The most promising is a high-pressure 136Xe emitter for which the required energy threshold is easily adjusted. Combination of this concept and a high pressure Time Projection Chamber could provide an optimal solution. A simple and low cost effective solution is to use the Spherical Proportional Counter that provides two delayed signals from ionization and Cherenkov light. In solid-state double beta decay emitters, because of their higher density, the considered process is out of energy range. An alternative solution could be the development of double decay emitters with lower density by using for instance the aerogel technique. It is surprising that a technology used for particle identification in high-energy physics becomes a powerful tool for rejecting backgrounds in such low-energy experiments.

  12. Double beta decays of {sup 106}Cd

    SciTech Connect (OSTI)

    Suhonen, Jouni [Department of Physics, P.O. Box 35 (YFL), FI-40014 University of Jyvaeskylae (Finland)

    2011-12-16

    The two-neutrino (2{nu}2{beta}) and neutrinoless (0{nu}2{beta}) double beta decays of {sup 106}Cd are studied for the transitions to the ground state 0{sub gs}{sup +} and 0{sup +} and 2{sup +} excited states in {sup 106}Pd by using realistic many-body wave functions calculated in the framework of the quasiparticle random-phase approximation. Effective, G-matrix-derived nuclear forces are used in realistic single-particle model spaces. All the possible channels, {beta}{sup +}{beta}{sup +}, {beta}{sup +}EC, and ECEC, are discussed for both the 2{nu}2{beta} and 0{nu}2{beta} decays. The associated half-lives are computed and particular attention is devoted to the study of the detectability of the resonant neutrinoless double electron capture (R0{nu}ECEC) process in {sup 106}Cd. The calculations of the present article constitute the thus far most complete and up-to-date investigation of the double-beta-decay properties of {sup 106}Cd.

  13. Double-Difference Tomography for Sequestration MVA

    SciTech Connect (OSTI)

    Westman, Erik

    2008-12-31

    Analysis of synthetic data was performed to determine the most cost-effective tomographic monitoring system for a geologic carbon sequestration injection site. Double-difference tomographic inversion was performed on 125 synthetic data sets: five stages of CO2 plume growth, five seismic event regions, and five geophone arrays. Each resulting velocity model was compared quantitatively to its respective synthetic velocity model to determine an accuracy value. The results were examined to determine a relationship between cost and accuracy in monitoring, verification, and accounting applications using double-difference tomography. The geophone arrays with widely-varying geophone locations, both laterally and vertically, performed best. Additionally, double difference seismic tomography was performed using travel time data from a carbon sequestration site at the Aneth oil field in southeast Utah as part of a Department of Energy initiative on monitoring, verification, and accounting (MVA) of sequestered CO2. A total of 1,211 seismic events were recorded from a borehole array consisting of 22 geophones. Artificial velocity models were created to determine the ease with which different CO2 plume locations and sizes can be detected. Most likely because of the poor geophone arrangement, a low velocity zone in the Desert Creek reservoir can only be detected when regions of test site containing the highest ray path coverage are considered. MVA accuracy and precision may be improved through the use of a receiver array that provides more comprehensive ray path coverage.

  14. Exploring the Neutrinoless Double Beta Decay in the Inverted Neutrino Hierarchy with Bolometric Detectors

    E-Print Network [OSTI]

    Artusa, D. R.

    2014-01-01

    Exploring the Neutrinoless Double Beta Decay in the InvertedC. Giunti, Neutrinoless double-beta decay. A brief review,el- ements for neutrinoless double-beta decay and double-

  15. Page 300 Courses: Education: Single Subject (EDSS) Sonoma State University 2015-2016 Catalog edSS 446 LAnguAge LiterACy ACroSS tHe CurriCuLuM: MiddLe And SeCondAry

    E-Print Network [OSTI]

    Ravikumar, B.

    SS 446 LAnguAge LiterACy ACroSS tHe CurriCuLuM: MiddLe And SeCondAry SCHooL (4) Principles, methods to teaching practice in middle, junior high, and senior high schools. Emphasis on teaching/learning situationsLtiCuLturAL SettingS (12) A supervised teaching experience in a multicultural middle, junior high, or senior high

  16. Optical double-slit particle measuring system

    DOE Patents [OSTI]

    Tichenor, D.A.; Wang, J.C.F.; Hencken, K.R.

    1982-03-25

    A method for in situ measurement of particle size is described. The size information is obtained by scanning an image of the particle across a double-slit mask and observing the transmitted light. This method is useful when the particle size of primary interest is 3..mu..m and larger. The technique is well suited to applications in which the particles are non-spherical and have unknown refractive index. It is particularly well suited to high temperature environments in which the particle incandescence provides the light source.

  17. Optical double-slit particle measuring system

    DOE Patents [OSTI]

    Hencken, Kenneth R. (Pleasanton, CA); Tichenor, Daniel A. (Freemont, CA); Wang, James C. F. (Livermore, CA)

    1984-01-01

    A method for in situ measurement of particle size is described. The size information is obtained by scanning an image of the particle across a double-slit mask and observing the transmitted light. This method is useful when the particle size of primary interest is 3 .mu.m and larger. The technique is well suited to applications in which the particles are non-spherical and have unknown refractive index. It is particularly well suited to high temperature environments in which the particle incandescence provides the light source.

  18. Neutrinoless double beta decay and QCD corrections

    E-Print Network [OSTI]

    Namit Mahajan

    2014-01-30

    We consider one loop QCD corrections and renormalization group running of the neutrinoless double beta decay amplitude focusing on the short-range part of the amplitude (without the light neutrino exchange) and find that these corrections can be sizeable. Depending on the operator under consideration, there can be moderate to large cancellations or significant enhancements. We discuss several specific examples in this context. Such large corrections will lead to significant shifts in the half-life estimates which currently are known to be plagued with the uncertainties due to nuclear physics inputs to the physical matrix elements.

  19. Neutrinoless double beta decay and neutrino masses

    SciTech Connect (OSTI)

    Duerr, Michael [Max-Planck-Institut fuer Kernphysik, Saupfercheckweg 1, 69117 Heidelberg (Germany)

    2012-07-27

    Neutrinoless double beta decay (0{nu}{beta}{beta}) is a promising test for lepton number violating physics beyond the standard model (SM) of particle physics. There is a deep connection between this decay and the phenomenon of neutrino masses. In particular, we will discuss the relation between 0{nu}{beta}{beta} and Majorana neutrino masses provided by the so-called Schechter-Valle theorem in a quantitative way. Furthermore, we will present an experimental cross check to discriminate 0{nu}{beta}{beta} from unknown nuclear background using only one isotope, i.e., within one experiment.

  20. NGC 4340: Double Bar + Fossil Nuclear Ring

    E-Print Network [OSTI]

    P. Erwin; J. C. Vega Beltran; J. E. Beckman

    2000-10-03

    NGC 4340 is a double-barred SB0 galaxy in the Virgo cluster (Wozniak et al. 1995). Here, we present evidence that this galaxy also posseses a luminous stellar nuclear ring of relatively old stars with little or no gas. The ring lies just outside the inner bar, at the probable inner inner Lindblad resonance (IILR) of the outer bar. Careful inspection of the isophotes and unsharp masks shows that the two bars are slightly misaligned, which suggests they may be independently rotating.

  1. Double acting stirling engine phase control

    SciTech Connect (OSTI)

    Berchowitz, David M.

    1983-01-01

    A mechanical device for effecting a phase change between the expansion and compression volumes of a double-acting Stirling engine uses helical elements which produce opposite rotation of a pair of crankpins when a control rod is moved, so the phase between two pairs of pistons is changed by +.psi. and the phase between the other two pairs of pistons is changed by -.psi.. The phase can change beyond .psi.=90.degree. at which regenerative braking and then reversal of engine rotation occurs.

  2. The double contact nature of TT Herculis

    SciTech Connect (OSTI)

    Terrell, Dirk; Nelson, Robert H. E-mail: bob.nelson@shaw.ca

    2014-03-01

    We present new radial velocities and photometry of the short-period Algol TT Herculis. Previous attempts to model the light curves of the system have met with limited success, primarily because of the lack of a reliable mass ratio. Our spectroscopic observations are the first to result in radial velocities for the secondary star, and thus provide a spectroscopic mass ratio. Simultaneous analysis of the radial velocities and new photometry shows that the system is a double contact binary, with a rapidly rotating primary that fills its limiting lobe.

  3. A Microscopic Double-Slit Experiment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionAA Microscopic Double-Slit

  4. A Microscopic Double-Slit Experiment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionAA Microscopic Double-SlitA

  5. A Microscopic Double-Slit Experiment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionAA Microscopic Double-SlitAA

  6. A Microscopic Double-Slit Experiment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionAA Microscopic Double-SlitAAA

  7. Double Coil Condenser Apparatus - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalentLaboratory |Sector Full reportTown2008DonaldEnergyDouble

  8. Double Field Theory on Group Manifolds (Thesis)

    E-Print Network [OSTI]

    Hassler, Falk

    2015-01-01

    This thesis deals with Double Field Theory (DFT), an effective field theory capturing the low energy dynamics of closed strings on a torus. It renders T-duality on a torus manifest by adding $D$ winding coordinates in addition to the $D$ space time coordinates. An essential consistency constraint of the theory, the strong constraint, only allows for field configurations which depend on half of the coordinates of the arising doubled space. I derive DFT${}_\\mathrm{WZW}$, a generalization of the current formalism. It captures the low energy dynamics of a closed bosonic string propagating on a compact group manifold. Its classical action and the corresponding gauge transformations arise from Closed String Field Theory up to cubic order in the massless fields. These results are rewritten in terms of a generalized metric and extended to all orders in the fields. There is an explicit distinction between background and fluctuations. For the gauge algebra to close, the latter have to fulfill a modified strong constrai...

  9. Double parton scattering at high energies

    E-Print Network [OSTI]

    Antoni Szczurek

    2015-04-24

    We discuss a few examples of rich newly developing field of double parton scattering. We start our presentation from production of two pairs of charm quark-antiquark and argue that it is the golden reaction to study the double parton scattering effects. In addition to the DPS we consider briefly also mechanism of single parton scattering and show that it gives much smaller contribution to the $c \\bar c c \\bar c$ final state. Next we discuss a perturbative parton-splitting mechanism which should be included in addition to the conventional DPS mechanism. We show that the presence of this mechanism unavoidably leads to collision energy and other kinematical variables dependence of so-called $\\sigma_{eff}$ parameter being extracted from different experiments. Next we briefly discuss production of four jets. We concentrate on estimation of the contribution of DPS for jets remote in rapidity. Understanding of this contribution is very important in the context of searches for BFKL effects known under the the name Mueller-Navelet jets. We discuss the situation in a more general context. Finally we briefly mention about DPS effects in production of $W^+ W^-$. Outlook closes the presentation.

  10. Renormalization of a Lorentz invariant doubled worldsheet theory

    E-Print Network [OSTI]

    Nibbelink, Stefan Groot; Patalong, Peter

    2013-01-01

    Manifestly T-duality covariant worldsheet string models can be constructed by doubling the coordinate fields. We describe the underlying gauge symmetry of a recently proposed Lorentz invariant doubled worldsheet theory that makes half of the worldsheet degrees of freedom redundant. By shifting the Lagrange multiplier, that enforces the gauge fixing condition, the worldsheet action can be cast into various guises. We investigate the renormalization of this theory using a non-linear background/quantum split by employing a normal coordinate expansion adapted to the gauge-fixed theory. The propagator of the doubled coordinates contains a projection operator encoding that half of them do not propagate. We determine the doubled target space equations of motion by requiring one-loop Weyl invariance. Some of them are generalizations of the conventional sigma model beta-functions, while others seem to be novel to the doubled theory: In particular, a dilaton equation seems related to the strong constraint of double fie...

  11. Neutrinoless double beta decay search with the NEMO 3 experiment

    E-Print Network [OSTI]

    Irina Nasteva; for the NEMO 3 Collaboration

    2008-10-03

    The NEMO 3 experiment searches for neutrinoless double beta decay and makes precision measurements of two-neutrino double beta decay in seven isotopes. The latest two-neutrino half-life results are presented, together with the limits on neutrinoless half-lives and the corresponding effective Majorana neutrino masses. Also given are the limits obtained on neutrinoless double beta decay mediated by Rp-violating SUSY, right-hand currents and different Majoron emission modes.

  12. Neutrinoless double beta decay search with the NEMO 3 experiment

    SciTech Connect (OSTI)

    Nasteva, Irina [Particle Physics Group, School of Physics and Astronomy, University of Manchester, Manchester, M13 9PL (United Kingdom)

    2008-11-23

    The NEMO 3 experiment searches for neutrinoless double beta decay and makes precision measurements of two-neutrino double beta decay in seven isotopes. The latest two-neutrino half-life results are presented, together with the limits on neutrinoless half-lives and the corresponding effective Majorana neutrino masses. Also given are the limits obtained on neutrinoless double beta decay mediated by R{sub p}-violating SUSY, right-hand currents and different Majoron emission modes.

  13. Search for neutrinoless double beta decay with NEMO 3 experiment

    E-Print Network [OSTI]

    Zornitza Daraktchieva

    2009-01-18

    NEMO 3 experiment is designed to search for neutrinoless double beta decay. It is located in the Modane Underground Laboratory (LSM) and has been taking data since February 2003. The half- lives of two neutrino beta decay have been measured for seven isotopes. No evidence of neutrinoless double beta decay has been found. The limits on both the half-lives of the neutrinoless double beta decay and the corresponding Majorana effective masses are derived

  14. Neutrinoless Double Beta Decay in Supersymmetric Seesaw model

    E-Print Network [OSTI]

    Tai-Fu Feng; Xue-Qian Li; Yan-An Luo

    2002-09-26

    Inspired by the recent HEIDELBERG-MOSCOW double beta decay experiment, we discuss the neutrinoless double beta decay in the supersymmetric seesaw model. Our numerical analysis indicates that we can naturally explain the data of the observed neutrinoless double beta decay, as well as that of the solar and atmospheric neutrino experiments with at least one Majorana-like sneutrino of middle energy scale in the model.

  15. Radiochemical tracers as a mix diagnostic for the ignition double...

    Office of Scientific and Technical Information (OSTI)

    for the ignition double-shell capsule One of the most important challenges confronting laser-driven capsule implosion experiments will be a quantitative evaluation of the...

  16. Majorana Neutrino Masses from Neutrinoless Double Beta Decay and Cosmology

    E-Print Network [OSTI]

    V. Barger; K. Whisnant

    1999-04-08

    When three Majorana neutrinos describe the solar and atmospheric neutrino data via oscillations, a nonzero measurement of neutrinoless double beta ($0\

  17. Neutrinoless double beta decay can constrain neutrino dark matter

    E-Print Network [OSTI]

    V. Barger; S. L. Glashow; D. Marfatia; K. Whisnant

    2002-02-26

    We examine how constraints can be placed on the neutrino component of dark matter by an accurate measurement of neutrinoless double beta ($0\

  18. 75 years of double beta decay: yesterday, today and tomorrow

    E-Print Network [OSTI]

    A. S. Barabash

    2011-01-24

    In this report I will briefly review the motivation and history of double beta decay search since the first consideration of two neutrino process (2$\\beta(2\

  19. DUF6 Project Doubles Production in 2013 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    year 2013 goal by converting 13,679 metric tons of depleted uranium hexafluoride (DUF6), more than doubling production a year earlier. EM's Portsmouth Paducah Project Office...

  20. Neutron Interactions in the CUORE Neutrinoless Double Beta Decay...

    Office of Scientific and Technical Information (OSTI)

    Interactions in the CUORE Neutrinoless Double Beta Decay Experiment Dolinski, M J 72 PHYSICS OF ELEMENTARY PARTICLES AND FIELDS; 73 NUCLEAR PHYSICS AND RADIATION PHYSICS;...

  1. The MAJORANA DEMONSTRATOR: A Search for Neutrinoless Double-beta...

    Office of Scientific and Technical Information (OSTI)

    Conference: The MAJORANA DEMONSTRATOR: A Search for Neutrinoless Double-beta Decay of Germanium-76 Citation Details In-Document Search Title: The MAJORANA DEMONSTRATOR: A Search...

  2. Full Quantum Theory of ${C_{60}}$ Double-slit Diffraction

    E-Print Network [OSTI]

    Xiang-Yao Wu; Ji Ma; Bo-Jun Zhang; Hong Li; Xiao-Jing Liu; Nuo Ba; Si-Qi Zhang; Jing Wang; He Dong; Xin-Guo Yin

    2013-05-10

    In this paper, we apply the full new method of quantum theory to study the double-slit diffraction of ${C_{60}}$ molecules. We calculate the double-slit wave functions of ${C_{60}}$ molecules by Schr\\"{o}dinger equation, and calculate the diffraction wave function behind the slits with the Feynman path integral quantum theory, and then give the relation between the diffraction intensity of double-slit and diffraction pattern position. We compare the calculation results with two different double-slit diffraction experiments. When the decoherence effects are considered, the calculation results are in good agreement with the two experimental data.

  3. Systematics of quarkonium production at the LHC and double parton...

    Office of Scientific and Technical Information (OSTI)

    Systematics of quarkonium production at the LHC and double parton fragmentation Citation Details In-Document Search Title: Systematics of quarkonium production at the LHC and...

  4. Half-lives of Double $?^+$-decay with Two Neutrinos

    E-Print Network [OSTI]

    Yuejiao Ren; Zhongzhou Ren

    2015-01-07

    Nuclear double $\\beta ^-$-decays with two neutrinos were observed for many years and a systematic law describing the relation between their half-lives and decay energies was also proposed recently [Phys. Rev. C89, 064603 (2014)]. However, double $\\beta ^+$-decay ($\\beta ^+\\beta^+)$ with emission of both two positrons and two neutrinos has not been observed up to date. In this article, we perform a systematic analysis on the candidates of double $\\beta ^+$-decay, based on the 2012 nuclear mass table. Eight nuclei are found to be the good candidates for double $\\beta ^+$-decay and their half-lives are predicted according to the generalization of the systematic law to double $\\beta ^+$-decay. As far as we know, there is no theoretical result on double $\\beta ^+$-decay of nucleus $^{154}Dy$ and our result is the first prediction on this nucleus. This is also the first complete research on eight double $\\beta ^+$-decay candidates based on the available data of nuclear masses. It is expected that the calculated half-lives of double $\\beta ^+$-decay in this article will be useful for future experimental search of double $\\beta ^+$-decay.

  5. Double-Slit Experiments with Microwave Billiards

    E-Print Network [OSTI]

    S. Bittner; B. Dietz; M. Miski-Oglu; P. Oria Iriarte; A. Richter; F. Schäfer

    2011-07-27

    Single and double-slit experiments are performed with two microwave billiards with the shapes of a rectangle, respectively, a quarter stadium. The classical dynamics of the former is regular, that of the latter is chaotic. Microwaves can leave the billiards via slits in the boundary, forming interference patterns on a screen. The aim is to determine the effect of the billiard dynamics on their structure. For this the development of a method for the construction of a directed wave packet by means of an array of multiple antennas was crucial. The interference patterns show a sensitive dependence not only on the billiard dynamics but also on the initial position and direction of the wave packet.

  6. Correlations and the neutrinoless double beta decay

    SciTech Connect (OSTI)

    Menendez, J.; Poves, A. [Departamento de Fisica Teorica, and IFT, UAM-CSIC, Universidad Autonoma de Madrid, 28049-Madrid (Spain); Caurier, E.; Nowacki, F. [IPHC, IN2P3-CNRS/Universite Louis Pasteur, 67037-Strasbourg (France)

    2009-11-09

    We explore the influence of the deformation on the nuclear matrix elements of the neutrinoless double beta decay (NME), concluding that the difference in deformation -or more generally on the amount of quadrupole correlations- between parent and grand daughter nuclei quenchs strongly the decay. We discuss how varies the nuclear matrix element of {sup 76}Ge decay when the wave functions of the two nuclei involved in the transition are constrained to reproduce the experimental occupancies. In the Interacting Shell Model description the value of the NME is enhanced about 15% compared to previous calculations, whereas in the QRPA the NME's are reduced by 20%-30%, thus, the discrepancies between both approaches diminish.

  7. Neutrinoless Double Beta Decay with SNO+

    E-Print Network [OSTI]

    J. Hartnell; for the SNO+ collaboration

    2012-01-30

    SNO+ will search for neutrinoless double beta decay by loading 780 tonnes of linear alkylbenzene liquid scintillator with O(tonne) of neodymium. Using natural Nd at 0.1% loading will provide 43.7 kg of 150Nd given its 5.6% abundance and allow the experiment to reach a sensitivity to the effective neutrino mass of 100-200 meV at 90% C.L in a 3 year run. The SNO+ detector has ultra low backgrounds with 7000 tonnes of water shielding and self-shielding of the scintillator. Distillation and several other purification techniques will be used with the aim of achieving Borexino levels of backgrounds. The experiment is fully funded and data taking with light-water will commence in 2012 with scintillator data following in 2013.

  8. Double beta decay and neutrino mass models

    E-Print Network [OSTI]

    Helo, J C; Ota, T; Santos, F A Pereira dos

    2015-01-01

    Neutrinoless double beta decay allows to constrain lepton number violating extensions of the standard model. If neutrinos are Majorana particles, the mass mechanism will always contribute to the decay rate, however, it is not a priori guaranteed to be the dominant contribution in all models. Here, we discuss whether the mass mechanism dominates or not from the theory point of view. We classify all possible (scalar-mediated) short-range contributions to the decay rate according to the loop level, at which the corresponding models will generate Majorana neutrino masses, and discuss the expected relative size of the different contributions to the decay rate in each class. We also work out the phenomenology of one concrete 2-loop model in which both, mass mechanism and short-range diagram, might lead to competitive contributions, in some detail.

  9. Double Shell Tank (DST) Utilities Specification

    SciTech Connect (OSTI)

    SUSIENE, W.T.

    2000-04-27

    This specification establishes the performance requirements and provides the references to the requisite codes and standards to he applied during the design of the Double-Shell Tank (DST) Utilities Subsystems that support the first phase of waste feed delivery (WFD). The DST Utilities Subsystems provide electrical power, raw/potable water, and service/instrument air to the equipment and structures used to transfer low-activity waste (LAW) and high-level waste (HLW) to designated DST staging tanks. The DST Utilities Subsystems also support the equipment and structures used to deliver blended LAW and HLW feed from these staging tanks to the River Protection Project (RPP) Privatization Contractor facility where the waste will be immobilized. This specification is intended to be the basis for new projects/installations. This specification is not intended to retroactively affect previously established project design criteria without specific direction by the program.

  10. Double-rotor rotary engine and turbine

    SciTech Connect (OSTI)

    Lin, A.S.

    1990-04-03

    This patent describes a double-rotor engine. It comprises: a base; a housing rotatably mounted to the base and forming a radial cylinder; an output shaft rotatably mounted concentric with the housing and having an arm rigidly extending therefrom within the housing; a piston slidingly engaging the cylinder and forming a combustion chamber with the cylinder; means for admitting a fuel-air mixture into the cylinder; means for releasing combustion products from the cylinder following operation of the expanding means; turbine means operatively connected between the base and the housing, the turbine means providing a torque reaction against the housing in response to flow of the combustion products from the releasing means; and stop means on the shaft for limiting the relative movement between the shaft and the housing.

  11. Heterotic $?$'-corrections in Double Field Theory

    E-Print Network [OSTI]

    Oscar A. Bedoya; Diego Marques; Carmen Nunez

    2014-12-15

    We extend the generalized flux formulation of Double Field Theory to include all the first order bosonic contributions to the $\\alpha '$ expansion of the heterotic string low energy effective theory. The generalized tangent space and duality group are enhanced by $\\alpha'$ corrections, and the gauge symmetries are generated by the usual (gauged) generalized Lie derivative in the extended space. The generalized frame receives derivative corrections through the spin connection with torsion, which is incorporated as a new degree of freedom in the extended bein. We compute the generalized fluxes and find the Riemann curvature tensor with torsion as one of their components. All the four-derivative terms of the action, Bianchi identities and equations of motion are reproduced. Using this formalism, we obtain the first order $\\alpha'$ corrections to the heterotic Buscher rules. The relation of our results to alternative formulations in the literature is discussed and future research directions are outlined.

  12. Neutrinoless Double Beta Decay in Gauge Theories

    E-Print Network [OSTI]

    J. D. Vergados

    1999-07-12

    Neutrinoless double beta decay is a very important process both from the particle and nuclear physics point of view. Its observation will severely constrain the existing models and signal that the neutrinos are massive Majorana particles. From the elementary particle point of view it pops up in almost every model. In addition to the traditional mechanisms, like the neutrino mass, the admixture of right handed currents etc, it may occur due to the R-parity violating supersymmetric (SUSY) interactions. From the nuclear physics point of view it is challenging, because: 1) The relevant nuclei have complicated nuclear structure. 2) The energetically allowed transitions are exhaust a small part of all the strength. 3) One must cope with the short distance behavior of the transition operators, especially when the intermediate particles are heavy (eg in SUSY models). Thus novel effects, like the double beta decay of pions in flight between nucleons, have to be considered. 4) The intermediate momenta involved are about 100 MeV. Thus one has to take into account possible momentum dependent terms in the nucleon current. We find that, for the mass mechanism, such modifications of the nucleon current for light neutrinos reduce the nuclear matrix elements by about 25 per cent, almost regardless of the nuclear model. In the case of heavy neutrinos the effect is much larger and model dependent. Taking the above effects into account, the available nuclear matrix elements for the experimentally interesting nuclei A = 76, 82, 96, 100, 116, 128, 130, 136 and 150 and the experimental limits on the life times we have extracted new stringent limits on the average neutrino mass and on the R-parity violating coupling for various SUSY models.

  13. Double-nonlinear metamaterials Rongcao Yang1,2,a

    E-Print Network [OSTI]

    Double-nonlinear metamaterials Rongcao Yang1,2,a and Ilya V. Shadrivov1 1 Nonlinear Physics Centre 10 December 2010 We study a double-nonlinear metamaterial composed of a mixture of both nonlinear electric and nonlinear magnetic resonators. We predict multistable behavior in such metamaterial

  14. Countering Trusting Trust through Diverse Double-Compiling

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Countering Trusting Trust through Diverse Double-Compiling David A. Wheeler February 28, 2006 · Inadequate solutions & related work · Solution: Diverse double-compiling (DDC) ­ What it is ­ Why it works & broader implications 3 Trusting trust attack Compiler executable (malicious) Critical program (malicious

  15. Significant neutrinoless double beta decay with quasi-Dirac neutrinos

    E-Print Network [OSTI]

    Pei-Hong Gu

    2012-09-13

    A significant signal of neutrinoless double beta decay can be consistent with the existence of light quasi-Dirac neutrinos. To demonstrate this possibility, we consider a realistic model where the neutrino masses and the neutrinoless double beta decay can be simultaneously generated after a Peccei-Quinn symmetry breaking.

  16. Designing Truthful Spectrum Double Auctions with Local Markets

    E-Print Network [OSTI]

    Li, Baochun

    Designing Truthful Spectrum Double Auctions with Local Markets Wei Wang, Student Member, IEEE, Ben pieces in the market. We design a spectrum double auction that incorporates such locality in spectrum markets, while keeping the auction economically robust and computationally efficient. Our designs

  17. Maximal Matching for Double Auction Dengji Zhao1,2

    E-Print Network [OSTI]

    Zhang, Dongmo

    the problem of mechanism design for a double auc- tion market where multiple buyers and sellers buy and sell Design) platform, we show with experiments that the new matching method not only increases market price). Similar to the design of other market mechanisms, the main concerns of double auction design

  18. DoubleSpeed Safe Prime Generation David Naccache

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    prime generation is thus divided by two at the cost of generating primes of size k or k + 1 with equalDouble­Speed Safe Prime Generation David Naccache Gemplus Card International Applied Research method for doubling the speed of safe prime generation. The method is particularly suited to settings

  19. Double-Speed Safe Prime Generation David Naccache

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    at the cost of generating primes of size k or k + 1 with equal probability. The generation of RSA moduliDouble-Speed Safe Prime Generation David Naccache Gemplus Card International Applied Research method for doubling the speed of safe prime generation. The method is particularly suited to settings

  20. technology offer HPC/UHPC double wall elements

    E-Print Network [OSTI]

    Arnold, Anton

    buildings and towers like wind turbines, power plants or cooling towers. Fig. 1: UHPC double wall element to 20-45 mm in an easy and cost efficient way. Background Double wall elements are precast reinforced · Savings in material and weight · Savings in transport and crane costs · Dense structure of the precast

  1. Matched slow pulses using double electromagnetically induced transparency

    E-Print Network [OSTI]

    Lvovsky, Alexander

    Matched slow pulses using double electromagnetically induced transparency Andrew MacRae,* Geoff, 2008 We implement double electromagnetically induced transparency (DEIT) in rubidium vapor using Optical Society of America OCIS codes: 270.1670, 270.5585, 190.5530. Electromagnetically induced

  2. First results on neutrinoless double beta decay of Te-130 with the calorimetric cuoricino experiment

    E-Print Network [OSTI]

    2003-01-01

    Results on Neutrinoless Double Beta Decay of 130 Te with theEvidence for Neutrinoless Double Beta Decay” arXiv:hep-on “Evidence for neutrinoless double beta decay”- arXiv:hep-

  3. An Investigation and Characterization of Metal Foam Filled Double-Pipe Heat Exchangers

    E-Print Network [OSTI]

    Chen, Xi

    2014-01-01

    a metal foam filled double-pipe heat exchanger: a) Pressurein a metal foam filled double-pipe heat exchanger witha plain double-pipe heat exchanger: a) Total heat transfer

  4. Coronal electron confinement by double layers

    SciTech Connect (OSTI)

    Li, T. C.; Drake, J. F.; Swisdak, M.

    2013-12-01

    In observations of flare-heated electrons in the solar corona, a longstanding problem is the unexplained prolonged lifetime of the electrons compared to their transit time across the source. This suggests confinement. Recent particle-in-cell (PIC) simulations, which explored the transport of pre-accelerated hot electrons through ambient cold plasma, showed that the formation of a highly localized electrostatic potential drop, in the form of a double layer (DL), significantly inhibited the transport of hot electrons. The effectiveness of confinement by a DL is linked to the strength of the DL as defined by its potential drop. In this work, we investigate the scaling of the DL strength with the hot electron temperature by PIC simulations and find a linear scaling. We demonstrate that the strength is limited by the formation of parallel shocks. Based on this, we analytically determine the maximum DL strength, and also find a linear scaling with the hot electron temperature. The DL strength obtained from the analytic calculation is comparable to that from the simulations. At the maximum strength, the DL is capable of confining a significant fraction of hot electrons in the source.

  5. Double-duct liquid metal magnetohydrodynamic engine

    DOE Patents [OSTI]

    Haaland, Carsten M. (Oak Ridge, TN)

    1995-01-01

    An internal combustion, liquid metal (LM) magnetohydrodynamic (MHD) engine and an alternating current (AC) magnetohydrodynamic generator, are used in combination to provide useful AC electric energy output. The engine design has-four pistons and a double duct configuration, with each duct containing sodium potassium liquid metal confined between free pistons located at either end of the duct. The liquid metal is forced to flow back and forth in the duct by the movement of the pistons, which are alternatively driven by an internal combustion process. In the MHD generator, the two LM-MHD ducts pass in close proximity through a Hartmann duct with output transformer. AC power is produced by operating the engine with the liquid metal in the two generator ducts always flowing in counter directions. The amount of liquid metal maintained in the ducts may be varied. This provides a variable stroke length for the pistons. The engine/generator provides variable AC power at variable frequencies that correspond to the power demands of the vehicular propulsion. Also the engine should maintain nearly constant efficiency throughout the range of power usage. Automobiles and trucks could be powered by the invention, with no transmission or power converter devices being required.

  6. Double-duct liquid metal magnetohydrodynamic engine

    DOE Patents [OSTI]

    Haaland, Carsten M. (Oak Ridge, TN)

    1997-01-01

    An internal combustion, liquid metal (LM) magnetohydrodynamic (MHD) engine and an alternating current (AC) magnetohydrodynamic generator, are used in combination to provide useful AC electric energy output. The engine design has four pistons and a double duct configuration, with each duct containing sodium potassium liquid metal confined between free pistons located at either end of the duct. The liquid metal is forced to flow back and forth in the duct by the movement of the pistons, which are alternatively driven by an internal combustion process. In the MHD generator, the two LM-MHD ducts pass in close proximity through a Hartmann duct with output transformer. AC power is produced by operating the engine with the liquid metal in the two generator ducts always flowing in counter directions. The amount of liquid metal maintained in the ducts may be varied. This provides a variable stroke length for the pistons. The engine/generator provides variable AC power at variable frequencies that correspond to the power demands of the vehicular propulsion. Also the engine should maintain nearly constant efficiency throughout the range of power usage. Automobiles and trucks could be powered by the invention, with no transmission or power converter devices being required.

  7. Double Wick rotating Green-Schwarz strings

    E-Print Network [OSTI]

    Gleb Arutyunov; Stijn J. van Tongeren

    2015-05-05

    Via an appropriate field redefinition of the fermions, we find a set of conditions under which light cone gauge fixed world sheet theories of strings on two different backgrounds are related by a double Wick rotation. These conditions take the form of a set of transformation laws for the background fields, complementing a set of transformation laws for the metric and B field we found previously with a set for the dilaton and RR fields, and are compatible with the supergravity equations of motion. Our results prove that at least to second order in fermions, the AdS_5 x S^5 mirror model which plays an important role in the field of integrability in AdS/CFT, represents a string on `mirror AdS_5 x S^5', the background that follows from our transformations. We discuss analogous solutions for AdS_3 x S^3 x T^4 and AdS_2 x S^2 x T^6. The main ingredient in our derivation is the light cone gauge fixed action for a string on an (almost) completely generic background, which we explicitly derive to second order in fermions.

  8. Pionic contribution to neutrinoless double beta decay

    SciTech Connect (OSTI)

    Vergados, J. D. [Physics Department, University of Ioannina, Ioannina, GR 451 10 (Greece); Theory Division, CERN, Geneva (Switzerland); Faessler, Amand [Institute fuer Theoretische Physik, Universitaet Tuebingen (Germany); Toki, H. [RCNP, Osaka University, Osaka, 567-0047 (Japan)

    2010-02-01

    It is well known that neutrinoless double decay is going to play a crucial role in settling the neutrino properties, which cannot be extracted from the neutrino oscillation data. It is, in particular, expected to settle the absolute scale of neutrino mass and determine whether the neutrinos are Majorana particles, i.e. they coincide with their own antiparticles. In order to extract the average neutrino mass from the data, one must be able to estimate the contribution of all possible high mass intermediate particles. The latter, which occur in practically all extensions of the standard model, can, in principle, be differentiated from the usual mass term, if data from various targets are available. One, however, must first be able to reliably calculate the corresponding nuclear matrix elements. Such calculations are extremely difficult since the effective transition operators are very short ranged. For such operators processes like pionic contributions, which are usually negligible, turn out to be dominant. We study such an effect in a nonrelativistic quark model for the pion and the nucleon.

  9. Experimental research of double beta decay of atomic nuclei

    E-Print Network [OSTI]

    F. A. Danevich

    2011-12-26

    Results of several double beta decay experiments, performed with the help of low background crystal scintillators, are presented. In particular, the half-life value of the two-neutrino double beta decay of 116-Cd has been measured as 2.9 10^{19} yr, and the new half-life limit on the neutrinoless double beta decay of 116-Cd has been established as >1.7 10^{23} yr at 90%, which corresponds to a restriction on the neutrino mass <1.7 eV. New half-life bounds on the level of 10^{17}-10^{21} yr were set for double beta processes in 64-Zn, 70-Zn, 106-Cd, 108-Cd, 114-Cd, 136-Ce, 138-Ce, 142-Ce, 160-Gd, 180-W, and 186-W by using low-background CdWO4, GSO, and ZnWO4 crystal scintillators. The claim of discovery of the neutrinoless double beta decay of 76-Ge [Mod. Phys. Lett. A 16 (2001) 2409] was analyzed. The demands of the future high sensitivity double beta decay experiments, aiming to observe the neutrinoless double beta decay or to advance restrictions on the neutrino mass to < 0.01 eV, were considered. Requirements for their sensitivity and discovery potential were formulated. Two projects of double beta experiments with a sensitivity on the level of 10^{26}-10^{27} yr (CAMEO and CARVEL projects) were discussed. Scintillation properties and radioactive contamination of CaWO4, ZnWO4, CdWO4, PbWO4, GSO(Ce), CeF3, yttrium-aluminum garnet doped with neodymium (YAG:Nd) crystal scintillators were studied. Applicability of these scintillators to search for double beta decay was discussed.

  10. The classical double copy for Taub-NUT spacetime

    E-Print Network [OSTI]

    Luna, A; O'Connell, D; White, C D

    2015-01-01

    The double copy is a much-studied relationship between gauge theory and gravity amplitudes. Recently, this was generalised to an infinite family of classical solutions to Einstein's equations, namely stationary Kerr-Schild geometries. In this paper, we extend this to the Taub-NUT solution in gravity, which has a double Kerr-Schild form. The single copy of this solution is a dyon, whose electric and magnetic charges are related to the mass and NUT charge in the gravity theory. Finally, we find hints that the classical double copy extends to curved background geometries.

  11. Fabrication and Measurements of 500 MHz Double Spoke Cavity

    SciTech Connect (OSTI)

    Park, HyeKyoung; Hopper, Christopher S.; Delayen, Jean R.

    2014-12-01

    A 500 MHz ?0=1 double spoke cavity has been designed and optimized for a high velocity application such as a compact electron accelerator at the Center for Accelerator Science at Old Dominion University [1] and the fabrication was recently completed at Jefferson Lab. The geometry specific to the double spoke cavity required a variety of tooling and fixtures. Also a number of asymmetric weld joints were expected to make it difficult to maintain minimal geometric deviation from the design. This paper will report the fabrication procedure, resulting tolerance from the design, initial test results and the lessons learned from the first ?0=1 double spoke cavity fabrication.

  12. Matched Slow Pulses Using Double Electromagnetically Induced Transparency

    E-Print Network [OSTI]

    Andrew MacRae; Geoff Campbell; A. I. Lvovsky

    2008-09-29

    We implement double electromagnetically-induced transparency (double EIT) in rubidium vapor, using a tripod-shaped energy level scheme consisting of hyperfine and magnetic sublevels of the 5S1/2 to 5P1/2 transition. We show experimentally that through the use of double EIT one can control the contrast of transparency windows as well as group velocities of the two signal fields. In particular, the group velocities can be equalized, which holds promise to greatly enhance nonlinear optical interaction between these fields.

  13. Double, Double Toil and Trouble: Tungsten Burns and Helium Bubbles | U.S.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalentLaboratory |Sector FullDOE Office of Science (SC) Double,

  14. EA-1136: Double Tracks Test Site, Nye County, Nevada

    Broader source: Energy.gov [DOE]

    This EA evaluates the environmental impacts of the proposal for the U.S. Department of Energy Nevada Operations Office to conduct environmental restoration operations at the Double Tracks test site...

  15. Electrochemical Double-Layer Capacitors Using Carbon Nanotube Electrode Structures

    E-Print Network [OSTI]

    Schindall, Joel E.

    The structure and behavior of the electrical double-layer capacitor (EDLC) are described. The use of activated carbon electrodes is discussed and the limitations on voltage and accessible surface area are presented. Metrics ...

  16. Double beta decay experiments: beginning of a new era

    E-Print Network [OSTI]

    A. S. Barabash

    2012-09-19

    The review of current experiments on search and studying of double beta decay processes is done. Results of the most sensitive experiments are discussed and values of modern limits on effective Majorana neutrino mass ($) are given. New results on two neutrino double beta decay are presented. The special attention is given to new current experiments with mass of studied isotopes more than 100 kg, EXO--200 and KamLAND--Zen. These experiments open a new era in research of double beta decay. In the second part of the review prospects of search for neutrinoless double beta decay in new experiments with sensitivity to $$ at the level of $\\sim 0.01-0.1$ eV are discussed. Parameters and characteristics of the most perspective projects (CUORE, GERDA, MAJORANA, SuperNEMO, EXO, KamLAND--Zen, SNO+) are given.

  17. Evaluation of short-day onion doubled haploid lines 

    E-Print Network [OSTI]

    Walker, Ryan Lee

    2009-05-15

    Molecular marker analysis of seven putative onion (Allium cepa) doubled haploid (DH) lines developed at Texas A&M University was conducted to verify genetic homozygosity. Analysis was also conducted on five equivalent ...

  18. Comment on "Evidence for Neutrinoless Double Beta Decay"

    E-Print Network [OSTI]

    C. E. Aalseth; F. T. Avignone III; A. Barabash; F. Boehm; R. L. Brodzinski; J. I. Collar; P. J. Doe; H. Ejiri; S. R. Elliott; E. Fiorini; R. J. Gaitskell; G. Gratta; R. Hazama; K. Kazkaz; G. S. King III; R. T. Kouzes; H. S. Miley; M. K. Moe; A. Morales; J. Morales; A. Piepke; R. G. H. Robertson; W. Tornow; P. Vogel; R. A. Warner; J. F. Wilkerson

    2002-05-22

    We comment on the recent claim for the experimental observation of neutrinoless double-beta decay. We discuss several limitations in the analysis provided in that paper and conclude that there is no basis for the presented claim.

  19. Predicting an ultraviolet-tetraherz double resonance spectrum of formaldehyde

    E-Print Network [OSTI]

    Fenn, Emily E. (Emily Elizabeth)

    2006-01-01

    In preparation for performing a triple resonance experiment to study the Rydberg states of calcium monofluoride (CaF), a double resonance spectrum of formaldehyde will be recorded. A dye laser will populate a level in ...

  20. Nebraska: Company More than Doubles Annual Sales and Employees...

    Broader source: Energy.gov (indexed) [DOE]

    than doubled their employees from 119 to 269 since 2010. Leveraging its EERE-supported hydrogen storage tank development, Hexagon is now an active player in the natural gas...

  1. The gauge algebra of double field theory and Courant brackets

    E-Print Network [OSTI]

    Hull, Chris

    We investigate the symmetry algebra of the recently proposed field theory on a doubled torus that describes closed string modes on a torus with both momentum and winding. The gauge parameters are constrained fields on the ...

  2. Performance of a double pass solar air collector

    SciTech Connect (OSTI)

    Ramani, B.M.; Gupta, Akhilesh; Kumar, Ravi

    2010-11-15

    Double pass counter flow solar air collector with porous material in the second air passage is one of the important and attractive design improvement that has been proposed to improve the thermal performance. This paper presents theoretical and experimental analysis of double pass solar air collector with and without porous material. A mathematical model has been developed based on volumetric heat transfer coefficient. Effects of various parameters on the thermal performance and pressure drop characteristics have been discussed. Comparison of results reveals that the thermal efficiency of double pass solar air collector with porous absorbing material is 20-25% and 30-35% higher than that of double pass solar air collector without porous absorbing material and single pass collector respectively. (author)

  3. Band Tunneling through Double Barrier in Bilayer Graphene

    E-Print Network [OSTI]

    Hasan A. Alshehab; Hocine Bahlouli; Abderrahim El Mouhafid; Ahmed Jellal

    2014-01-20

    By taking into account the full four band energy spectrum, we calculate the transmission probability and conductance of electrons across symmetric and asymmetric double potential barrier with a confined interlayer potential difference in bilayer graphene. For energies less than the interlayer coupling \\gamma_{1}, E \\gamma_{1}, we obtain four possible ways for transmission resulting from the two propagating modes. We compute the associated transmission probabilities as well as their contribution to the conductance, study the effect of the double barrier geometry.

  4. Energy levels of double triangular graphene quantum dots

    SciTech Connect (OSTI)

    Liang, F. X.; Jiang, Z. T. Zhang, H. Y.; Li, S.; Lv, Z. T.

    2014-09-28

    We investigate theoretically the energy levels of the coupled double triangular graphene quantum dots (GQDs) based on the tight-binding Hamiltonian model. The double GQDs including the ZZ-type, ZA-type, and AA-type GQDs with the two GQDs having the zigzag or armchair boundaries can be coupled together via different interdot connections, such as the direct coupling, the chains of benzene rings, and those of carbon atoms. It is shown that the energy spectrum of the coupled double GQDs is the amalgamation of those spectra of the corresponding two isolated GQDs with the modification triggered by the interdot connections. The interdot connection is inclined to lift up the degeneracies of the energy levels in different degree, and as the connection changes from the direct coupling to the long chains, the removal of energy degeneracies is suppressed in ZZ-type and AA-type double GQDs, which indicates that the two coupled GQDs are inclined to become decoupled. Then we consider the influences on the spectra of the coupled double GQDs induced by the electric fields applied on the GQDs or the connection, which manifests as the global spectrum redistribution or the local energy level shift. Finally, we study the symmetrical and asymmetrical energy spectra of the double GQDs caused by the substrates supporting the two GQDs, clearly demonstrating how the substrates affect the double GQDs' spectrum. This research elucidates the energy spectra of the coupled double GQDs, as well as the mechanics of manipulating them by the electric field and the substrates, which would be a significant reference for designing GQD-based devices.

  5. No-neutrino double beta decay: more than one neutrino

    SciTech Connect (OSTI)

    Rosen, S.P.

    1983-01-01

    Interference effects between light and heavy Majorana neutrinos in the amplitude for no-neutrino double beta decay are discussed. The effects include an upper bound on the heavy neutrino mass, and an A dependence for the effective mass extracted from double beta decay. Thus the search for the no-neutrino decay mode should be pursued in several nuclei, and particularly in Ca/sup 48/, where the effective mass may be quite large.

  6. NEMO 3 double beta decay experiment: latest results

    E-Print Network [OSTI]

    A. S. Barabash

    2008-07-17

    The double beta decay experiment NEMO~3 has been taking data since February 2003. The aim of this experiment is to search for neutrinoless decay and investigate two neutrino double beta decay in seven different enriched isotopes ($^{100}$Mo,$^{82}$Se, $^{48}$Ca, $^{96}$Zr, $^{116}$Cd, $^{130}$Te and $^{150}$Nd). After analysis of the data corresponding to 693 days, no evidence for $0\

  7. Effect of nuclear deformation on double beta decay

    SciTech Connect (OSTI)

    Rodin, Vadim [Institute fuer Theoretische Physik der Universitaet Tuebingen, D-72076 Tuebingen (Germany)

    2009-11-09

    The existing ways of accounting for deformation in recent calculations of neutrinoless double beta decay matrix elements are discussed. From an analysis of relevant experimental data it is argued that only {sup 150}Nd reveals convincing evidences of strong static deformation, which should eventually be taken into account in QRPA calculations. A proposal which allows in principle to measure the neutrino less double beta decay Fermi matrix element is briefly described.

  8. Overconstrained estimates of neutrinoless double beta decay within the QRPA

    E-Print Network [OSTI]

    Amand Faessler; Gianluigi Fogli; Eligio Lisi; Vadim Rodin; Anna Maria Rotunno; Fedor Simkovic

    2008-05-29

    Estimates of nuclear matrix elements for neutrinoless double beta decay (0nu2beta) based on the quasiparticle random phase approximations (QRPA) are affected by theoretical uncertainties, which can be substantially reduced by fixing the unknown strength parameter g_pp of the residual particle-particle interaction through one experimental constraint - most notably through the two-neutrino double beta decay (2nu2beta) lifetime. However, it has been noted that the g_pp adjustment via 2\

  9. Deformed quantum double realization of the toric code and beyond

    E-Print Network [OSTI]

    Pramod Padmanabhan; Juan Pablo Ibieta Jimenez; Miguel Jorge Bernabé Ferreira; Paulo Teotonio-Sobrinho

    2015-12-10

    Quantum double models, such as the toric code, can be constructed from transfer matrices of lattice gauge theories with discrete gauge groups and parametrized by the center of the gauge group algebra and its dual. For general choices of these parameters the transfer matrix contains operators acting on links which can also be thought of as perturbations to the quantum double model driving it out of its topological phase and destroying the exact solvability of the quantum double model. We modify these transfer matrices with perturbations and extract exactly solvable models which remain in a quantum phase, thus nullifying the effect of the perturbation. The algebra of the modified vertex and plaquette operators now obey a deformed version of the quantum double algebra. The Abelian cases are shown to be in the quantum double phase whereas the non-Abelian phases are shown to be in a modified phase of the corresponding quantum double phase. These are illustrated with the groups $\\mathbb{Z}_n$ and $S_3$. The quantum phases are determined by studying the excitations of these systems namely their fusion rules and the statistics. We then go further to construct a transfer matrix which contains the other $\\mathbb{Z}_2$ phase namely the double semion phase. More generally for other discrete groups these transfer matrices contain the twisted quantum double models. These transfer matrices can be thought of as being obtained by introducing extra parameters into the transfer matrix of lattice gauge theories. These parameters are central elements belonging to the tensor products of the algebra and its dual and are associated to vertices and volumes of the three dimensional lattice. As in the case of the lattice gauge theories we construct the operators creating the excitations in this case and study their braiding and fusion properties.

  10. Neutrinoless Double Beta Decay with Negligible Neutrino Mass

    E-Print Network [OSTI]

    Biswajoy Brahmachari; Ernest Ma

    2002-02-27

    If the electron neutrino has an effective nonzero Majorana mass, then neutrinoless double beta decay will occur. However, the latter is possible also with a negligible neutrino mass. We show how this may happen in a simple model of scalar diquarks and dileptons. This possibility allows neutrino masses to be small and hierarchical, without conflicting with the possible experimental evidence of neutrinoless double beta decay.

  11. Possible background reductions in double beta decay experiments

    E-Print Network [OSTI]

    R. Arnold; C. Augier; J. Baker; A. Barabash; O. Bing; V. Brudanin; A. J. Caffrey; E. Caurier; K. Errahmane; A. -I. Etienvre; J. L. Guyonnet; F. Hubert; Ph. Hubert; C. Jollet; S. Jullian; O. Kochetov; V. Kovalenko; D. Lalanne; F. Leccia; C. Longuemare; Ch. Marquet; F. Mauger; H. W. Nicholson; H. Ohsumi; F. Piquemal; J-L. Reyss; X. Sarazin; Yu. Shitov; L. Simard; I. Stekl; J. Suhonen; C. S. Sutton; G. Szklarz; V. Timkin; V. Tretyak; V. Umatov; L. Vala; I. Vanyushin; V. Vasilyev; V. Vorobel; Ts. Vylov

    2003-02-19

    The background induced by radioactive impurities of $^{208}\\rm Tl$ and $^{214}\\rm Bi$ in the source of the double beta experiment NEMO-3 has been investigated. New methods of data analysis which decrease the background from the above mentioned contamination are identified. The techniques can also be applied to other double beta decay experiments capable of measuring independently the energies of the two electrons.

  12. What can we learn from neutrinoless double beta decay experiments?

    E-Print Network [OSTI]

    John N. Bahcall; Hitoshi Murayama; Carlos Pena-Garay

    2004-04-08

    We assess how well next generation neutrinoless double beta decay and normal neutrino beta decay experiments can answer four fundamental questions. 1) If neutrinoless double beta decay searches do not detect a signal, and if the spectrum is known to be inverted hierarchy, can we conclude that neutrinos are Dirac particles? 2) If neutrinoless double beta decay searches are negative and a next generation ordinary beta decay experiment detects the neutrino mass scale, can we conclude that neutrinos are Dirac particles? 3) If neutrinoless double beta decay is observed with a large neutrino mass element, what is the total mass in neutrinos? 4) If neutrinoless double beta decay is observed but next generation beta decay searches for a neutrino mass only set a mass upper limit, can we establish whether the mass hierarchy is normal or inverted? We base our answers on the expected performance of next generation neutrinoless double beta decay experiments and on simulations of the accuracy of calculations of nuclear matrix elements.

  13. 16 Das Package java.sql 16.2 Relationale Datenbanken 16-4(312) Wir werden in den folgenden Beispielen mit einer MySQL-Datenbank arbeiten. Dabei greifen wir nur auf

    E-Print Network [OSTI]

    Arndt, Holger

    16 Das Package java.sql 16.2 Relationale Datenbanken 16-4(312) Wir werden in den folgenden Beispielen mit einer MySQL-Datenbank arbeiten. Dabei greifen wir nur auf eine einzelne Tabelle personal zu am Beispiel von MySQL Alles Wichtige finden Sie in: · Hofschuster / Zimmer, Kurzanleitung zur

  14. Solving the Double Digestion Problem as a MixedInteger Linear Program \\Lambda

    E-Print Network [OSTI]

    Zhang, Yin

    Solving the Double Digestion Problem as a Mixed­Integer Linear Program \\Lambda Zhijun Wu y and Yin Zhang z August, 2001 Abstract. The double digestion problem for DNA restriction mapping is known­scale double digestion problems. Key Words. DNA sequencing, restriction mapping, double digestion, NP

  15. TOWARDS A PRECISION MEASUREMENT OF THE HALF LIFE OF NEUTRINOLESS DOUBLE BETA DECAY OF 136

    E-Print Network [OSTI]

    Gratta, Giorgio

    ). Even if debatable, a first hint came from the claimed observation of neutrinoless double beta decay

  16. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Sympo- sium on Software Testing and Analysis, ISSTA ’07,International Symposium on Software Testing and Analysis,

  17. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Optimization . . . . . . . . . . . . . . . . .annotation optimization . . . . . . . . . . . . . . . . .Opt. is the time after optimization. Anno- phos is the time

  18. Java Defensive Optimization

    E-Print Network [OSTI]

    Wang, Haoqing

    2015-01-01

    Proceedings of the 14th ACM SIGPLAN International ConferenceICFP ’09, pages 161–172, New York, NY, USA, 2009. ACM.In Proceedings of the 2Nd ACM SIGPLAN International Workshop

  19. Keyword programming in Java

    E-Print Network [OSTI]

    Little, Danny Greg

    Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

  20. Running with Java

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy MaterialsRooftopRunningRunning on