Sample records for key assumption incorporated

  1. Key Assumptions Policy Issues

    E-Print Network [OSTI]

    Supply Limitations 8 Withi h B l i8. Within-hour Balancing 9. Capacity and Energy Values for Wind · Independent Power Producers C t ti· Current assumptions · Winter: full availability ~ 3,200 MW · Summer: 1 t b it d d li d· Thermal: must be sited and licensed · Wind/solar: must be sited and licensed · EE

  2. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  4. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  5. AbstractFirst-principles models that incorporate all of the key physics that affect the internal states of a lithium-ion

    E-Print Network [OSTI]

    Subramanian, Venkat

    in real time opens up the possibility of incorporating detailed physics-based model in battery management@chbe.ubc.ca). SS is with the National Renewable Lab, Golden CO 80401 USA; (email: shriram.santhanagopalan@nrel been proposed and control-relevant studies performed to try to address these issues [10-16]. Efforts

  6. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    will be stacked three high. c. Lead used in the shielding can come from DOE inventories, and any radiological component of the lead will be negligible in the context of the radiological characteristics of the inventory containers handled as three packs 5. Hazardous Waste Facility Permit a. The HWFP will require modification b

  7. MONITORED GEOLOGIC REPOSITORY LIFE CYCLE COST ESTIMATE ASSUMPTIONS DOCUMENT

    SciTech Connect (OSTI)

    R.E. Sweeney

    2001-02-08T23:59:59.000Z

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost (LCC) estimate and schedule update incorporating information from the Viability Assessment (VA) , License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance.

  8. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    assumptions regarding technically recoverable oil resources. Inputs to these resource estimates include the USGS World Petroleum Assessment of 2000 and oil reserves...

  9. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

    E-Print Network [OSTI]

    Keinan, Alon

    Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Ran Canetti-up or public keys. Tel Aviv University, Email: Canetti@tau.ac.il Cornell University, E-Mail: huijia

  10. Optima Dock Synchronization under Different Delay Assumptions

    E-Print Network [OSTI]

    Lynch, Nancy

    Projects, National Autonomous University of Mexico (UNAM). Email: iryktvmhbitnet or anarCwatson. ibm by broadcast networks in which every message arrives to all processors at approximately the same time, message passing systems, networks, optimization, message delay assumptions, precision. Department

  11. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ; adjusted to 2012$, state construction cost index, vintage of cost estimate, scope of estimate to extent's Discussion Aeroderivative Gas Turbine Technology Proposed reference plant and assumptions Preliminary cost Robbins 2 #12;Peaking Power Plant Characteristics 6th Power Plan ($2006) Unit Size (MW) Capital Cost ($/k

  12. Supply-side Resources & Planning Assumptions

    E-Print Network [OSTI]

    - station Solar PV (from 6th Plan) 25 MW dc/20 MW net ac output using flat plate non concentrating single) ­ Storage Resource assessment data needs and applications R d f t Resources proposed for assessment Forecasts ProCost 46/19/2013 #12;6/19/2013 3 Resource data & planning assumptions Reference plant (New

  13. EVA PLANNING ASSUMPTIONS LRV TRAVERSE ASSESSMENT

    E-Print Network [OSTI]

    Rathbun, Julie A.

    VALUE. #12;ASSUMPTIONS {CONT) e METABOLIC RATES · LM OVERHEAD 1050 BTU/HR · ALSEP 1050 BTU/HR · STATION 950 BTU/HR · RIDING 550 BTU/HR #12;ACTIVITY 'METABOLIC .COMPARISON 15 ACTUAL VERSUS 16 PLANNING AVERAGE METABOLIC RATE (BTU I HR) ACTIVITY 15 ACTUAL 16 PLANNING CDR LMP LM OVERHEAD 1246 1060 '1050

  14. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01T23:59:59.000Z

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  15. CORPORATIONS APAC Tennessee Incorporated

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    Business Resources Breast Cancer Eradication Initiative Incorporated Brother International Corporation Resources Incorporated ETI Corporation Corporate and Foundation Giving The University of Memphis is grateful Family of Companies KPMG Peat Marwick LLP Knox Music Incorporated Frank Ricks/Looney Ricks Kiss Lane

  16. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  17. Incorporating Biodiversity Considerations Into Environmental...

    Energy Savers [EERE]

    Incorporating Biodiversity Considerations Into Environmental Impact Analysis Under NEPA Incorporating Biodiversity Considerations Into Environmental Impact Analysis Under NEPA This...

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. INCORPORATING SPECTRAL SUBTRACTION AND NOISE TYPE FOR UNVOICED SPEECH SEGREGATION

    E-Print Network [OSTI]

    Wang, DeLiang "Leon"

    , monaural speech enhancement methods enhance noisy speech based on certain assumptions or models of speech and interference [8]. Speech enhancement methods improve speech quality. However, they have a limited abilityINCORPORATING SPECTRAL SUBTRACTION AND NOISE TYPE FOR UNVOICED SPEECH SEGREGATION Ke Hu and De

  20. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  1. Incorporating Experience Curves in Appliance Standards Analysis

    SciTech Connect (OSTI)

    Garbesi, Karina; Chan, Peter; Greenblatt, Jeffery; Kantner, Colleen; Lekov, Alex; Meyers, Stephen; Rosenquist, Gregory; Buskirk, Robert Van; Yang, Hung-Chia; Desroches, Louis-Benoit

    2011-10-31T23:59:59.000Z

    The technical analyses in support of U.S. energy conservation standards for residential appliances and commercial equipment have typically assumed that manufacturing costs and retail prices remain constant during the projected 30-year analysis period. There is, however, considerable evidence that this assumption does not reflect real market prices. Costs and prices generally fall in relation to cumulative production, a phenomenon known as experience and modeled by a fairly robust empirical experience curve. Using price data from the Bureau of Labor Statistics, and shipment data obtained as part of the standards analysis process, we present U.S. experience curves for room air conditioners, clothes dryers, central air conditioners, furnaces, and refrigerators and freezers. These allow us to develop more representative appliance price projections than the assumption-based approach of constant prices. These experience curves were incorporated into recent energy conservation standards for these products. The impact on the national modeling can be significant, often increasing the net present value of potential standard levels in the analysis. In some cases a previously cost-negative potential standard level demonstrates a benefit when incorporating experience. These results imply that past energy conservation standards analyses may have undervalued the economic benefits of potential standard levels.

  2. Computational soundness for standard assumptions of formal cryptography

    E-Print Network [OSTI]

    Herzog, Jonathan, 1975-

    2004-01-01T23:59:59.000Z

    This implementation is conceptually simple, and relies only on general assumptions. Specifically, it can be thought of as a 'self-referential' variation on a well-known encryption scheme. 4. Lastly, we show how the ...

  3. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  4. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  5. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    context of Alaska oil production taxes, comparing MAPA and ACES to the original petroleum profits tax (PPT1 COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1 Matthew Berman In a recent analysis comparing the current oil production tax, More Alaska Production Act (MAPA, also known as SB 21

  6. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  7. Effects of internal gain assumptions in building energy calculations

    SciTech Connect (OSTI)

    Christensen, C.; Perkins, R.

    1981-01-01T23:59:59.000Z

    The utilization of direct solar gains in buildings can be affected by operating profiles, such as schedules for internal gains, thermostat controls, and ventilation rates. Building energy analysis methods use various assumptions about these profiles. The effects of typical internal gain assumptions in energy calculations are described. Heating and cooling loads from simulations using the DOE 2.1 computer code are compared for various internal-gain inputs: typical hourly profiles, constant average profiles, and zero gain profiles. Prototype single-family-detached and multi-family-attached residential units are studied with various levels of insulation and infiltration. Small detached commercial buildings and attached zones in large commercial buildings are studied with various levels of internal gains. The results of this study indicate that calculations of annual heating and cooling loads are sensitive to internal gains, but in most cases are relatively insensitive to hourly variations in internal gains.

  8. Notes 01. The fundamental assumptions and equations of lubrication theory

    E-Print Network [OSTI]

    San Andres, Luis

    2009-01-01T23:59:59.000Z

    for unsteady or transient motions ? Journal angular speed (rad/s) NOTES 1. THE FUNDAMENTAL ASSUMPTIONS IN HYDRODYNAMIC LUBRICATION ? Dr. Luis San Andr?s (2009) 2 Fluid flow in a general physical domain is governed by the principles of: a) conservation... of the runner surface. For example, in journal bearings U * =?R J where ? is the journal angular speed in rad/s. Substitution of the dimensionless variables into the continuity equation (1) renders the following expression 0...

  9. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  10. Incorporating Experience Curves in Appliance Standards Analysis

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2012-01-01T23:59:59.000Z

    appliance price projections than the assumption-basedrepresentative projection of future prices than the constant

  11. Incorporating Energy Efficiency into Disaster Recovery Efforts...

    Energy Savers [EERE]

    Incorporating Energy Efficiency into Disaster Recovery Efforts Incorporating Energy Efficiency into Disaster Recovery Efforts Better Buildings Residential Network Program...

  12. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy 

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01T23:59:59.000Z

    As workplace demands change, a need has developed for alternatives to traditional education. With advancements in electronic telecommunication technologies, distance education has become a viable alternative to traditional ...

  13. Verification of energy audit assumptions: Why engineering estimates go bad

    SciTech Connect (OSTI)

    Dent, C.L.; Swanson, D.B.; Koca, R.W.; Tibbetts, B.

    1994-12-31T23:59:59.000Z

    Often, local governments do not have the resources to fully assess and implement energy efficiency measures (EEMs) even though initial payback calculations are encouraging. To address this problem, the California Energy Commission (CEC) has been operating the Energy Partnership Program (EPP) to provide technical assistance and funding to local governments for energy efficiency projects in public buildings. A government agency interested in participating in the EPP begins the process by submitting an application which is then reviewed by the CEC for energy savings potential. Selected sites are visited by the CEC, after which they may be granted a full energy audit and recommendation study by an independent energy service company (ESCO). Also, in cases where the local government does not have the capital for new equipment purchases, the CEC can provide a loan to that government which can then be repaid through the reduced utility expenditures. Since industry experience has found that, on average, actual energy savings are only 60 - 70% of engineering estimates, the CEC hired Pacific Science & Technology (PS&T) to perform end-use metering and analysis to evaluate the accuracy of the energy audit. The CEC is not only interested in evaluating the total energy savings, but also improving the accuracy of future energy audits as well. To this end, Pacific Science & Technology is reviewing and evaluating all of the basic assumptions made by the auditor such as equipment power draws, operating schedules, fixture counts, etc. These basic assumptions are common building blocks used in energy use analysis. So, the goal of this project is to improve the audit assumptions and thereby improve the accuracy of future energy audits and EEM assessments.

  14. Assumptions and ambiguities in nonplanar acoustic soliton theory

    SciTech Connect (OSTI)

    Verheest, Frank [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium) [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium); School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa); Hellberg, Manfred A. [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)] [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)

    2014-02-15T23:59:59.000Z

    There have been many recent theoretical investigations of the nonlinear evolution of electrostatic modes with cylindrical or spherical symmetry. Through a reductive perturbation analysis based on a quasiplanar stretching, a modified form of the Korteweg-de Vries or related equation is derived, containing an additional term which is linear in the electrostatic potential and singular at time t?=?0. Unfortunately, these analyses contain several restrictive assumptions and ambiguities which are normally neither properly explained nor discussed, and severely limit the applicability of the technique. Most glaring are the use of plane-wave stretchings, the assumption that shape-preserving cylindrical modes can exist and that, although time is homogeneous, the origin of time (which can be chosen arbitrarily) needs to be avoided. Hence, only in the domain where the nonlinear modes are quasiplanar, far from the axis of cylindrical or from the origin of spherical symmetry can acceptable but unexciting results be obtained. Nonplanar nonlinear modes are clearly an interesting topic of research, as some of these phenomena have been observed in experiments. However, it is argued that a proper study of such modes needs numerical simulations rather than ill-suited analytical approximations.

  15. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  16. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  17. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01T23:59:59.000Z

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  18. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  19. Incorporating Operational Characteristics and Startup Costs in Option-Based Valuation of

    E-Print Network [OSTI]

    Oren, Shmuel S.

    Incorporating Operational Characteristics and Startup Costs in Option-Based Valuation of Power characteristics on valuation of generation assets under different modeling assumptions about the energy commodity prices. We find that the impacts of operational constraints on real asset valuation are dependent upon

  20. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  1. Validity of conventional assumptions concerning flexible response. Research report

    SciTech Connect (OSTI)

    Gutierrez, M.J.

    1989-01-01T23:59:59.000Z

    The North Atlantic Treaty Organization is an alliance for collective defense. Made up of 16 countries, NATO has been a successful alliance because there has been no war in Europe since 1945. In 1967, NATO adopted the strategy of flexible response, a strategy dependent upon conventional, tactical nuclear, and strategic nuclear weapons to provide deterrence from a Warsaw Pact attack. Although successful, NATO is suffering from an erosion in conventional strength. NATO continues to make assumptions about its conventional capabilities to successfully meet the requirements of the flexible response strategy. In the present day world of NATO, there is limited funding, a fact that is not likely to change any time in the foreseeable future. Limited funding makes it impossible to buy all the conventional force structure needed to ideally support the current strategy, also a fact that is unlikely to change. This paper shows limitations in some of the ways NATO assumes it can conventionally perform its mission. It is the author's position that NATO should modernize its conventional thinking to make it more in line with the realities of the situation NATO finds itself in today.

  2. Assumptions and Strategies for Conducting Research with Learning Disabled Adolescents and Young Adults

    E-Print Network [OSTI]

    Meyen, Edward L.; Schiefelbusch, Richard L.; Deshler, Donald D.; Alley, Gordon R.; Moran, Mary Ross; Clark, Frances L.

    1980-01-01T23:59:59.000Z

    This paper details the assumptions about learning disabled adolescents and young adults as well as assumptions about conducting research with this population held by researchers at the Kansas Institute. Strategies developed ...

  3. The Power of a Few Large Blocks: A credible assumption with incredible efficiency

    E-Print Network [OSTI]

    Foster, Dean P.

    i.i.d. assumption about the error structure, the two-sample t-statistic for oil was significantThe Power of a Few Large Blocks: A credible assumption with incredible efficiency Dongyu Lin and Dean P. Foster Abstract The most powerful assumption in data analysis is that of independence. Unfortu

  4. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  5. Incorporation of additives into polymers

    DOE Patents [OSTI]

    McCleskey, T. Mark; Yates, Matthew Z.

    2003-07-29T23:59:59.000Z

    There has been invented a method for incorporating additives into polymers comprising: (a) forming an aqueous or alcohol-based colloidal system of the polymer; (b) emulsifying the colloidal system with a compressed fluid; and (c) contacting the colloidal polymer with the additive in the presence of the compressed fluid. The colloidal polymer can be contacted with the additive by having the additive in the compressed fluid used for emulsification or by adding the additive to the colloidal system before or after emulsification with the compressed fluid. The invention process can be carried out either as a batch process or as a continuous on-line process.

  6. Molex Incorporated | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant JumpMarysville,Missoula, Montana: EnergyAnalysisMogadore,Molex Incorporated Jump to:

  7. Thymidine uptake, thymidine incorporation, and thymidine kinase activity in marine bacterium isolates

    SciTech Connect (OSTI)

    Jeffrey, W.H.; Paul, J.H. (Univ. of South Florida, St. Petersburg (USA))

    1990-05-01T23:59:59.000Z

    One assumption made in bacterial production estimates from ({sup 3}H)thymidine incorporation is that all heterotrophic bacteria can incorporate exogenous thymidine into DNA. Heterotrophic marine bacterium isolates from Tampa Bay, Fla., Chesapeake Bay, Md., and a coral surface microlayer were examined for thymidine uptake (transport), thymidine incorporation, the presence of thymidine kinase genes, and thymidine kinase enzyme activity. Of the 41 isolates tested, 37 were capable of thymidine incorporation into DNA. The four organisms that could not incorporate thymidine also transported the thymidine poorly and lacked thymidine kinase activity. Attempts to detect thymidine kinase genes in the marine isolates by molecular probing with gene probes made from Escherichia coli and herpes simplex virus thymidine kinase genes proved unsuccessful. To determine if the inability to incorporate thymidine was due to the lack of thymidine kinase, one organism, Vibro sp. strain DI9, was transformed with a plasmid (pGQ3) that contained an E. coli thymidine kinase gene. Although enzyme assays indicated high levels of thymidine kinase activity in transformants, these cells still failed to incorporate exogenous thymidine into DNA or to transport thymidine into cells. These results indicate that the inability of certain marine bacteria to incorporate thymidine may not be solely due to the lack of thymidine kinase activity but may also be due to the absence of thymidine transport systems.

  8. Reliability Assessment Incorporating Operational Considerations and Economic

    E-Print Network [OSTI]

    PSERC Reliability Assessment Incorporating Operational Considerations and Economic Aspects Engineering Research Center Reliability Assessment Incorporating Operational Considerations and Economic and Economic Aspects for Large Interconnected Grids." We express our appreciation for the support provided

  9. Biodegradable Thermoplastic Polyurethanes Incorporating Polyhedral Oligosilsesquioxane

    E-Print Network [OSTI]

    Mather, Patrick T.

    Biodegradable Thermoplastic Polyurethanes Incorporating Polyhedral Oligosilsesquioxane Pamela T. Knight,, Kyung Min Lee, Haihu Qin, and Patrick T. Mather*,,§ Department of Macromolecular Science polyurethane (TPU) system that incorporates an organic, biodegradable poly(D,L- lactide) soft block with a hard

  10. MANUFACTURING ACCELERATING THE INCORPORATION OF MATERIALS

    E-Print Network [OSTI]

    Magee, Joseph W.

    MANUFACTURING ACCELERATING THE INCORPORATION OF MATERIALS ADVANCES INTO MANUFACTURING PROCESSES NATIONAL NEED The proposed topic "Accelerating the Incorporation of Materials Advances into Manufacturing organizations, leading researchers from academic institutions, and others. Materials performance is often

  11. Incorporating Behavior Change Efforts Into Energy Efficiency...

    Energy Savers [EERE]

    Into Energy Efficiency Programs Better Buildings Residential Network Program Sustainability Peer Exchange Call Series: Incorporating Behavior Change Efforts into Energy...

  12. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  13. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  14. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  15. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  16. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  17. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  18. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  19. Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss

    E-Print Network [OSTI]

    Endriss, Ulle

    Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss Institute aggregation procedure will lift the rationality assumptions from the in- dividual to the collective level, i an axiomatic characterisation of the class of aggregation proce- dures that will lift all rationality

  20. Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions revisited and found inadequate

    E-Print Network [OSTI]

    Sulsky, Deborah L.

    the Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions about pack ice behavior with an eye to modeling the behavior of pack ice. A model based on these assumptions is needed to represent the deformation and stress in pack ice on scales from 10 to 100 km, and would need to explicitly resolve discontinuities

  1. OIKOS 101: 499504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS

    E-Print Network [OSTI]

    Silvertown, Jonathan

    OIKOS 101: 499­504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS seed seedlings in gaps interact? A field test of assumptions in ESS seed size models. ­ Oikos 101: 499­504. ESS for the occupancy of `safe sites' or vegetation gaps. If mortality rates are high and/or frequency-independent, ESS

  2. In vivo incorporation of unnatural amino acids

    DOE Patents [OSTI]

    Schultz, Peter G. (La Jolla, CA); Wang, Lei (San Diego, CA); Anderson, John Christopher (San Diego, CA); Chin, Jason W. (Cambridge, GB); Liu, David R. (Lexington, MA); Magliery, Thomas J. (North Haven, CT); Meggers, Eric L. (Philadelphia, PA); Mehl, Ryan Aaron (Lancaster, PA); Pastrnak, Miro (San Diego, CA); Santoro, Stephen William (Cambridge, MA); Zhang, Zhiwen (San Diego, CA)

    2012-05-08T23:59:59.000Z

    The invention provides methods and compositions for in vivo incorporation of unnatural amino acids. Also provided are compositions including proteins with unnatural amino acids.

  3. Guidance on Incorporating EPA's Pollution Prevention Strategy...

    Broader source: Energy.gov (indexed) [DOE]

    The guidance discusses the Environmental Protection Agency's definition of pollution prevention; how to incorporate pollution prevention into the EPA environmental review process...

  4. Appropriate technology for planning hydroelectric power projects in Nepal: the need for assumption analysis

    SciTech Connect (OSTI)

    Chandler, C.G.

    1981-06-01T23:59:59.000Z

    The study focuses on the project development process for hydroelectric project planning in Nepal. Chapter I describes the contrast between the vast potential for hydroelectric power development in Nepal and the current energy shortage within the country, not only for electricity, but for firewood and other fuel sources as well. Chapter II explores some of the unknown factors facing hydropower project planners in Nepal, where data for hydrologic, geologic, environmental, and sociological project components are lacking. The chapter also examines institutional and fiscal factors which constrain the planning process. Chapter III describes the critical role of assumptions in the project development process, and details the stages that a project goes through as it is planned. The chapter introduces the concept of assumption analysis as a technique for project planning, listing the potential conflict between the assumptions of foreign consultants and the host-country users of project outputs as an ingredient in the project's success or failure. Chapter IV demonstrates the mechanics and usefulness of assumption analysis through an Assumption Analysis Chart, which shows the interaction among project objectives, project alternatives, project assumptions, and the project development process. Assumption analysis techniques are expected to be useful among bilateral and multilateral aid donors servicing less developed countries.

  5. Development of Microfluidic Devices Incorporating Electrochemical Detection

    E-Print Network [OSTI]

    Regel, Anne

    2014-05-31T23:59:59.000Z

    Development of Microfluidic Devices Incorporating Electrochemical Detection Anne Regel Submitted to the Department of Chemistry and the Graduate School of the University of Kansas in partial fulfillment of the requirements for the degree... _______________________________ Karen Nordheden Dissertation Defense: August 21, 2013 ii The Dissertation Committee for Anne Regel certifies that this is the approved version of the following dissertation: Development of Microfluidic Devices Incorporating...

  6. Optimal Power Flow Incorporating Voltage Collapse Constraints

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    Optimal Power Flow Incorporating Voltage Collapse Constraints William Rosehart Claudio Ca on the current operating con- ditions is presented. Second, an Optimal Power Flow formulation that incorporates: Voltage Collapse, Optimal Power Flow, Bifur- cations. I. Introduction As open-access market principles

  7. Behavioral Assumptions Underlying California Residential Sector Energy Efficiency Programs (2009 CIEE Report)

    Broader source: Energy.gov [DOE]

    This paper examines the behavioral assumptions that underlie California’s residential sector energy efficiency programs and recommends improvements that will help to advance the state’s ambitious greenhouse gas reduction goals.

  8. WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window Silicon Valley conjures images of leading edge technology. Las Vegas makes one think of gambling

  9. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  10. A 3-D constitutive model for shape memory alloys incorporating pseudoelasticity and

    E-Print Network [OSTI]

    Popov, Peter

    A 3-D constitutive model for shape memory alloys incorporating pseudoelasticity and detwinning&M University, TX 77843-3404, USA Abstract A 3-D constitutive model for polycrystalline Shape Memory Alloys demonstrate the capabilities of the model. Key words: Shape Memory Alloy, reorientation, detwinning 1

  11. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  12. INTRODUCTION Maximal performance is a key measurement in linking the ecology,

    E-Print Network [OSTI]

    Azizi, Manny

    rely on the assumption that performance measured in the laboratory represents a true maximum. In few3947 INTRODUCTION Maximal performance is a key measurement in linking the ecology, fitness et al., 2006). Studies of mechanical power output during maximal jumps have revealed that many frog

  13. COMMENTARY Open Access Effectively incorporating selected multimedia

    E-Print Network [OSTI]

    Hammerton, James

    COMMENTARY Open Access Effectively incorporating selected multimedia content into medical Schöbel5 , Markus Sellerer6 , Andreas Ziegler1 Abstract Until fairly recently, medical publications have significantly profit from advances in electronic publishing that permit the inclusion of multimedia content

  14. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  15. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  16. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  17. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  18. Shale-oil-recovery systems incorporating ore beneficiation. Final report.

    SciTech Connect (OSTI)

    Weiss, M.A.; Klumpar, I.V.; Peterson, C.R.; Ring, T.A.

    1982-10-01T23:59:59.000Z

    This study analyzed the recovery of oil from oil shale by use of proposed systems which incorporate beneficiation of the shale ore (that is concentration of the kerogen before the oil-recovery step). The objective was to identify systems which could be more attractive than conventional surface retorting of ore. No experimental work was carried out. The systems analyzed consisted of beneficiation methods which could increase kerogen concentrations by at least four-fold. Potentially attractive low-enrichment methods such as density separation were not examined. The technical alternatives considered were bounded by the secondary crusher as input and raw shale oil as output. A sequence of ball milling, froth flotation, and retorting concentrate is not attractive for Western shales compared to conventional ore retorting; transporting the concentrate to another location for retorting reduces air emissions in the ore region but cost reduction is questionable. The high capital and energy cost s results largely from the ball milling step which is very inefficient. Major improvements in comminution seem achievable through research and such improvements, plus confirmation of other assumptions, could make high-enrichment beneficiation competitive with conventional processing. 27 figures, 23 tables.

  19. Energy Efficient Electrochromic Windows Incorporating Ionic Liquids

    SciTech Connect (OSTI)

    Cheri Boykin; James Finley; Donald Anthony; Julianna Knowles; Richard Markovic; Michael Buchanan; Mary Ann Fuhry; Lisa Perrine

    2008-11-30T23:59:59.000Z

    One approach to increasing the energy efficiency of windows is to control the amount of solar radiation transmitted through a window by using electrochromic technology. What is unique about this project is that the electrochromic is based on the reduction/oxidation reactions of cathodic and anodic organic semi-conducting polymers using room temperature ionic liquids as ion transport electrolytes. It is believed that these types of coatings would be a lower cost alternative to traditional all inorganic thin film based electrochromic technologies. Although there are patents1 based on the proposed technology, it has never been reduced to practice and thoroughly evaluated (i.e. durability and performance) in a window application. We demonstrate that by using organic semi-conductive polymers, specific bands of the solar spectrum (specifically visible and near infrared) can be targeted for electrochemical variable transmittance responsiveness. In addition, when the technology is incorporated into an insulating glass unit, the energy parameters such as the solar heat gain coefficient and the light to solar gain ratio are improved over that of a typical insulating glass unit comprised of glass with a low emissivity coating. A minimum of {approx}0.02 quads of energy savings per year with a reduction of carbon emissions for electricity of {approx}320 MKg/yr benefit is achieved over that of a typical insulating glass unit including a double silver low-E coating. Note that these values include a penalty in the heating season. If this penalty is removed (i.e. in southern climates or commercial structures where cooling is predominate year-round) a maximum energy savings of {approx}0.05 quad per year and {approx}801 MKg/yr can be achieved over that of a typical insulating glass unit including a double silver low-E coating. In its current state, the technology is not durable enough for an exterior window application. The primary downfall is that the redox chemistry fails to recover to a bleached state upon exposure to heat and solar radiation while being cycled over time from the bleached to the dark state. Most likely the polymers are undergoing degradation reactions which are accelerated by heat and solar exposure while in either the reduced or oxidized states and the performance of the polymers is greatly reduced over time. For this technology to succeed in an exterior window application, there needs to be more work done to understand the degradation of the polymers under real-life application conditions such as elevated temperatures and solar exposure so that recommendations for improvements in to the overall system can be made. This will be the key to utilizing this type of technology in any future real-life applications.

  20. Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input

    E-Print Network [OSTI]

    Quadeer, Ahmed Abdul

    Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input T. Y methods rely on some form of training which reduces the useful data rate. Here instead we blindly estimate maxima of the ML objective function. One is the blind Genetic algorithm and the other is the semi-blind

  1. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N. [Chicago Bridge and Iron Technical Services Co., Plainfield, IL (United States)

    1996-08-01T23:59:59.000Z

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  2. RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS

    E-Print Network [OSTI]

    RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS With Revisions distributed photovoltaic (PV) installations in the Report is unclear and perhaps misleading. At the direction-generation is required. The CEC forecast assumed that 1,082 GWh will be self-generated by consumers from new PV

  3. Human lightness perception is guided by simple assumptions about reflectance and lighting

    E-Print Network [OSTI]

    Murray, Richard

    Human lightness perception is guided by simple assumptions about reflectance and lighting Richard F 0009, Toronto, Ontario, Canada, M3J 1P3 ABSTRACT Lightness constancy is the remarkable ability of human successful approaches to understanding lightness perception that have developed along independent paths

  4. On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models Patrick at transistor level and on conversion of the noise to the clock jitter exploited at the generator level. Using this approach, we can estimate proportion of the jitter coming only from the thermal noise, which is included

  5. An Assumption for the Development of Bootstrap Variants of the Akaike Information Criterion in Mixed Models

    E-Print Network [OSTI]

    Shang, Junfeng

    in Mixed Models Junfeng Shang 1, and Joseph E. Cavanaugh 2, 1 Bowling Green State University, USA 2 of Mathematics and Statistics, 450 Math Science Building, Bowling Green State University, Bowling Green, OH 43403 The University of Iowa, USA Abstract: This note provides a proof of a fundamental assumption in the verification

  6. On the Limitations of Universally Composable Two Party Computation Without Setup Assumptions #

    E-Print Network [OSTI]

    Lindell, Yehuda

    for essentially any cryptographic task in the plain model (i.e., with no setup assumptions beyond regarding the existence of universally composable protocols in the plain model without honest majority of universally composable two­party function evaluation in the plain model. Our results show that in this setting

  7. Semiconducting compounds and devices incorporating same

    SciTech Connect (OSTI)

    Marks, Tobin J; Facchetti, Antonio; Boudreault, Pierre-Luc; Miyauchi, Hiroyuki

    2014-06-17T23:59:59.000Z

    Disclosed are molecular and polymeric compounds having desirable properties as semiconducting materials. Such compounds can exhibit desirable electronic properties and possess processing advantages including solution-processability and/or good stability. Organic transistor and photovoltaic devices incorporating the present compounds as the active layer exhibit good device performance.

  8. Combined cycle power plant incorporating coal gasification

    DOE Patents [OSTI]

    Liljedahl, Gregory N. (Tariffville, CT); Moffat, Bruce K. (Simsbury, CT)

    1981-01-01T23:59:59.000Z

    A combined cycle power plant incorporating a coal gasifier as the energy source. The gases leaving the coal gasifier pass through a liquid couplant heat exchanger before being used to drive a gas turbine. The exhaust gases of the gas turbine are used to generate both high pressure and low pressure steam for driving a steam turbine, before being exhausted to the atmosphere.

  9. aluminum slag incorporated: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sherir, Mohamed A (Author) 2012-01-01 33 Noun Incorporation in Natchez University of Kansas - KU ScholarWorks Summary: incorporation. Before giving examples of Natchez...

  10. U.S. CHP Installations Incorporating Thermal Energy Storage ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHP Installations Incorporating Thermal Energy Storage (TES) andor Turbine Inlet Cooling (TIC), September 2003 U.S. CHP Installations Incorporating Thermal Energy Storage (TES)...

  11. Incorporating Past Lessons Learned on UPF Project - John Eschenberg...

    Office of Environmental Management (EM)

    Incorporating Past Lessons Learned on UPF Project - John Eschenberg, UPF Federal Project Director Incorporating Past Lessons Learned on UPF Project - John Eschenberg, UPF Federal...

  12. Direct Measurement of Oxygen Incorporation into Thin Film Oxides...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measurement of Oxygen Incorporation into Thin Film Oxides at Room Temperature Upon Ultraviolet Phton Irradiation. Direct Measurement of Oxygen Incorporation into Thin Film Oxides...

  13. NOx Abatement Research and Development CRADA with Navistar Incorporate...

    Broader source: Energy.gov (indexed) [DOE]

    NOx Abatement Research and Development CRADA with Navistar Incorporated NOx Abatement Research and Development CRADA with Navistar Incorporated 2009 DOE Hydrogen Program and...

  14. SciTech Connect: Energy Efficiency Measures to Incorporate into...

    Office of Scientific and Technical Information (OSTI)

    Energy Efficiency Measures to Incorporate into Remodeling Projects Citation Details In-Document Search Title: Energy Efficiency Measures to Incorporate into Remodeling Projects...

  15. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  16. First determination of the quark mixing matrix element Vtb independent of assumptions of unitarity

    E-Print Network [OSTI]

    John Swain; Lucas Taylor

    1997-12-17T23:59:59.000Z

    We present a new method for the determination of the Cabibbo-Kobayashi-Maskawa quark mixing matrix element $|V_{tb}|$ from electroweak loop corrections, in particular those affecting the process $Z\\to b\\bar{b}$. From a combined analysis of results from the LEP, SLC, Tevatron, and neutrino scattering experiments we determine $|V_{tb}| = 0.77^{+0.18}_{-0.24}$. This is the first determination of $|V_{tb}|$ which is independent of unitarity assumptions.

  17. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  18. Emissive sensors and devices incorporating these sensors

    DOE Patents [OSTI]

    Swager, Timothy M; Zhang, Shi-Wei

    2013-02-05T23:59:59.000Z

    The present invention generally relates to luminescent and/or optically absorbing compositions and/or precursors to those compositions, including solid films incorporating these compositions/precursors, exhibiting increased luminescent lifetimes, quantum yields, enhanced stabilities and/or amplified emissions. The present invention also relates to sensors and methods for sensing analytes through luminescent and/or optically absorbing properties of these compositions and/or precursors. Examples of analytes detectable by the invention include electrophiles, alkylating agents, thionyl halides, and phosphate ester groups including phosphoryl halides, cyanides and thioates such as those found in certain chemical warfare agents. The present invention additionally relates to devices and methods for amplifying emissions, such as those produced using the above-described compositions and/or precursors, by incorporating the composition and/or precursor within a polymer having an energy migration pathway. In some cases, the compositions and/or precursors thereof include a compound capable of undergoing a cyclization reaction.

  19. A REVIEW OF ASSUMPTIONS AND ANALYSIS IN EPRI EA-3409, "HOUSEHOLD APPLIANCE CHOICE: REVISION OF REEPS BEHAVIORAL MODELS"

    E-Print Network [OSTI]

    Wood, D.J.

    2010-01-01T23:59:59.000Z

    of Assumptions and Analysis in EPRI EA-3409, "Householdby the Electric Power Research Institute, Inc. ("EPRI").Neither EPRI, members of EPRI, nor Lawrence Berkeley

  20. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  1. Potential incorporation of transuranics into uranium phases

    SciTech Connect (OSTI)

    Kim, C. W.; Wronkiewicz, D. J.; Buck, E. C.

    1999-12-07T23:59:59.000Z

    The UO{sub 2} in spent nuclear fuel is unstable under moist oxidizing conditions and will be altered to uranyl oxide hydrate phases. The transuranics released during the corrosion of spent fuel may also be incorporated into the structures of secondary U{sup 6+} phases. The incorporation of radionuclides into alteration products will affect their mobility. A series of precipitation tests were conducted at either 150 or 90 C for seven days to determine the potential incorporation of Ce{sup 4+} and Nd{sup 3+} (surrogates for Pu{sup 4+} and Am{sup 3+}, respectively) into uranium phases. Ianthinite ([U{sub 2}{sup 4+}(UO{sub 2}){sub 4}O{sub 6}(OH){sub 4}(H{sub 2}O){sub 4}](H{sub 2}O){sub 5}) was produced by dissolving uranium oxyacetate in a solution containing copper acetate monohydrate as a reductant. The leachant used in these tests were doped with either 2.1 ppm cerium or 399 ppm neodymium. Inductively coupled plasma-mass spectrometer (ICP-MS) analysis of the solid phase reaction products which were dissolved in a HNO{sub 3} solution indicates that about 306 ppm Ce (K{sub d} = 146) was incorporated into ianthinite, while neodymium contents were much higher, being approximately 24,800 ppm (K{sub d} = 62). Solid phase examinations using an analytical transmission electron microscope/electron energy-loss spectrometer (AEM/EELS) indicate a uniform distribution of Nd, while Ce contents were below detection. Becquerelite (Ca[(UO{sub 2}){sub 6}O{sub 4}(OH){sub 6}]{center_dot}8H{sub 2}O) was produced by dissolving uranium oxyacetate in a solution containing calcium acetate. The leachant in these tests was doped with either 2.1 ppm cerium or 277 ppm neodymium. ICP-MS results indicate that about 33 ppm Ce (K{sub d}=16) was incorporated into becquerelite, while neodymium contents were higher, being approximately 1,300 ppm (K{sub d}=5). Homogeneous distribution of Nd in the solid phase was noted during AEM/EELS examination, and Ce contents were also below detection.

  2. Heat pipe transient measurements incorporating visual methods

    E-Print Network [OSTI]

    DeHart, Mark David

    1986-01-01T23:59:59.000Z

    liftoff on January 28, 1 9B6. These five men and two women gave their lives while att mpting to lead mankind into space and open the door for the future of our race. Their noble sacr ifice should r. ever be . orgotten. ACKNOWLEDGEMENTS I wish...!!CE December 1986 Major Subject: 1'uclear Eng nearing HEAT PIPE TRANSIENT MEASUREMENTS INCORPORATING VISUAL METHODS A Thesis by MARK DAVID DeHART Approved as to style and content by: Frederick R. Best (Chairman of Committee) Carl A. Erdman (Member...

  3. Radiation collimator and systems incorporating same

    SciTech Connect (OSTI)

    Norman, Daren R. (Idaho Falls, ID); Yoon, Woo Y. (Idaho Falls, ID); Jones, James L. (Idaho Falls, ID); Haskell, Kevin J. (Idaho Falls, ID); Bennett, Brion D. (Idaho Falls, ID); Tschaggeny, Charles W. (Woods Cross, UT); Jones, Warren F. (Idaho Falls, ID)

    2011-09-13T23:59:59.000Z

    A collimator including a housing having disposed therein a shield element surrounding a converter core in which a photon beam is generated from electrons emanating from a linear accelerator. A beam channeler longitudinally adjacent the shield element has a beam aperture therethrough coaxially aligned with, and of the same diameter as, an exit bore of the converter core. A larger entry bore in the converter core is coaxial with, and longitudinally separated from, the exit bore thereof. Systems incorporating the collimator are also disclosed.

  4. Incorporation of noble metals into aerogels

    DOE Patents [OSTI]

    Hair, L.M.; Sanner, R.D.; Coronado, P.R.

    1998-12-22T23:59:59.000Z

    Aerogels or xerogels containing atomically dispersed noble metals for applications such as environmental remediation are disclosed. New noble metal precursors, such as Pt--Si or Pd(Si--P){sub 2}, have been created to bridge the incompatibility between noble metals and oxygen, followed by their incorporation into the aerogel or xerogel through sol-gel chemistry and processing. Applications include oxidation of hydrocarbons and reduction of nitrogen oxide species, complete oxidation of volatile organic carbon species, oxidative membranes for photocatalysis and partial oxidation for synthetic applications.

  5. Incorporation of noble metals into aerogels

    DOE Patents [OSTI]

    Hair, Lucy M. (Livermore, CA); Sanner, Robert D. (Livermore, CA); Coronado, Paul R. (Livermore, CA)

    1998-01-01T23:59:59.000Z

    Aerogels or xerogels containing atomically dispersed noble metals for applications such environmental remediation. New noble metal precursors, such as Pt--Si or Pd(Si--P).sub.2, have been created to bridge the incompatibility between noble metals and oxygen, followed by their incorporation into the aerogel or xerogel through sol-gel chemistry and processing. Applications include oxidation of hydrocarbons and reduction of nitrogen oxide species, complete oxidation of volatile organic carbon species, oxidative membranes for photocatalysis and partial oxidation for synthetic applications.

  6. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  7. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  8. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  9. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  10. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  11. PEM Electrolyzer Incorporating an Advanced Low-Cost Membrane

    SciTech Connect (OSTI)

    Hamdan, Monjid [Giner, Inc.] [Giner, Inc.

    2013-08-29T23:59:59.000Z

    The Department of Energy (DOE) has identified hydrogen production by electrolysis of water at forecourt stations as a critical technology for transition to the hydrogen economy; however, the cost of hydrogen produced by present commercially available electrolysis systems is considerably higher than the DOE 2015 and 2020 cost targets. Analyses of proton-exchange membrane (PEM) electrolyzer systems indicate that reductions in electricity consumption and electrolyzer stack and system capital cost are required to meet the DOE cost targets. The primary objective is to develop and demonstrate a cost-effective energy-based system for electrolytic generation of hydrogen. The goal is to increase PEM electrolyzer efficiency and to reduce electrolyzer stack and system capital cost to meet the DOE cost targets for distributed electrolysis. To accomplish this objective, work was conducted by a team consisting of Giner, Inc. (Giner), Virginia Polytechnic Institute & University (VT), and domnick hunter group, a subsidiary of Parker Hannifin (Parker). The project focused on four (4) key areas: (1) development of a high-efficiency, high-strength membrane; (2) development of a long-life cell-separator; (3) scale-up of cell active area to 290 cm2 (from 160 cm²); and (4) development of a prototype commercial electrolyzer system. In each of the key stack development areas Giner and our team members conducted focused development in laboratory-scale hardware, with analytical support as necessary, followed by life-testing of the most promising candidate materials. Selected components were then scaled up and incorporated into low-cost scaled-up stack hardware. The project culminated in the fabrication and testing of a highly efficient electrolyzer system for production of 0.5 kg/hr hydrogen and validation of the stack and system in testing at the National Renewable Energy Laboratory (NREL).

  12. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  13. A Study of SSI Effects Incorporating Seismic Wave Incoherence...

    Office of Environmental Management (EM)

    A Study of SSI Effects Incorporating Seismic Wave Incoherence within the DOE Complex A Study of SSI Effects Incorporating Seismic Wave Incoherence within the DOE Complex A Study of...

  14. Radiation shielding materials and containers incorporating same

    DOE Patents [OSTI]

    Mirsky, Steven M. (Greenbelt, MD); Krill, Stephen J. (Arlington, VA); Murray, Alexander P. (Gaithersburg, MD)

    2005-11-01T23:59:59.000Z

    An improved radiation shielding material and storage systems for radioactive materials incorporating the same. The PYRolytic Uranium Compound ("PYRUC") shielding material is preferably formed by heat and/or pressure treatment of a precursor material comprising microspheres of a uranium compound, such as uranium dioxide or uranium carbide, and a suitable binder. The PYRUC shielding material provides improved radiation shielding, thermal characteristic, cost and ease of use in comparison with other shielding materials. The shielding material can be used to form containment systems, container vessels, shielding structures, and containment storage areas, all of which can be used to house radioactive waste. The preferred shielding system is in the form of a container for storage, transportation, and disposal of radioactive waste. In addition, improved methods for preparing uranium dioxide and uranium carbide microspheres for use in the radiation shielding materials are also provided.

  15. Solar cells incorporating light harvesting arrays

    DOE Patents [OSTI]

    Lindsey, Jonathan S. (Raleigh, NC); Meyer, Gerald J. (Baltimore, MD)

    2002-01-01T23:59:59.000Z

    A solar cell incorporates a light harvesting array that comprises: (a) a first substrate comprising a first electrode; and (b) a layer of light harvesting rods electrically coupled to the first electrode, each of the light harvesting rods comprising a polymer of Formula I: X.sup.1.paren open-st.X.sup.m+1).sub.m (I) wherein m is at least 1, and may be from two, three or four to 20 or more; X.sup.1 is a charge separation group (and preferably a porphyrinic macrocycle, which may be one ligand of a double-decker sandwich compound) having an excited-state of energy equal to or lower than that of X.sup.2 ; and X.sup.2 through X.sup.m+1 are chromophores (and again are preferably porphyrinic macrocycles).

  16. Radiation Shielding Materials and Containers Incorporating Same

    DOE Patents [OSTI]

    Mirsky, Steven M.; Krill, Stephen J.; and Murray, Alexander P.

    2005-11-01T23:59:59.000Z

    An improved radiation shielding material and storage systems for radioactive materials incorporating the same. The PYRolytic Uranium Compound (''PYRUC'') shielding material is preferably formed by heat and/or pressure treatment of a precursor material comprising microspheres of a uranium compound, such as uranium dioxide or uranium carbide, and a suitable binder. The PYRUC shielding material provides improved radiation shielding, thermal characteristic, cost and ease of use in comparison with other shielding materials. The shielding material can be used to form containment systems, container vessels, shielding structures, and containment storage areas, all of which can be used to house radioactive waste. The preferred shielding system is in the form of a container for storage, transportation, and disposal of radioactive waste. In addition, improved methods for preparing uranium dioxide and uranium carbide microspheres for use in the radiation shielding materials are also provided.

  17. Solar cells incorporating light harvesting arrays

    DOE Patents [OSTI]

    Lindsey, Jonathan S.; Meyer, Gerald J.

    2003-07-22T23:59:59.000Z

    A solar cell incorporates a light harvesting array that comprises: (a) a first substrate comprising a first electrode; and (b) a layer of light harvesting rods electrically coupled to the first electrode, each of the light harvesting rods comprising a polymer of Formula I: ##EQU1## wherein m is at least 1, and may be from two, three or four to 20 or more; X.sup.1 is a charge separation group (and preferably a porphyrinic macrocycle, which may be one ligand of a double-decker sandwich compound) having an excited-state of energy equal to or lower than that of X.sup.2 ; and X.sup.2 through X.sup.m+1 are chromophores (and again are preferably porphyrinic macrocycles).

  18. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01T23:59:59.000Z

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  19. Correct and incorrect nucleotide incorporation pathways in DNA polymerase b

    E-Print Network [OSTI]

    Schlick, Tamar

    Correct and incorrect nucleotide incorporation pathways in DNA polymerase b Ravi Radhakrishnan a nucleotide incorporations in the DNA by using a novel protocol involving energy minimizations, dynamics simu- sive transient intermediates, for nucleotide incorporation at the template/primer DNA junction. A large

  20. On the validity of the Poisson assumption in sampling nanometer-sized aerosols

    SciTech Connect (OSTI)

    Damit, Brian E [ORNL] [ORNL; Wu, Dr. Chang-Yu [University of Florida, Gainesville] [University of Florida, Gainesville; Cheng, Mengdawn [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    A Poisson process is traditionally believed to apply to the sampling of aerosols. For a constant aerosol concentration, it is assumed that a Poisson process describes the fluctuation in the measured concentration because aerosols are stochastically distributed in space. Recent studies, however, have shown that sampling of micrometer-sized aerosols has non-Poissonian behavior with positive correlations. The validity of the Poisson assumption for nanometer-sized aerosols has not been examined and thus was tested in this study. Its validity was tested for four particle sizes - 10 nm, 25 nm, 50 nm and 100 nm - by sampling from indoor air with a DMA- CPC setup to obtain a time series of particle counts. Five metrics were calculated from the data: pair-correlation function (PCF), time-averaged PCF, coefficient of variation, probability of measuring a concentration at least 25% greater than average, and posterior distributions from Bayesian inference. To identify departures from Poissonian behavior, these metrics were also calculated for 1,000 computer-generated Poisson time series with the same mean as the experimental data. For nearly all comparisons, the experimental data fell within the range of 80% of the Poisson-simulation values. Essentially, the metrics for the experimental data were indistinguishable from a simulated Poisson process. The greater influence of Brownian motion for nanometer-sized aerosols may explain the Poissonian behavior observed for smaller aerosols. Although the Poisson assumption was found to be valid in this study, it must be carefully applied as the results here do not definitively prove applicability in all sampling situations.

  1. CLARIFICATION: Incorporation of OFPC Manual and Document Updates Updated documents should be incorporated in to projects as follows

    E-Print Network [OSTI]

    O'Toole, Alice J.

    CLARIFICATION: Incorporation of OFPC Manual and Document Updates Updated documents should be incorporated in to projects as follows: Project Management Manual (PMM) and Construction Inspection Manual (CIM approved by senior project management, project managers shall require the design professional

  2. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  3. Technical considerations related to interim source-term assumptions for emergency planning and equipment qualification. [PWR; BWR

    SciTech Connect (OSTI)

    Niemczyk, S.J.; McDowell-Boyer, L.M.

    1982-09-01T23:59:59.000Z

    The source terms recommended in the current regulatory guidance for many considerations of light water reactor (LWR) accidents were developed a number of years ago when understandings of many of the phenomena pertinent to source term estimation were relatively primitive. The purpose of the work presented here was to develop more realistic source term assumptions which could be used for interim regulatory purposes for two specific considerations, namely, equipment qualification and emergency planning. The overall approach taken was to adopt assumptions and models previously proposed for various aspects of source term estimation and to modify those assumptions and models to reflect recently gained insights into, and data describing, the release and transport of radionuclides during and after LWR accidents. To obtain illustrative estimates of the magnitudes of the source terms, the results of previous calculations employing the adopted assumptions and models were utilized and were modified to account for the effects of the recent insights and data.

  4. Assessment of Gasification-Based Biorefining at Kraft Pulp and Paper Mills in the United States, Part A: Background and Assumptions

    SciTech Connect (OSTI)

    Larson, E. D.; Consonni, S.; Katofsky, R. E.; Iisa, K.; Frederick, W. J., Jr.

    2008-11-01T23:59:59.000Z

    Commercialization of black liquor and biomass gasification technologies is anticipated in the 2010-2015 time frame, and synthesis gas from gasifiers can be converted into liquid fuels using catalytic synthesis technologies that are already commercially established in the gas-to-liquids or coal-to-liquids industries. This set of two papers describes key results from a major assessment of the prospective energy, environmental, and financial performance of commercial gasification-based biorefineries integrated with kraft pulp and paper mills [1]. Seven detailed biorefinery designs were developed for a reference mill in the southeastern United States, together with the associated mass/energy balances, air emissions estimates, and capital investment requirements. The biorefineries provide chemical recovery services and co-produce process steam for the mill, some electricity, and one of three liquid fuels: a Fischer-Tropsch synthetic crude oil (which could be refined to vehicle fuels at an existing petroleum refinery), dimethyl ether (a diesel engine fuel or propane substitute), or an ethanol-rich mixed-alcohol product. This paper describes the key assumptions that underlie the biorefinery designs. Part B will present analytical results.

  5. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  6. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  7. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28T23:59:59.000Z

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  8. Estimating Alarm Thresholds for Process Monitoring Data under Different Assumptions about the Data Generating Mechanism

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Burr, Tom; Hamada, Michael S.; Howell, John; Skurikhin, Misha; Ticknor, Larry; Weaver, Brian

    2013-01-01T23:59:59.000Z

    Process monitoring (PM) for nuclear safeguards sometimes requires estimation of thresholds corresponding to small false alarm rates. Threshold estimation dates to the 1920s with the Shewhart control chart; however, because possible new roles for PM are being evaluated in nuclear safeguards, it is timely to consider modern model selection options in the context of threshold estimation. One of the possible new PM roles involves PM residuals, where a residual is defined as residual = data ? prediction. This paper reviews alarm threshold estimation, introduces model selection options, and considers a range of assumptions regarding the data-generating mechanism for PM residuals.more »Two PM examples from nuclear safeguards are included to motivate the need for alarm threshold estimation. The first example involves mixtures of probability distributions that arise in solution monitoring, which is a common type of PM. The second example involves periodic partial cleanout of in-process inventory, leading to challenging structure in the time series of PM residuals.« less

  9. A METHOD TO EXTRACT THE REDSHIFT DISTORTION {beta} PARAMETER IN CONFIGURATION SPACE FROM MINIMAL COSMOLOGICAL ASSUMPTIONS

    SciTech Connect (OSTI)

    Tocchini-Valentini, Domenico; Barnard, Michael; Bennett, Charles L.; Szalay, Alexander S., E-mail: dtv@pha.jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218-2686 (United States)

    2012-10-01T23:59:59.000Z

    We present a method to extract the redshift-space distortion {beta} parameter in configuration space with a minimal set of cosmological assumptions. We show that a novel combination of the observed monopole and quadrupole correlation functions can remove efficiently the impact of mild nonlinearities and redshift errors. The method offers a series of convenient properties: it does not depend on the theoretical linear correlation function, the mean galaxy density is irrelevant, only convolutions are used, and there is no explicit dependence on linear bias. Analyses based on dark matter N-body simulations and Fisher matrix demonstrate that errors of a few percent on {beta} are possible with a full-sky, 1 (h {sup -1} Gpc){sup 3} survey centered at a redshift of unity and with negligible shot noise. We also find a baryonic feature in the normalized quadrupole in configuration space that should complicate the extraction of the growth parameter from the linear theory asymptote, but that does not have a major impact on our method.

  10. RESIK Solar X-ray flare element abundances on a non-isothermal assumption

    E-Print Network [OSTI]

    Sylwester, B; Sylwester, J; Kepa, A

    2015-01-01T23:59:59.000Z

    Solar X-ray spectra from the RESIK crystal spectrometer on the {\\em CORONAS-F} spacecraft (spectral range $3.3-6.1$~\\AA) are analyzed for thirty-three flares using a method to derive abundances of Si, S, Ar, and K, emission lines of which feature prominently in the spectra. For each spectrum, the method first optimizes element abundances then derives the differential emission measure as a function of temperature based on a procedure given by Sylwester et al. and Withbroe. This contrasts with our previous analyses of RESIK spectra in which an isothermal assumption was used. The revised abundances (on a logarithmic scale with $A({\\rm H}) = 12$) averaged for all the flares in the analysis are $A({\\rm Si}) = 7.53 \\pm 0.08$ (previously $7.89 \\pm 0.13$), $A({\\rm S}) = 6.91 \\pm 0.07$ ($7.16 \\pm 0.17$), $A({\\rm Ar}) = 6.47 \\pm 0.08$ ($6.45 \\pm 0.07$), and $A({\\rm K}) = 5.73 \\pm 0.19$ ($5.86 \\pm 0.20$), with little evidence for time variations of abundances within the evolution of each flare. Our previous estimates of...

  11. Blasting detonators incorporating semiconductor bridge technology

    SciTech Connect (OSTI)

    Bickes, R.W. Jr.

    1994-05-01T23:59:59.000Z

    The enormity of the coal mine and extraction industries in Russia and the obvious need in both Russia and the US for cost savings and enhanced safety in those industries suggests that joint studies and research would be of mutual benefit. The author suggests that mine sites and well platforms in Russia offer an excellent opportunity for the testing of Sandia`s precise time-delay semiconductor bridge detonators, with the potential for commercialization of the detonators for Russian and other world markets by both US and Russian companies. Sandia`s semiconductor bridge is generating interest among the blasting, mining and perforation industries. The semiconductor bridge is approximately 100 microns long, 380 microns wide and 2 microns thick. The input energy required for semiconductor bridge ignition is one-tenth the energy required for conventional bridgewire devices. Because semiconductor bridge processing is compatible with other microcircuit processing, timing and logic circuits can be incorporated onto the chip with the bridge. These circuits can provide for the precise timing demanded for cast effecting blasting. Indeed tests by Martin Marietta and computer studies by Sandia have shown that such precise timing provides for more uniform rock fragmentation, less fly rock, reduce4d ground shock, fewer ground contaminants and less dust. Cost studies have revealed that the use of precisely timed semiconductor bridges can provide a savings of $200,000 per site per year. In addition to Russia`s vast mineral resources, the Russian Mining Institute outside Moscow has had significant programs in rock fragmentation for many years. He anticipated that collaborative studies by the Institute and Sandia`s modellers would be a valuable resource for field studies.

  12. Essays on Incorporating Risk Modeling Techniques in Agriculture

    E-Print Network [OSTI]

    Larsen, Ryan A.

    2012-10-19T23:59:59.000Z

    single period model, an asymmetric risk measure, conditional value at risk, and asymmetric dependence measure, copulas, are implemented into the portfolio optimization model. The efficient frontiers under both symmetric and asymmetric assumptions show...

  13. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01T23:59:59.000Z

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  14. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15T23:59:59.000Z

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  15. areas incorporating behavioural: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mathematical modelling of the effects of initial fabric on the mechanical behaviour of sand. A stress-dilatancy model that incorporates microstructural aspects of sand is hereby...

  16. Atomistic Simulations of Uranium Incorporation into Iron (Hydr...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characterize the coordination environments of U incorporated in three Fe-(hydr)oxide minerals: goethite, magnetite, and hematite. The simulations provided information on U-O and...

  17. Database (Report) of U.S. CHP Installations Incorporating Thermal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Database (Report) of U.S. CHP Installations Incorporating Thermal Energy Storage (TES) andor Turbine Inlet Cooling (TIC), 2004 Database (Report) of U.S. CHP Installations...

  18. Model Guidelines for Incorporating Energy Efficiency and Renewable...

    Office of Environmental Management (EM)

    & Publications Problems and Solutions: Training Disaster Organizations of the Use of PV Incorporating Energy Efficiency into Disaster Recovery Efforts Coordinating Energy...

  19. Incorporating Genomics and Bioinformatics across the Life Sciences Curriculum

    E-Print Network [OSTI]

    Ditty, Jayna L.

    2012-01-01T23:59:59.000Z

    Page Incorporating Genomics and Bioinformatics across the2007) Discovering Genomics, Proteomics, and Bioinformatics,2003) Public access for teaching genomics, proteomics, and

  20. PEM Electrolyzer Incorporating an Advanced Low Cost Membrane...

    Office of Environmental Management (EM)

    PEM Electrolyzer Incorporating an Advanced Low Cost Membrane 2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer...

  1. NOx Abatement Research and Development CRADA with Navistar Incorporate...

    Broader source: Energy.gov (indexed) [DOE]

    Abatement Research and Development CRADA with Navistar Incorporated (successor to International Truck and Engine Corporation) Josh A. Pihl and Todd J. Toops Oak Ridge National...

  2. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  3. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  4. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  5. Calcium is incorporated into the calcium carbonate matrix of otoliths

    E-Print Network [OSTI]

    118 Calcium is incorporated into the calcium carbonate matrix of otoliths and into the calcium). In addition to calcium, trace elements, such as strontium, are also incorporated into the calcified components valence) allow strontium ions to act as replace- ments for calcium during the pro- cess of calcification

  6. Selective incorporation of 5-hydroxytryptophan into proteins in mammalian cells

    DOE Patents [OSTI]

    Zhang, Zhiwen; Alfonta, Lital; Schultz, Peter G

    2014-02-25T23:59:59.000Z

    This invention provides methods and compositions for incorporation of an unnatural amino acid into a peptide using an orthogonal aminoacyl tRNA synthetase/tRNA pair. In particular, an orthogonal pair is provided to incorporate 5-hydroxy-L-tryptophan in a position encoded by an opal mutation.

  7. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  8. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  9. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  10. READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management

    E-Print Network [OSTI]

    Oregon, University of

    READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management Conditions of Volunteer Service Please send completed form to the Office of Risk Management: riskmanagement ___________________________________________ (name/title of department supervisor) and the Office of Risk Management, (541) 346-8316, within 24 hours

  11. Determining the Effectiveness of Incorporating Geographic Information Into Vehicle Performance Algorithms

    SciTech Connect (OSTI)

    Sera White

    2012-04-01T23:59:59.000Z

    This thesis presents a research study using one year of driving data obtained from plug-in hybrid electric vehicles (PHEV) located in Sacramento and San Francisco, California to determine the effectiveness of incorporating geographic information into vehicle performance algorithms. Sacramento and San Francisco were chosen because of the availability of high resolution (1/9 arc second) digital elevation data. First, I present a method for obtaining instantaneous road slope, given a latitude and longitude, and introduce its use into common driving intensity algorithms. I show that for trips characterized by >40m of net elevation change (from key on to key off), the use of instantaneous road slope significantly changes the results of driving intensity calculations. For trips exhibiting elevation loss, algorithms ignoring road slope overestimated driving intensity by as much as 211 Wh/mile, while for trips exhibiting elevation gain these algorithms underestimated driving intensity by as much as 333 Wh/mile. Second, I describe and test an algorithm that incorporates vehicle route type into computations of city and highway fuel economy. Route type was determined by intersecting trip GPS points with ESRI StreetMap road types and assigning each trip as either city or highway route type according to whichever road type comprised the largest distance traveled. The fuel economy results produced by the geographic classification were compared to the fuel economy results produced by algorithms that assign route type based on average speed or driving style. Most results were within 1 mile per gallon ({approx}3%) of one another; the largest difference was 1.4 miles per gallon for charge depleting highway trips. The methods for acquiring and using geographic data introduced in this thesis will enable other vehicle technology researchers to incorporate geographic data into their research problems.

  12. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  13. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  14. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  15. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  16. Incorporation of pollution prevention into the engineering command media

    SciTech Connect (OSTI)

    Harrington, E.; Hammonds, C. [Lockheed Martin Energy Systems, Inc., Oak Ridge, TN (United States)

    1997-10-08T23:59:59.000Z

    It has long been recognized that incorporation of pollution prevention (P2) into projects during the design phase yields superior results as compared to modification of facilities after construction. Generation of waste during construction can be minimized, products containing recycled materials can be incorporated into the facility, and the processes or systems can be optimized for P2 from the beginning. However, design engineers must have the proper mindset and training in order to achieve this, since standard engineering practice does not necessarily lead to construction of systems that are optimized for P2. It was determined that incorporation of P2 principles and methods into command media that govern the conduct of design and construction was one way of achieving P2 objectives during design. This would incorporate certain P2 elements into criteria and standard designs so that these elements are automatically incorporated into the designs. The Central Engineering Services (CES) Command Media, which provide direction, methodology, and criteria for performance of engineering design and construction, consist of Engineering Procedures, Master Design Criteria, Technical Specifications, and Engineering Standards. Incorporated in these documents are regulatory requirements, national consensus codes and standards, accepted and proven practices and designs, as well as DOE Orders governing design and construction. The documents were reviewed to identify potential areas into which P2 principles, practices, and methodologies could be incorporated.

  17. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  18. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  19. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  20. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  1. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  2. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  3. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  4. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15T23:59:59.000Z

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  5. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  6. The incorporation of bubbles into a computer graphics fluid simulation

    E-Print Network [OSTI]

    Greenwood, Shannon Thomas

    2005-08-29T23:59:59.000Z

    We present methods for incorporating bubbles into a photorealistc fluid simulation. Previous methods of fluid simulation in computer graphics do not include bubbles. Our system automatically creates bubbles, which are simulated on top of the fluid...

  7. acids tinas incorporating: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ros Labrinidis; Panos K. Chrysanthis 2003-01-01 10 LACK OF CORRELATION BETWEEN GOUT AND THE INCORPORATION OF ISOTOPIC FORMATE INTO URIC ACID CiteSeer Summary: Certain...

  8. Constituents without citizenship? : immigrant political incorporation in new destinations

    E-Print Network [OSTI]

    Dobbs, Erica Rose

    2013-01-01T23:59:59.000Z

    This dissertation explores the role of native activists in the incorporation of new immigrants. Motivated by concerns that this process would be limited in countries with no tradition of immigration, it focuses on Spain, ...

  9. Incorporating Representation of Agricultural Ecosystems and Management Within IBIS

    E-Print Network [OSTI]

    Incorporating Representation of Agricultural Ecosystems and Management Within IBIS: The development of Agro-IBIS Chris Kucharik Department of Agronomy & Center for Sustainability and the Global Environment balance Soil and canopy physics Leaf physiology Minutes Phenology Budburst, senescence, dormancy Daily

  10. TRITIUM INCORPORATION STUDIES IN PHOTO-SYNTHETIC BACTERIA

    E-Print Network [OSTI]

    Dehner, Thomas R.; Chan, W.-S.; Caple, Marianne B.; Calvin, M.

    2008-01-01T23:59:59.000Z

    W-7405-eng-48 UCRL-17749 I TRITIUM INCORPORATION STUDIES INand M. Calvin July 1967 TRITIUM INCORPOWION STUDIES I Ntransport, w are studying t h e tritium labeling pattern e i

  11. Incorporating HVDC's into monitoring and power system analysis

    E-Print Network [OSTI]

    Krishnaswamy, Vikram

    2002-01-01T23:59:59.000Z

    This thesis attempts to study the effect of incorporating HVDC's into monitoring and power system analysis. Power system analysis, including load flow and stability studies, and monitoring defines a complete cycle of the impact of HVDC in a power...

  12. ENHANCEMENT OF STRUCTURAL FOAM MATERIALS BY INCORPORATION OF GASIFIER SLAG

    SciTech Connect (OSTI)

    Olin Perry Norton; Ronald A. Palmer; W. Gene Ramsey

    2006-03-15T23:59:59.000Z

    As advanced gasification technology is increasingly adopted as an energy source, disposal of the resulting slag will become a problem. We have shown that gasifier slag can be incorporated into foamed glass, which is currently being manufactured as an abrasive and as an insulating material. The slag we add to foamed glass does not simply act as filler, but improves the mechanical properties of the product. Incorporation of gasifier slag can make foamed glass stronger and more abrasion resistant.

  13. Platelet-derived growth factor stimulated mechanisms of glucosamine incorporation

    SciTech Connect (OSTI)

    Harrington, M.A.; Pledger, W.J. (Univ. of North Carolina, Chapel Hill (USA))

    1987-10-01T23:59:59.000Z

    Platelet-derived growth factor (PDGF) treatment of density-arrested BALB/c-3T3 cells results in increased ({sup 3}H)glucosamine (GlcN) incorporation into cellular material. The enhanced GlcN incorporation is not due to a preferential increase in proteoglycan synthesis as measured by ({sup 35}S)H{sub 2}SO{sub 4} incorporation. Approximately 50% of the GlcN incorporated in PDGF or platelet-poor plasma (PPP)-treated cultures enters N-linked glycoproteins. Addition of dolichol-phosphate (dolichol-P), a required intermediate in N-linked glycosylation, did not alter ({sup 3}H)GlcN incorporation in PDGF-treated cells but did increase incorporation in PPP-treated cultures to a level comparable to that observed for PDGF-treated cultures. PDGF-treated cultures contained twofold greater quantities of ({sup 3}H)GlcN dolichol intermediates and lipid-free glycoprotein. Over a 12-h time course 3-hydroxy-3-methylglutaryl coenzyme A reductase (HMG CoA reductase) activity was similar in cultures treated with PDGF or PPP. Results of these studies reveal that enhanced protein glycosylation in response to PDGF treatment is not the result of a direct effect on HMG CoA reductase.

  14. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  15. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  16. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  17. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  18. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  19. Stochastic modelling of landfill processes incorporating waste heterogeneity and data uncertainty

    SciTech Connect (OSTI)

    Zacharof, A.I.; Butler, A.P

    2004-07-01T23:59:59.000Z

    A landfill is a very complex heterogeneous environment and as such it presents many modelling challenges. Attempts to develop models that reproduce these complexities generally involve the use of large numbers of spatially dependent parameters that cannot be properly characterised in the face of data uncertainty. An alternative method is presented, which couples a simplified microbial degradation model with a stochastic hydrological and contaminant transport model. This provides a framework for incorporating the complex effects of spatial heterogeneity within the landfill in a simplified manner, along with other key variables. A methodology for handling data uncertainty is also integrated into the model structure. Illustrative examples of the model's output are presented to demonstrate effects of data uncertainty on leachate composition and gas volume prediction.

  20. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  1. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  2. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  3. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  4. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  6. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  7. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  8. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  9. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  10. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  11. Incorporating Learning Styles in a Computer-Supported Collaborative Learning

    E-Print Network [OSTI]

    Griffiths, Nathan

    they think and learn. Roschelle and Teasley focus more on the nature of interaction in collaborative learning a specific problem. Student reading groups for language learning courses are an example of learning groupsIncorporating Learning Styles in a Computer-Supported Collaborative Learning Model Shuangyan Liua

  12. TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia)

    E-Print Network [OSTI]

    TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia) 100 Royal Street East Perth, Western Australia 6004 Telephone (08) 9318 8000 Facsimile (08) 9225 7050 http://www.tisc.edu.au/ Curtin University · Edith Cowan University · Murdoch University · The University of Western Australia

  13. TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia)

    E-Print Network [OSTI]

    TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia) Level 1, 100 Royal Street East Perth, Western Australia 6004 Telephone (08) 9318 8000 Facsimile (08) 9225 7050 http://www.tisc.edu.au/ Curtin University · Edith Cowan University · Murdoch University · The University of Western Australia

  14. Method for incorporating radioactive phosphoric acid solutions in concrete

    DOE Patents [OSTI]

    Wolf, Gary A [Kennewick, WA; Smith, Jeffrey W [Lancaster, OH; Ihle, Nathan C [Walla Walla, WA

    1984-01-01T23:59:59.000Z

    A method for incorporating radioactive phosphoric acid solutions in concrete is described wherein the phosphoric acid is reacted with Ca(OH).sub.2 to form a precipitate of hydroxyapatite and the hydroxyapatite is mixed with portland cement to form concrete.

  15. Metal-Insulating-Semi-Incorporation of Silicon Nanoparticles into

    E-Print Network [OSTI]

    Foundation Research Experience for Undergraduates under grant number DMR-1063150, Renewable Energy Materials Research Science and Engineering Center under grant number DMR-0820518 and the Department of Energy SunMetal-Insulating-Semi- Conductor Incorporation of Silicon Nanoparticles into Silicon Based Solar

  16. Enhancing the soil organic matter pool through biomass incorporation.

    SciTech Connect (OSTI)

    Felipe G. Sanchez; Emily A. Carter; John F. Klepac

    2003-01-01T23:59:59.000Z

    A study was installed in the upper Coastal Plains of South Carolina, USA that sought to examine the impact of incorporating downed slash materials into subsoil layers on soil chemical and physical properties as compared with the effect of slash materials left on the soil surface. Two sites were examined which differed in soil textural composition: sandy vs. clay.

  17. Incorporating carbon capture and storage technologies in integrated assessment models

    E-Print Network [OSTI]

    and storage of CO2 from electric power plants. The electric power sector accounts for a substant a methodology for incorporating technologies into computable general equilibrium economic models and demonstrate; Climate; Technology; General equilibrium; Diffusion 1. Introduction Over the past century, technological

  18. Incorporating Carbon Capture and Storage Technologies in Integrated Assessment Models

    E-Print Network [OSTI]

    Incorporating Carbon Capture and Storage Technologies in Integrated Assessment Models J. R. Mc carbon capture and storage, 2) a natural gas combined cycle technology with carbon capture and storage 1 emissions growth. Both the magnitude and rate of technological change toward low- or no-carbon emitting

  19. INCORPORATING UNCERTAINTY INTO DAM SAFETY RISK Sanjay S. Chauhan1

    E-Print Network [OSTI]

    Chauhan, Sanjay S.

    on the topic of uncertainty in quantitative risk and policy analysis the reader is referred to Morgan to incorporating input uncertainties into risk analysis model. Input uncertainties are captured by using for uncertainty analysis in dam safety risk assessment, and demonstrates some useful formats for presenting

  20. Site specific incorporation of keto amino acids into proteins

    DOE Patents [OSTI]

    Schultz, Peter G. (La Jolla, CA); Wang, Lei (San Diego, CA)

    2009-04-28T23:59:59.000Z

    Compositions and methods of producing components of protein biosynthetic machinery that include orthogonal tRNAs, orthogonal aminoacyl-tRNA synthetases, and orthogonal pairs of tRNAs/synthetases, which incorporate keto amino acids into proteins are provided. Methods for identifying these orthogonal pairs are also provided along with methods of producing proteins with keto amino acids using these orthogonal pairs.

  1. Information Incorporation in Online In-Game Sports Betting Markets

    E-Print Network [OSTI]

    Giles, C. Lee

    opening line or spread. To measure the accuracy of implied market forecasts over time, we use) championship. We show that prices on average approach the correct outcome over time, and the price dy- namics that information is incorporated into market prices virtu- ally instantaneously. Gambling markets epitomize trading

  2. High conductivity electrolyte solutions and rechargeable cells incorporating such solutions

    DOE Patents [OSTI]

    Angell, C.A.; Zhang, S.S.; Xu, K.

    1998-10-20T23:59:59.000Z

    This invention relates generally to electrolyte solvents for use in liquid or rubbery polymer electrolyte solutions as are used, for example, in electrochemical devices. More specifically, this invention relates to sulfonyl/phospho-compound electrolyte solvents and sulfonyl/phospho-compound electrolyte solutions incorporating such solvents. 9 figs.

  3. Incorporating Temporal Reasoning into Activity Recognition for Smart Home Residents

    E-Print Network [OSTI]

    Cook, Diane J.

    Incorporating Temporal Reasoning into Activity Recognition for Smart Home Residents Geetika Singla be employed for valuable functions such as at- home health monitoring. In this project, we are using smart-2752 {gsingla, djcook, schmitter-e}@wsu.edu Abstract Smart environments rely on artificial intelligence

  4. Method for incorporating radioactive phosphoric acid solutions in concrete

    DOE Patents [OSTI]

    Wolf, G.A.; Smith, J.W.; Ihle, N.C.

    1982-07-08T23:59:59.000Z

    A method for incorporating radioactive phosphoric acid solutions in concrete is described wherein the phosphoric acid is reacted with Ca(OH)/sub 2/ to form a precipitate of hydroxyapatite and the hydroxyapatite is mixed with Portland cement to form concrete.

  5. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  6. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  7. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  8. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  9. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  10. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  11. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  12. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  13. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  14. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  15. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  16. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  17. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  18. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  19. Generating expansion model incorporating compact DC power flow equations

    SciTech Connect (OSTI)

    Nderitu, D.G.; Sparrow, F.T.; Yu, Z. [Purdue Inst. for Interdisciplinary Engineering Studies, West Lafayette, IN (United States)

    1998-12-31T23:59:59.000Z

    This paper presents a compact method of incorporating the spatial dimension into the generation expansion problem. Compact DC power flow equations are used to provide real-power flow coordination equations. Using these equations the marginal contribution of a generator to th total system loss is formulated as a function of that generator`s output. Incorporating these flow equations directly into the MIP formulation of the generator expansion problem results in a model that captures a generator`s true net marginal cost, one that includes both the cost of generation and the cost of transport. This method contrasts with other methods that iterate between a generator expansion model and an optimal power flow model. The proposed model is very compact and has very good convergence performance. A case study with data from Kenya is used to provide a practical application to the model.

  20. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  1. Engineering internship at Brown & Root, Incorporated: a report

    E-Print Network [OSTI]

    Gannaway, Randall Joe, 1952-

    2013-03-13T23:59:59.000Z

    A Report by RANDALL JOE GANNAWAY Submitted to the College of Engineering Texas A&M University in partial fulfillment of the requirement for the degree DOCTOR OF ENGINEERING December 1977 Major Subjects Industrial Engineering A Report... e of Engineering) W. Smith (Member) December 1977 A Report on an Engineering Internship at Brown & Root, Incorporated. (December 1977) Randall Joe Gannaway, B.S., Texas A&M University; M.E., Texas A&M University Co-Chairmen of Advisory...

  2. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  3. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  4. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  5. Building commissioning: The key to quality assurance

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

  6. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  7. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  8. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  9. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  10. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  11. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  12. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  13. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  14. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  15. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  16. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  17. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  18. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  19. The Role Of Modeling Assumptions And Policy Instruments in Evaluating The Global Implications Of U.S. Biofuel Policies

    SciTech Connect (OSTI)

    Oladosu, Gbadebo A [ORNL; Kline, Keith L [ORNL

    2010-01-01T23:59:59.000Z

    The primary objective of current U.S. biofuel law the Energy Independence and Security Act of 2007 (EISA) is to reduce dependence on imported oil, but the law also requires biofuels to meet carbon emission reduction thresholds relative to petroleum fuels. EISA created a renewable fuel standard with annual targets for U.S. biofuel use that climb gradually from 9 billion gallons per year in 2008 to 36 billion gallons (or about 136 billion liters) of biofuels per year by 2022. The most controversial aspects of the biofuel policy have centered on the global social and environmental implications of its potential land use effects. In particular, there is an ongoing debate about whether indirect land use change (ILUC) make biofuels a net source, rather sink, of carbon emissions. However, estimates of ILUC induced by biofuel production and use can only be inferred through modeling. This paper evaluates how model structure, underlying assumptions, and the representation of policy instruments influence the results of U.S. biofuel policy simulations. The analysis shows that differences in these factors can lead to divergent model estimates of land use and economic effects. Estimates of the net conversion of forests and grasslands induced by U.S. biofuel policy range from 0.09 ha/1000 gallons described in this paper to 0.73 ha/1000 gallons from early studies in the ILUC change debate. We note that several important factors governing LUC change remain to be examined. Challenges that must be addressed to improve global land use change modeling are highlighted.

  20. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01T23:59:59.000Z

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  1. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  2. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  3. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  4. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  5. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  6. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  7. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  9. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  10. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  11. Efficient incorporation of silver to improve superconducting fibers

    DOE Patents [OSTI]

    Gleixner, Richard A. (North Canton, OH); LaCount, Dale F. (Alliance, OH); Finnemore, Douglas K. (Ames, IA)

    1994-04-26T23:59:59.000Z

    An improved method for the efficient incorporation of a metal such as silver in a superconducting material includes blending the metal with a high temperature superconductor or precursor powder and consolidating the same into pellets. The pellets are charged directly into a heating assembly where it is melted and heated sufficiently to a uniform temperature prior to fiberization. Droplets of the melted blend fall through a collar into a nozzle where they are subjected to a high velocity gas to break the melted material into ligaments which solidify into improved flexible fibers having the metal homogeneously dis This invention was made with Government support under a contract with the Department of Energy (DOE) and Ames Laboratory, Contract No. SC-91-225, our reference No. CRD-1272. The Government has certain rights in this invention.

  12. Net Metering and Interconnection Procedures-- Incorporating Best Practices

    SciTech Connect (OSTI)

    Jason Keyes, Kevin Fox, Joseph Wiedman, Staff at North Carolina Solar Center

    2009-04-01T23:59:59.000Z

    State utility commissions and utilities themselves are actively developing and revising their procedures for the interconnection and net metering of distributed generation. However, the procedures most often used by regulators and utilities as models have not been updated in the past three years, in which time most of the distributed solar facilities in the United States have been installed. In that period, the Interstate Renewable Energy Council (IREC) has been a participant in more than thirty state utility commission rulemakings regarding interconnection and net metering of distributed generation. With the knowledge gained from this experience, IREC has updated its model procedures to incorporate current best practices. This paper presents the most significant changes made to IREC���¢��������s model interconnection and net metering procedures.

  13. Incorporating uncertainty in RADTRAN 6.0 input files.

    SciTech Connect (OSTI)

    Dennis, Matthew L.; Weiner, Ruth F.; Heames, Terence John (Alion Science and Technology)

    2010-02-01T23:59:59.000Z

    Uncertainty may be introduced into RADTRAN analyses by distributing input parameters. The MELCOR Uncertainty Engine (Gauntt and Erickson, 2004) has been adapted for use in RADTRAN to determine the parameter shape and minimum and maximum of the distribution, to sample on the distribution, and to create an appropriate RADTRAN batch file. Coupling input parameters is not possible in this initial application. It is recommended that the analyst be very familiar with RADTRAN and able to edit or create a RADTRAN input file using a text editor before implementing the RADTRAN Uncertainty Analysis Module. Installation of the MELCOR Uncertainty Engine is required for incorporation of uncertainty into RADTRAN. Gauntt and Erickson (2004) provides installation instructions as well as a description and user guide for the uncertainty engine.

  14. Flow cytometric measurement of total DNA and incorporated halodeoxyuridine

    DOE Patents [OSTI]

    Dolbeare, F.A.; Gray, J.W.

    1983-10-18T23:59:59.000Z

    A method for the simultaneous flow cylometric measurement of total cellular DNA content and of the uptake of DNA precursors as a measure of DNA synthesis during various phases of the cell cycle in normal and malignant cells in vitro and in vivo is described. The method comprises reacting cells with labelled halodeoxyuridine (HdU), partially denaturing cellular DNA, adding to the reaction medium monoclonal antibodies (mabs) reactive with HdU, reacting the bound mabs with a second labelled antibody, incubating the mixture with a DNA stain, and measuring simultaneously the intensity of the DNA stain as a measure of the total cellular DNA and the HdU incorporated as a measure of DNA synthesis. (ACR)

  15. Reliability assessment of autonomous power systems incorporating HVDC interconnection links

    SciTech Connect (OSTI)

    Dialynas, E.N.; Koskolos, N.C. [National Technical Univ., Athens (Greece). Dept. of Electrical and Computer Engineering] [National Technical Univ., Athens (Greece). Dept. of Electrical and Computer Engineering; Agoris, D. [Public Power Corp., Athens (Greece)] [Public Power Corp., Athens (Greece)

    1996-01-01T23:59:59.000Z

    The objective of this paper is to present an improved computational method for the overall reliability assessment of autonomous power systems that may or may not contain HVdc interconnection links. This is a hybrid method based on a Monte-Carlo simulation sequential approach which incorporates an analytical approach for the reliability modeling of the HVdc transmission links. The developed models and techniques have been implemented into a computer program that can be used to simulate the operational practices and characteristics of the overall system under study efficiently and realistically. A set of reliability indices are calculated for each load-point of interest and the entire system while a set of additional indices is calculated for quantifying the reliability performance of the interconnection links under the specified operating requirements. The analysis of a practical system is also included for a number of studies representing its various operating and design characteristics.

  16. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  17. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  18. PARSMI, a parallel revised simplex algorithm incorporating minor iterations and Devex pricing

    E-Print Network [OSTI]

    Hall, Julian

    PARSMI, a parallel revised simplex algorithm incorporating minor iterations and Devex pricing J, a parallel revised simplex algorithm incorporating minor iterations and Devex pricing J. A. J. Hall and K. I linear programming problems using the re- vised simplex method, two common variants are the incorporation

  19. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    is with the Department of Electrical and Computer Engineering, University of Wisconsin, Madison, WI 53706 USA (e Abstract--One important assumption in a model of an electricity market is the format of bids and costs. Most literature on electricity markets uses piecewise linear or quadratic functions to represent costs

  20. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written V 2 = exp \\Gammaoe 2 h ; where oe 2 h is the high­pass phase jitter, given by the frequency \\Gamma2 , C = 0:128. When jitter correction is applied, I have tended to use a conservative value C = 0

  1. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 jitter, given by the frequency- domain integral Z oe2h: for W (f) / f-2 , C = 0.128. When jitter correction is applied, I have tended to use a conservative

  2. Incorporating Equipment Condition Assessment in Risk Monitors for Advanced Small Modular Reactors

    SciTech Connect (OSTI)

    Coble, Jamie B.; Coles, Garill A.; Meyer, Ryan M.; Ramuhalli, Pradeep

    2013-10-01T23:59:59.000Z

    Advanced small modular reactors (aSMRs) can complement the current fleet of large light-water reactors in the USA for baseload and peak demand power production and process heat applications (e.g., water desalination, shale oil extraction, hydrogen production). The day-to-day costs of aSMRs are expected to be dominated by operations and maintenance (O&M); however, the effect of diverse operating missions and unit modularity on O&M is not fully understood. These costs could potentially be reduced by optimized scheduling, with risk-informed scheduling of maintenance, repair, and replacement of equipment. Currently, most nuclear power plants have a “living” probabilistic risk assessment (PRA), which reflects the as-operated, as-modified plant and combine event probabilities with population-based probability of failure (POF) for key components. “Risk monitors” extend the PRA by incorporating the actual and dynamic plant configuration (equipment availability, operating regime, environmental conditions, etc.) into risk assessment. In fact, PRAs are more integrated into plant management in today’s nuclear power plants than at any other time in the history of nuclear power. However, population-based POF curves are still used to populate fault trees; this approach neglects the time-varying condition of equipment that is relied on during standard and non-standard configurations. Equipment condition monitoring techniques can be used to estimate the component POF. Incorporating this unit-specific estimate of POF in the risk monitor can provide a more accurate estimate of risk in different operating and maintenance configurations. This enhanced risk assessment will be especially important for aSMRs that have advanced component designs, which don’t have an available operating history to draw from, and often use passive design features, which present challenges to PRA. This paper presents the requirements and technical gaps for developing a framework to integrate unit-specific estimates of POF into risk monitors, resulting in enhanced risk monitors that support optimized operation and maintenance of aSMRs.

  3. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  4. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect (OSTI)

    Liaukus, C.

    2014-12-01T23:59:59.000Z

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of the households in our nation compared to more piecemeal remodeling efforts. Even when programs like the Weatherization Assistance Program and Home Performance with ENERGY STAR are considered, homes that have had a comprehensive energy makeover still represent a small fraction of the 111.1 million households. In this report, the U.S Department of Energy Building America Retrofit Alliance research team looks at the improvement of a home's energy performance in an opportunistic way: it examines what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for the possibility for people who would not normally pursue energy efficiency but will remodel their kitchen or re-side their home to improve their home's performance at the same time. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home's energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  5. Incorporation of learning curve costs in acquisition strategy optimization

    SciTech Connect (OSTI)

    Loerch, A.

    1994-12-31T23:59:59.000Z

    Each year, the United States Army procures billions of dollars worth of weapons and equipment so that it can accomplish its worldwide mission of deterrence. The process of deciding what to buy, in what quantities, and when to best respond to the threat posed by potential adversaries, is extremely complex, requiring extensive analysis. Two techniques commonly used in this analysis are mathematical programming and cost estimation. Although they are related through constraints on available procurement funds, the use of nonlinear cost learning curves, which more accurately represent system costs as a function of quantity produced, have not been incorporated into mathematical programming formulations that compute the quantities of items to be procured. As a result, the solutions obtained could be either suboptimal, or even infeasible with respect to budgetary limitations. We present a mixed integer programming formulation that uses a piecewise linear approximation of the learning curve costs for a more accurate portrayal of budgetary constraints. In addition, implementation issues are discussed, and performance results are given.

  6. TRiPoD (Temporal Relationalism incorporating Principles of Dynamics)

    E-Print Network [OSTI]

    Edward Anderson

    2015-01-30T23:59:59.000Z

    Temporal Relationalism is that there is no time for the universe as a whole at the primary level. Time emerges rather at a secondary level; one compelling idea for this is Mach's: that time is to be abstracted from change. Temporal Relationalism leads to, and better explains, the well-known Frozen Formalism Problem encountered in GR and other background-independent theories at the quantum level. Abstraction from change is then a type of emergent time resolution of this. Moreover, the Frozen Formalism Problem is but one of the many Problem of Time facets, which are notoriously interconnected. The current article concerns modifications of physical formalism which ensure that once Temporal Relationalism is resolved, it stays incorporated. At the classical level, this involves modifying much of the Principles of Dynamics. I first introduce the anti-Routhian to complete the Legendre square of Lagrangian, Hamiltonian and Routhian. I next pass from velocities $\\dot{Q}\\mbox{}^{A}$ to changes d$Q^{A}$. Then Lagrangians are supplanted by Jacobi arc elements, Euler--Lagrange equations by Jacobi--Mach ones, and momentum requires redefining but actions remain unchanged. A differential (d) version of the Hamiltonian is required, giving rise to a variant of the Dirac approach based on a d-almost Hamiltonian subcase of the d-anti Routhian. On the other hand, the forms of the constraints themselves, and of Hamilton--Jacobi theory, remain unaltered.

  7. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  8. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  12. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  13. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  14. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  15. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  16. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  17. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  18. Incorporating Genomics and Bioinformatics across the Life Sciences Curriculum

    SciTech Connect (OSTI)

    Ditty, Jayna L.; Kvaal, Christopher A.; Goodner, Brad; Freyermuth, Sharyn K.; Bailey, Cheryl; Britton, Robert A.; Gordon, Stuart G.; Heinhorst, Sabine; Reed, Kelynne; Xu, Zhaohui; Sanders-Lorenz, Erin R.; Axen, Seth; Kim, Edwin; Johns, Mitrick; Scott, Kathleen; Kerfeld, Cheryl A.

    2011-08-01T23:59:59.000Z

    Undergraduate life sciences education needs an overhaul, as clearly described in the National Research Council of the National Academies publication BIO 2010: Transforming Undergraduate Education for Future Research Biologists. Among BIO 2010's top recommendations is the need to involve students in working with real data and tools that reflect the nature of life sciences research in the 21st century. Education research studies support the importance of utilizing primary literature, designing and implementing experiments, and analyzing results in the context of a bona fide scientific question in cultivating the analytical skills necessary to become a scientist. Incorporating these basic scientific methodologies in undergraduate education leads to increased undergraduate and post-graduate retention in the sciences. Toward this end, many undergraduate teaching organizations offer training and suggestions for faculty to update and improve their teaching approaches to help students learn as scientists, through design and discovery (e.g., Council of Undergraduate Research [www.cur.org] and Project Kaleidoscope [www.pkal.org]). With the advent of genome sequencing and bioinformatics, many scientists now formulate biological questions and interpret research results in the context of genomic information. Just as the use of bioinformatic tools and databases changed the way scientists investigate problems, it must change how scientists teach to create new opportunities for students to gain experiences reflecting the influence of genomics, proteomics, and bioinformatics on modern life sciences research. Educators have responded by incorporating bioinformatics into diverse life science curricula. While these published exercises in, and guidelines for, bioinformatics curricula are helpful and inspirational, faculty new to the area of bioinformatics inevitably need training in the theoretical underpinnings of the algorithms. Moreover, effectively integrating bioinformatics into courses or independent research projects requires infrastructure for organizing and assessing student work. Here, we present a new platform for faculty to keep current with the rapidly changing field of bioinformatics, the Integrated Microbial Genomes Annotation Collaboration Toolkit (IMG-ACT). It was developed by instructors from both research-intensive and predominately undergraduate institutions in collaboration with the Department of Energy-Joint Genome Institute (DOE-JGI) as a means to innovate and update undergraduate education and faculty development. The IMG-ACT program provides a cadre of tools, including access to a clearinghouse of genome sequences, bioinformatics databases, data storage, instructor course management, and student notebooks for organizing the results of their bioinformatic investigations. In the process, IMG-ACT makes it feasible to provide undergraduate research opportunities to a greater number and diversity of students, in contrast to the traditional mentor-to-student apprenticeship model for undergraduate research, which can be too expensive and time-consuming to provide for every undergraduate. The IMG-ACT serves as the hub for the network of faculty and students that use the system for microbial genome analysis. Open access of the IMG-ACT infrastructure to participating schools ensures that all types of higher education institutions can utilize it. With the infrastructure in place, faculty can focus their efforts on the pedagogy of bioinformatics, involvement of students in research, and use of this tool for their own research agenda. What the original faculty members of the IMG-ACT development team present here is an overview of how the IMG-ACT program has affected our development in terms of teaching and research with the hopes that it will inspire more faculty to get involved.

  19. Incorporating uncertainty into electric utility projections and decisions

    SciTech Connect (OSTI)

    Hanson, D.A.

    1992-01-01T23:59:59.000Z

    This paper focuses on how electric utility companies can respond in their decision making to uncertain variables. Here we take a mean- variance type of approach. The mean'' value is an expected cost, on a discounted value basis. We assume that management has risk preferences incorporating a tradeoff between the mean and variance in the utility's net income. Decisions that utilities are faced with can be classified into two types: ex ante and ex post. The ex ante decisions need to be made prior to the uncertainty being revealed and the ex post decision can be postponed until after the uncertainty is revealed. Intuitively, we can say that the ex ante decisions provide a hedge against the uncertainties and the ex post decisions allow the negative outcomes of uncertain variables to be partially mitigated, dampening the losses. An example of an ex post decision is how the system is operated i.e., unit dispatch, and in some cases switching among types of fuels, say with different sulfur contents. For example, if gas prices go up, natural gas combined cycle units are likely to be dispatched at lower capacity factors. If SO{sub 2} emission allowance prices go up, a utility may seek to switch into a lower sulfur coal. Here we assume that regulated electric utilities do have some incentive to lower revenue requirements and hence an incentive to lower the electric rates needed for the utility to break even, thereby earning a fair return on invested capital. This paper presents the general approach first, including applications to capacity expansion and system dispatch. Then a case study is presented focusing on the 1990 Clean Air Act Amendments including SO{sub 2} emissions abatement and banking of allowances under uncertainty. It is concluded that the emission banking decisions should not be made in isolation but rather all the uncertainties in demand, fuel prices, technology performance etc., should be included in the uncertainty analysis affecting emission banking.

  20. Incorporating uncertainty into electric utility projections and decisions

    SciTech Connect (OSTI)

    Hanson, D.A.

    1992-07-01T23:59:59.000Z

    This paper focuses on how electric utility companies can respond in their decision making to uncertain variables. Here we take a mean- variance type of approach. The ``mean`` value is an expected cost, on a discounted value basis. We assume that management has risk preferences incorporating a tradeoff between the mean and variance in the utility`s net income. Decisions that utilities are faced with can be classified into two types: ex ante and ex post. The ex ante decisions need to be made prior to the uncertainty being revealed and the ex post decision can be postponed until after the uncertainty is revealed. Intuitively, we can say that the ex ante decisions provide a hedge against the uncertainties and the ex post decisions allow the negative outcomes of uncertain variables to be partially mitigated, dampening the losses. An example of an ex post decision is how the system is operated i.e., unit dispatch, and in some cases switching among types of fuels, say with different sulfur contents. For example, if gas prices go up, natural gas combined cycle units are likely to be dispatched at lower capacity factors. If SO{sub 2} emission allowance prices go up, a utility may seek to switch into a lower sulfur coal. Here we assume that regulated electric utilities do have some incentive to lower revenue requirements and hence an incentive to lower the electric rates needed for the utility to break even, thereby earning a fair return on invested capital. This paper presents the general approach first, including applications to capacity expansion and system dispatch. Then a case study is presented focusing on the 1990 Clean Air Act Amendments including SO{sub 2} emissions abatement and banking of allowances under uncertainty. It is concluded that the emission banking decisions should not be made in isolation but rather all the uncertainties in demand, fuel prices, technology performance etc., should be included in the uncertainty analysis affecting emission banking.

  1. Modification of the Dykstra-Parsons method to incorporate Buckley-Leverett displacement theory for waterfloods

    E-Print Network [OSTI]

    Gasimov, Rustam Rauf

    2005-11-01T23:59:59.000Z

    The Dykstra-Parsons model describes layer 1-D oil displacement by water in multilayered reservoirs. The main assumptions of the model are: piston-like displacement of oil by water, no crossflow between the layers, all layers are individually...

  2. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  3. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  4. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  5. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  6. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  7. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  8. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  9. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  10. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  11. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  12. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  13. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  14. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  15. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  16. How to Successfully Implement a Knowledge Management System for the Mechanical Engineering Department at Gating Incorporated

    E-Print Network [OSTI]

    Mudd, John

    2009-05-15T23:59:59.000Z

    , utilizing some of the strategies, for the implementation of a Knowledge Management System for the Mechanical Engineering Department at Gating Incorporated....

  17. N incorporation and electronic structure in N-doped TiO2(110...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    result from using cation-rich conditions. Citation: Cheung SH, P Nachimuthu, AG Joly, MH Engelhard, MK Bowman, and SA Chambers.2007."N incorporation and electronic...

  18. ANALYSIS OF SOLVENT RECOVERED FROM WRIGHT INDUSTRIES, INCORPORATED TESTING

    SciTech Connect (OSTI)

    Poirier, M; Thomas Peters, T; Fernando Fondeur, F; Samuel Fink, S

    2007-01-11T23:59:59.000Z

    Washington Savannah River Company (WSRC) began designing and building a Modular Caustic Side Solvent Extraction (CSSX) Unit (MCU) at the Savannah River Site (SRS) to process liquid waste for an interim period. The MCU Project Team conducted testing of the contactors, coalescers, and decanters at Wright Industries, Incorporated (WII) in Nashville, Tennessee. That testing used MCU solvent and simulated SRS dissolved salt. Because of the value of the solvent, the MCU Project wishes to recover it for use in the MCU process in the H-Tank Farm. Following testing, WII recovered approximately 62 gallons of solvent (with entrained aqueous) and shipped it to SRS. The solvent arrived in two stainless steel drums. The MCU Project requested SRNL to analyze the solvent to determine whether it is suitable for use in the MCU Process. SRNL analyzed the solvent for Isopar{reg_sign} L by Gas Chromatography--Mass Spectroscopy (GC-MS), for Modifier and BOBCalixC6 by High Pressure Liquid Chromatography (HPLC), and for Isopar{reg_sign} L-to-Modifier ratio by Fourier-Transform Infrared (FTIR) spectroscopy. They also measured the solvent density gravimetrically and used that measurement to calculate the Isopar{reg_sign} L and Modifier concentration. The conclusions from this work are: (1) The constituents of the used WII solvent are collectively low in Isopar{reg_sign} L, most likely due to evaporation. This can be easily corrected through the addition of Isopar{reg_sign} L. (2) Compared to a sample of the WII Partial Solvent (without BOBCalixC6) archived before transfer to WII, the Reworked WII Solvent showed a significant improvement (i.e., nearly doubling) in the dispersion numbers for tests with simulated salt solution and with strip acid. Hence, the presence of the plasticizer impurity has no detrimental impact on phase separation. While there are no previous dispersion tests using the exact same materials, the results seem to indicate that the washing of the solvent gives a dispersion benefit. (3) WII Solvent that underwent a cleaning cycle provides an acceptable set of cesium distribution (i.e., D) values when used in a standard Extraction, Scrub, and Strip (ESS) test.

  19. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  20. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  1. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  2. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  3. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  4. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  5. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  6. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  7. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  8. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  9. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  10. Hydrogen and minor element incorporation in synthetic rutile G. D. BROMILEY

    E-Print Network [OSTI]

    Hydrogen and minor element incorporation in synthetic rutile G. D. BROMILEY 1,2, * AND N. HILAIRET from substitutional defects. KEYWORDS: rutile, hydrogen, substitution, solubility, spectroscopy of lower- valence cations may be charge-balanced by incorporation of hydrogen in the rutile structure

  11. IMPROVING FMRI ANALYSIS AND MR RECONSTRUCTION WITH THE INCORPORATION OF MR RELAXIVITIES AND

    E-Print Network [OSTI]

    Rowe, Daniel B.

    IMPROVING FMRI ANALYSIS AND MR RECONSTRUCTION WITH THE INCORPORATION OF MR RELAXIVITIES of Philosophy Milwaukee, Wisconsin August 2014 #12;i ABSTRACT IMPROVING FMRI ANALYSIS AND MR RECONSTRUCTION WITH THE INCORPORATION OF MR RELAXIVITIES AND CORRELATION EFFECT EXAMINATION M. Muge Karaman Marquette University

  12. Incorporating Life Cycle Assessment into the LEED Green Building Rating System

    E-Print Network [OSTI]

    Victoria, University of

    Incorporating Life Cycle Assessment into the LEED Green Building Rating System by Michael Supervisory Committee Incorporating Life Cycle Assessment into the LEED Green Building Rating System and regional product criteria within the LEED Green Building rating system are not based on comprehensive

  13. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  14. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  15. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  16. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  17. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols -- FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2008-12-05T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities.

  18. Compiled 11/ 14/ 2011 by OPBA. These assumptions are for modeling purposes only. They are subject to change. Page 1 of 2

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    .1 Electricity 2% 2% 231.7 3.7 Fuel Oil 9% 8% 240.8 3.9 Natural Gas -25% 0% 253.1 5.1 Lab Gas 0% 0% 260.3 2.8 Water 3% 3% 273.2 5.0 Sewer 6% 5% 279.3 2.2 Garbage 4% 4% 281.8 0.9 *FY13 based on projections dated 6.03% 18.46% 3.33% 5.54% Higher Education Price Index (HEPI)* Utility Assumptions Fiscal Year 2002 3,679 3

  19. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  20. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  1. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  2. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    and incentives for renewable resources Federal Production Tax Credit (PTC) 2.3 cents/kWh over first 10 years of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar, fuel cell and small wind (geothermal, CHP BETC ­ just Oregon (now expired) 5 #12

  3. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking Over OurSecretaryFigureAtmospheric

  4. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  5. Evaluation of an approximate method for incorporating floating docks in harbor wave prediction models

    E-Print Network [OSTI]

    Tang, Zhaoxiang

    2005-11-01T23:59:59.000Z

    coastal domains. However, floating structures such as floating breakwaters and docks are often encountered in the modeling domain. This makes the problem locally 3- dimensional. Hence it is problematic to incorporate a floating structure into the 2-d model...

  6. Incorporating on-line process data into a diagnostic knowledge-based system

    E-Print Network [OSTI]

    Lin, Kai Hsuan

    1994-01-01T23:59:59.000Z

    identified for incorporation into the system. Third, the statistical process control techniques of control charting to filter process information were applied to selected problems in the manufacturing process. Finally, the system was implemented and verified...

  7. Incorporation of Np(V) and U(VI) in Carbonate and Sulfate Minerals...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Np(V) and U(VI) in Carbonate and Sulfate Minerals Crystallized from Aqueous Solution. Incorporation of Np(V) and U(VI) in Carbonate and Sulfate Minerals Crystallized from Aqueous...

  8. Microfluidic device incorporating closed loop feedback control for uniform and tunable production of micro-droplets

    E-Print Network [OSTI]

    Rothstein, Jonathan

    Microfluidic device incorporating closed loop feedback control for uniform and tunable production, we have designed a microfluidic-based technology utilizing elementary microchannel geometries initial development using flow-focusing microfluidic geometry for droplet formation, computer

  9. Abstract--A reconfiguration technique for multilevel inverters incorporating a diagnostic system based on neural

    E-Print Network [OSTI]

    Tolbert, Leon M.

    it uses several level dc voltage sources which would be available from batteries or fuel cells [1Abstract-- A reconfiguration technique for multilevel inverters incorporating a diagnostic system. Index Terms-- Diagnostic system, fault diagnosis, multilevel inverter, neural network, reconfiguration

  10. Incorporating Perceptual Task Effort into the Recognition of Intention in Information Graphics

    E-Print Network [OSTI]

    Carberry, Sandra

    Incorporating Perceptual Task Effort into the Recognition of Intention in Information Graphics. The rapidly increasing availability of electronic publications containing information graphics poses some graphic. Similarly, digital libraries must take into account the content of information graphics when

  11. Shale oil recovery systems incorporating ore beneficiation : final report, October 1982

    E-Print Network [OSTI]

    Weiss, M. A.

    1982-01-01T23:59:59.000Z

    This study analyzed the recovery of oil from oil shale by use of proposed systems which incorporate beneficiation of the shale ore (that is, concentration of the kerogen) before the oil-recovery step. The objective was to ...

  12. INCORPORATING INCREMENTAL VALIDATION AND IMPACT ANALYSIS INTO SPREADSHEET MAINTENANCE: AN EMPIRICAL STUDY

    E-Print Network [OSTI]

    Rothermel, Gregg

    serious consequences; for example, a Dallas oil and gas company lost millions of dollars in an acquisition1 INCORPORATING INCREMENTAL VALIDATION AND IMPACT ANALYSIS INTO SPREADSHEET MAINTENANCE: spreadsheets, maintenance, testing, impact analysis, empirical study, visual programming 1. INTRODUCTION

  13. Incorporating endogenous demand dynamics into long-term capacity expansion power system models for Developing countries

    E-Print Network [OSTI]

    Jordan, Rhonda LeNai

    2013-01-01T23:59:59.000Z

    This research develops a novel approach to long-term power system capacity expansion planning for developing countries by incorporating endogenous demand dynamics resulting from social processes of technology adoption. ...

  14. Quantifying the system balancing cost when wind energy is incorporated into electricity generation system 

    E-Print Network [OSTI]

    Issaeva, Natalia

    2009-01-01T23:59:59.000Z

    Incorporation of wind energy into the electricity generation system requires a detailed analysis of wind speed in order to minimize system balancing cost and avoid a significant mismatch between supply and demand. Power ...

  15. Ethnic niches, pathway to economic incorporation or exploitation? Labor market experiences of Latina/os 

    E-Print Network [OSTI]

    Morales, Maria Cristina

    2006-04-12T23:59:59.000Z

    ETHNIC NICHES, PATHWAY TO ECONOMIC INCORPORATION OR EXPLOITATION? LABOR MARKET EXPERIENCES OF LATINA/OS A Dissertation by MARIA CRISTINA MORALES Submitted to the Office of Graduate Studies of Texas A&M University... ETHNIC NICHES, PATHWAY TO ECONOMIC INCORPORATION OR EXPLOITATION? LABOR MARKET EXPERIENCES OF LATINA/OS A Dissertation by MARIA CRISTINA MORALES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment...

  16. Ethnic niches, pathway to economic incorporation or exploitation? Labor market experiences of Latina/os

    E-Print Network [OSTI]

    Morales, Maria Cristina

    2006-04-12T23:59:59.000Z

    ETHNIC NICHES, PATHWAY TO ECONOMIC INCORPORATION OR EXPLOITATION? LABOR MARKET EXPERIENCES OF LATINA/OS A Dissertation by MARIA CRISTINA MORALES Submitted to the Office of Graduate Studies of Texas A&M University... ETHNIC NICHES, PATHWAY TO ECONOMIC INCORPORATION OR EXPLOITATION? LABOR MARKET EXPERIENCES OF LATINA/OS A Dissertation by MARIA CRISTINA MORALES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment...

  17. Practical Point-to-Point Free-Space Quantum Key Distribution over 1/2 KM

    SciTech Connect (OSTI)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Peterson, C.G.

    1999-02-01T23:59:59.000Z

    We have demonstrated point-to-point single-photon quantum key distribution (QKD) over a free-space optical path of {approximately}475 m under daylight conditions. This represents an increase of >1,000 times farther than any reported point-to-point demonstration, and >6 times farther than the previous folded path daylight demonstration. We expect to extend the daylight range to 2 km or more within the next few months. A brief description of the system is given here. The QKD transmitter, a.k.a. ''Alice'' (Fig. 1), consists of three thermoelectrically cooled diode lasers, a single interference filter (IF), two optical attenuators, two linear polarizers, two non-polarization beam-splitters (BSs), and a 27x beam expander. The two data-lasers' (dim-lasers') wavelengths are temperature controlled and constrained by the IF to {approximately}773 {+-} 0.5 nm, while the transmitted wavelength of the bright-laser (timing-laser) is {approximately}768 nm; the data-lasers are configured to emit a weak pulse of approximately 1 ns duration. The transmitter incorporates no active polarization switching--a first in QKD.

  18. Incorporation of radionuclides in the alteration phases of spent nuclear fuel.

    SciTech Connect (OSTI)

    Buck, E. C.; Kim, C.-W.; Wronkiewicz, D. J.

    1999-08-25T23:59:59.000Z

    Alteration may be expected for spent nuclear fuel exposed to groundwater under oxidizing conditions such as that which exist at the proposed nuclear waste repository at Yucca Mountain, Nevada. The actinide elements released during the corrosion of spent fuel may be incorporated into the structures of secondary U{sup 6+} phases. The incorporation of transuranics into the crystal structures of the alteration products may significantly decrease their mobility. A series of precipitation tests were conducted at 90 C to determine the potential incorporation of Ce{sup 4+} and Nd{sup 3+} (surrogates for Pu{sup 4+} and Am{sup 3+}, respectively) into uranyl phase. Dehydrated schoepite (UO{sub 3}{center_dot}0.8-1.0HP{sub 2}O) was produced by hydrolysis of a uranium oxyacetate solution containing either cerium or neodymium. ICP-MS analysis of the leachant, leachate, and solid phase reaction products which were dissolved in a HNO{sub 3} solution indicates that 26 ppm of Ce was incorporated into dehydrated schoepite. ICP-MS results from the Nd-doped tests indicate significant neodymium incorporation as well, however, the heterogeneous distribution of Nd in the solid phase noted during the AEM/EELS examination implies that neodymium may not incorporate into the structure of dehydrated schoepite.

  19. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  20. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  1. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  2. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  3. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  4. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  5. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  6. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  7. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  8. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  9. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  10. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  11. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  12. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  13. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  14. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  15. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  16. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  17. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  18. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  19. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  20. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  1. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  2. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  3. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  4. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  5. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  6. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  7. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  8. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01T23:59:59.000Z

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  9. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  10. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  11. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  12. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  13. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  14. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  15. ICM, Incorporated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet), GeothermalGridHYDROGEND DTechnologies |cents6, 201210-11, 2013ICM,

  16. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  17. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  18. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  19. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  20. Incorporation of the capillary hysteresis model HYSTR into the numerical code TOUGH

    SciTech Connect (OSTI)

    Niemi, A.; Bodvarsson, G.S.; Pruess, K.

    1991-11-01T23:59:59.000Z

    As part of the work performed to model flow in the unsaturated zone at Yucca Mountain Nevada, a capillary hysteresis model has been developed. The computer program HYSTR has been developed to compute the hysteretic capillary pressure -- liquid saturation relationship through interpolation of tabulated data. The code can be easily incorporated into any numerical unsaturated flow simulator. A complete description of HYSTR, including a brief summary of the previous hysteresis literature, detailed description of the program, and instructions for its incorporation into a numerical simulator are given in the HYSTR user`s manual (Niemi and Bodvarsson, 1991a). This report describes the incorporation of HYSTR into the numerical code TOUGH (Transport of Unsaturated Groundwater and Heat; Pruess, 1986). The changes made and procedures for the use of TOUGH for hysteresis modeling are documented.

  1. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  2. L-sodium lactate in cooked beef top rounds: differing levels of incorporation and cookery 

    E-Print Network [OSTI]

    Evans, Lori Leigh

    1992-01-01T23:59:59.000Z

    L-SODIUM LACTATE IN COOKED BEEF TOP ROUNDS; DIFFERING LEVELS OF INCORPORATION AND COOKERY A Thesis by LORI LEIGH EVANS Submitted to the Office of Graduate Studies of Texas A8 M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE May 1992 Major Subject: Animal Science L-SODIUM LACTATE IN COOKED BEEF TOP ROUNDS; DIFFERING LEVELS OF INCORPORATION AND COOKERY A Thesis by LORI LEIGH EVANS Approved as to style and content by: R. K. Miller (Chair...

  3. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  4. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  5. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  6. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  7. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  8. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  9. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  10. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  11. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  12. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  13. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  14. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  15. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  16. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  17. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  1. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  2. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  3. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  4. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  5. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  6. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  7. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  8. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  9. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  10. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  11. HIDDEN DAMAGE DETECTION FOR MAIN CABLES OF SUSPENSION BRIDGES INCORPORATING DC MAGNETIZATION WITH A SEARCH COIL-

    E-Print Network [OSTI]

    Boyer, Edmond

    with artificially inflicted broken wires. KEYWORDS : Cable NDE, Search coil, Total flux, DC magnetization, Damage. To overcome this limitation, this study proposes a noncontact cable inspection system incorporating been applied for the inspection of steel cables for ski lifts, elevators, and for other applications

  12. Incorporating WAAS Data Into an Ionospheric Model for Correcting Satellite Radar

    E-Print Network [OSTI]

    Toews, Carl

    at the Millstone Hill Satellite Tracking Radar. She currently holds a joint appointment with the Atmospheric corrections to radar measurements, incorporating data from a single receiver to generate TEC estimates that the GRIMS ionospheric model degenerates during times of sharp spatial TEC gradients, e.g. during geomagnetic

  13. POWERTECH 2009, JUNE 28 -JULY 2, 2009, BUCHAREST, ROMANIA 1 Incorporation of Demand Response Resources in

    E-Print Network [OSTI]

    Gross, George

    POWERTECH 2009, JUNE 28 - JULY 2, 2009, BUCHAREST, ROMANIA 1 Incorporation of Demand Response, IEEE, Abstract--The use of demand-side resources, in general, and demand response resources (DRRs concerns. Integration of demand response resources in the competitive electricity markets impacts resource

  14. Incorporating Knowledge of Secondary Structures in a L-System-Based Encoding

    E-Print Network [OSTI]

    Fernandez, Thomas

    Incorporating Knowledge of Secondary Structures in a L-System-Based Encoding for Protein Folding.Krasnogor@nottingham.ac.uk Abstract. An encoding scheme for protein folding on lattice models, inspired by parametric L that the occurrence of motifs and sub-structures is an important component in protein folding, and these sub

  15. Towards Automatic Incorporation of Search engines into a Large-Scale Metasearch Engine

    E-Print Network [OSTI]

    Meng, Weiyi

    Towards Automatic Incorporation of Search engines into a Large-Scale Metasearch Engine Zonghuan Wu. of Computer Science Univ. of Illinois at Chicago yu@cs.uic.edu Abstract A metasearch engine supports unified access to multiple component search engines. To build a very large-scale metasearch engine that can

  16. Hydrogen incorporation in stishovite at high pressure and symmetric hydrogen bonding in N-AlOOH

    E-Print Network [OSTI]

    Stixrude, Lars

    Hydrogen incorporation in stishovite at high pressure and symmetric hydrogen bonding in N significant amounts of hydrogen in stishovite under lower-mantle conditions. The enthalpy of solution pressure and temperature. We predict asymmetric hydrogen bonding in the stishovite^N-AlOOH solid solution

  17. Oil and Gas CDT Predicting fault permeability at depth: incorporating natural

    E-Print Network [OSTI]

    Henderson, Gideon

    Oil and Gas CDT Predicting fault permeability at depth: incorporating natural permeability controls on fluid flow in oil and gas reservoirs. Fault zones are composed of many deformation elements will receive 20 weeks bespoke, residential training of broad relevance to the oil and gas industry: 10 weeks

  18. Incorporating Drivability Metrics into Optimal Energy Management Strategies for Hybrid Vehicles

    E-Print Network [OSTI]

    Grizzle, Jessy W.

    Incorporating Drivability Metrics into Optimal Energy Management Strategies for Hybrid Vehicles fuel economy performance is highly sensitive to the energy management strategy used to select among are characterized by multiple energy sources; the control strategy to select among these multiple energy sources

  19. Project Summary Advances in video technology are being incorporated into today's healthcare practice. For example,

    E-Print Network [OSTI]

    Oh, JungHwan

    Project Summary Advances in video technology are being incorporated into today's healthcare a large body of knowledge in medical image analysis, video data generated during these procedures, analyze, and provide user-friendly and efficient access to the medical, scientific, or educational content

  20. Incorporating Optics into a Coupled Physical-Biological Forecasting System in the Monterey Bay

    E-Print Network [OSTI]

    Boss, Emmanuel S.

    Incorporating Optics into a Coupled Physical-Biological Forecasting System in the Monterey Bay Fei://www.marine.maine.edu/~eboss/index.html http://ourocean.jpl.nasa.gov/ LONG-TERM GOALS Modeling and predicting ocean optical properties for coastal waters requires linking optical properties with the physical, chemical, and biological processes

  1. Using Learning Styles and Preferences to Incorporate Emerging E-learning Tools in Teaching

    E-Print Network [OSTI]

    Yang, Yun

    across all learner types. 1. Introduction The adoption level of emerging e-learning tools is on the riseUsing Learning Styles and Preferences to Incorporate Emerging E-learning Tools in Teaching Nauman@ict.swin.edu.au Abstract Emerging e-learning tools have the potential to enrich academic environments. However

  2. Trace Metal Retention in the Incorporation Zone of Land-Applied

    E-Print Network [OSTI]

    Walter, M.Todd

    , with agricultural, forest, and range lands as well as land reclamation sites increasingly used for land applicationTrace Metal Retention in the Incorporation Zone of Land-Applied Sludge T A M M O S . S T E E N H U, Ithaca, New York 14853 Recycling nutrients in wastewater sludge (biosolids) via land application

  3. Heuristics for Creating Assignments to Incorporate Simulations REU Report, University of Colorado

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    of Colorado daniel.rehn@colorado.edu Abstract The use of simulations in learning physics is a topic of growing situation intended for student learning as a complex system. Not only does the simulation influence howHeuristics for Creating Assignments to Incorporate Simulations Danny Rehn REU Report, University

  4. Ge incorporation inside 4H-SiC during Homoepitaxial growth by chemical vapor

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Ge incorporation inside 4H-SiC during Homoepitaxial growth by chemical vapor deposition. Kassem Ilmenau (Germany) Abstract. In this work, we report on the addition of GeH4 gas during homoepitaxial growth of 4H-SiC by chemical vapour deposition. Ge introduction does not affect dramatically the surface

  5. Incorporating Cloud Distribution in Sky Representation Kuan-Chuan Peng, Tsuhan Chen

    E-Print Network [OSTI]

    Chen, Tsuhan

    science and related fields have proposed different sky models to fit the measured luminance or radiance parameters with the luminance of the sky by normalized cross correlation. However, the above works useIncorporating Cloud Distribution in Sky Representation Kuan-Chuan Peng, Tsuhan Chen Cornell

  6. A Methodology for Weapon System Availability Assessment, incorporating Failure, Damage and

    E-Print Network [OSTI]

    Boyer, Edmond

    A Methodology for Weapon System Availability Assessment, incorporating Failure, Damage systems can become unavailable due to system failures or damage to the system; in both cases, system the more specific availability studies take battlefield damage into account. This paper aims to define

  7. THREE-DIMENSIONAL LONGWAVE INFRARED (LWIR) SYNTHETIC IMAGE GENERATION INCORPORATING ANGULAR EMJSSWITY EFFECTS USING RAY-

    E-Print Network [OSTI]

    Salvaggio, Carl

    . These routines require a sequence of images to evaluate tracking algorithms. The evaluation of sensor performanceTHREE-DIMENSIONAL LONGWAVE INFRARED (LWIR) SYNTHETIC IMAGE GENERATION INCORPORATING ANGULAR Memorial Drive Rochester, New York 14623-0887 ABSTRAO A technique for longwave infrared (LWIR) synthetic

  8. Tungsten-incorporation induced red-shift in the bandgap of gallium oxide thin films

    SciTech Connect (OSTI)

    Rubio, E. J.; Ramana, C. V. [Department of Mechanical Engineering, University of Texas at El Paso, El Paso, Texas 79968 (United States)] [Department of Mechanical Engineering, University of Texas at El Paso, El Paso, Texas 79968 (United States)

    2013-05-13T23:59:59.000Z

    Tungsten (W) incorporated Ga{sub 2}O{sub 3} films were produced by co-sputter deposition. W-concentration was varied by the applied sputtering-power. The structure and optical properties of W-incorporated Ga{sub 2}O{sub 3} films were evaluated using X-ray diffraction, scanning electron microscopy, and spectrophotometric measurements. No secondary phase formation was observed in W-incorporated Ga{sub 2}O{sub 3} films. W-induced effects were significant on the structure and optical properties of Ga{sub 2}O{sub 3} films. The bandgap of Ga{sub 2}O{sub 3} films without W-incorporation was {approx}5 eV. Red-shift in the bandgap was noted with increasing W-concentration indicating the electronic structure changes in W-Ga{sub 2}O{sub 3} films. A functional relationship between W-concentration and optical property is discussed.

  9. Incorporating and Evaluating Environmental Instream Flows in a Priority Order Based Surface Water Allocation Model

    E-Print Network [OSTI]

    Pauls, Mark

    2014-03-18T23:59:59.000Z

    ............................................................................................................ 120 Figure 20. Comparison of Engaged Period Reliability versus Allowable Deficit (M3B) between Trinity WAM Control Points for All Instream Flow Targets... INCORPORATING AND EVALUATING ENVIRONMENTAL INSTREAM FLOWS IN A PRIORITY ORDER BASED SURFACE WATER ALLOCATION MODEL A Thesis by MARK ALLEN PAULS Submitted to the Office of Graduate and Professional Studies of Texas A&M University...

  10. Cell Cycle and Chaperone-Mediated Regulation of H3K56ac Incorporation in Yeast

    E-Print Network [OSTI]

    Friedman, Nir

    Cell Cycle­ and Chaperone-Mediated Regulation of H3K56ac Incorporation in Yeast Tommy Kaplan1 of Massachusetts Medical School, Worcester, Massachusetts, United States of America, 4 Programs in Gene Function and Expression and Molecular Medicine, University of Massachusetts Medical School, Worcester, Massachusetts

  11. Recombinant Nup153 Incorporates in Vivo into Xenopus Oocyte Nuclear Pore Complexes

    E-Print Network [OSTI]

    Panté, Nelly

    of the nuclear basket of the nuclear pore complex (NPC) that plays a critical role in nuclear export of RNAsRecombinant Nup153 Incorporates in Vivo into Xenopus Oocyte Nuclear Pore Complexes Nelly Pante´,*,1 and pro- teins. In an effort to map this nucleoporin more precisely within the nuclear basket we have

  12. Incorporating Drivability Metrics into Optimal Energy Management Strategies for Hybrid Vehicles Part 1: Model, Methods, and

    E-Print Network [OSTI]

    Grizzle, Jessy W.

    Incorporating Drivability Metrics into Optimal Energy Management Strategies for Hybrid Vehicles-parallel configuration considered here. Hybrid vehicles are characterized by multiple energy sources; the strategy Gillespie, Jeffrey A. Cook, and J.W. Grizzle Abstract--Hybrid Vehicle fuel economy performance is highly

  13. Incorporation of Detailed Chemical Mechanisms in Reactive Flow Simulations Using Element-Flux Analysis

    E-Print Network [OSTI]

    Androulakis, Ioannis (Yannis)

    ignition (HCCI) combustion with detailed chemistry by using the proposed on-the-fly reduction scheme detailed characterizations of in-cylinder behaviors in stratified HCCI engines by incorporating detailed was proposed for HCCI engines in which homogeneous charge was used. However, although termed "homogeneous

  14. Improving Pointwise Mutual Information (PMI) by Incorporating Significant Co-occurrence

    E-Print Network [OSTI]

    Damani, Om P.

    Improving Pointwise Mutual Information (PMI) by Incorporating Significant Co-occurrence Om P measure Pointwise Mutual Infor- mation (PMI). By extensive experiments with a large number of publicly level significance is not helpful for PMI adaptation. 1 Introduction Co-occurrence based word

  15. A GIS-Assisted Rail Construction Econometric Model that Incorporates LlDAR Data

    E-Print Network [OSTI]

    Hodgson, Michael E.

    A GIS-Assisted Rail Construction Econometric Model that Incorporates LlDAR Data David J. Cowen employed a raster GIS econometric routing model for the exploration of potential routes using construction in the grid-based econometric model was obtained from Light Detection and Ranging (LIDAR)data with accurate 0

  16. A THz transverse electromagnetic mode two-dimensional interconnect layer incorporating quasi-optics

    E-Print Network [OSTI]

    of transmitting subpicosecond pulses in the transverse electromagnetic TEM mode over arbitrarily long paths near the cutoff fre- quency. Such pulse broadening does not occur for the trans- verse electromagneticA THz transverse electromagnetic mode two-dimensional interconnect layer incorporating quasi

  17. Incorporation of H2 in vitreous silica, qualitative and quantitative determination from Raman and infrared

    E-Print Network [OSTI]

    Boyer, Edmond

    the quench. #12;1. Introduction The incorporation of volatiles such as noble gases, carbon dioxide and water properties affected by the presence of the volatiles and their related species in the silicate network (see] and to affect optical properties of vitreous silica [14, 15]. Therefore, the dissolution mechanisms of water

  18. Extended light scattering model incorporating coherence for thin-film silicon solar cells

    E-Print Network [OSTI]

    Lenstra, Arjen K.

    Extended light scattering model incorporating coherence for thin-film silicon solar cells Thomas film solar cells. The model integrates coherent light propagation in thin layers with a direct, non efficiency spectra of state-of-the-art microcrystalline silicon solar cells. The simulations agree very well

  19. Incorporating psychosocial characteristics in cost-effectiveness modelling of Type 1 diabetes

    E-Print Network [OSTI]

    Oakley, Jeremy

    Incorporating psychosocial characteristics in cost-effectiveness modelling of Type 1 diabetes Unit of Diabetes, Endocrinology and Metabolism, School of Medicine and Biomedical Sciences, University education programme that aims to teach individuals with Type 1 diabetes to change their self-care behaviours

  20. A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural Health Monitoring

    E-Print Network [OSTI]

    Stanford University

    1 A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural of wind turbines and reducing the life-cycle costs significantly. This paper presents a life-cycle management (LCM) framework for online monitoring and performance assessment of wind turbines, enabling

  1. A creep model for austenitic stainless steels incorporating cavitation and wedge cracking

    E-Print Network [OSTI]

    Mahesh, Sivasambu

    A creep model for austenitic stainless steels incorporating cavitation and wedge cracking S Mahesh evolution in the form of cavitation and wedge- cracking on grain boundary facets is considered. Both: Austenitic stainless steel, creep, grain boundary sliding, cavitation, wedge- cracking. Submitted to

  2. Incorporation of Short-Lived Be in a Calcium-Aluminum

    E-Print Network [OSTI]

    Incorporation of Short-Lived 10 Be in a Calcium-Aluminum­ Rich Inclusion from the Allende Meteorite Kevin D. McKeegan,1 * Marc Chaussidon,2 Franc¸ois Robert3 Enrichments in boron-10/boron-11 in a calcium-aluminum canonical abundance of aluminum-26 may still require seeding of the solar system by radioactive stellar

  3. A Platform to Automatically Generate and Incorporate Documents into an Ontology-Based Content Repository

    E-Print Network [OSTI]

    Baader, Franz

    A Platform to Automatically Generate and Incorporate Documents into an Ontology-Based Content a documentation gen- eration platform that automatically derives content and in- corporates generated content and object properties is accomplished by the documentation generation platform. Eventually, our ap- proach

  4. Incorporating Irregular Nonlinear Waves in Coupled Simulation of Offshore Wind Turbines

    E-Print Network [OSTI]

    Manuel, Lance

    Incorporating Irregular Nonlinear Waves in Coupled Simulation of Offshore Wind Turbines Puneet, and Environmental Engineering The University of Texas, Austin, TX 78712 Design of an offshore wind turbine requires on the support structure (monopile) of an offshore wind turbine. We present the theory for the irregular

  5. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  6. Incorporation of reactive magnesia and quicklime in sustainable binders for soil stabilisation

    E-Print Network [OSTI]

    Gu, Kai; Jin, Fei; Al-Tabbaa, Abir; Shi, Bin; Liu, Chun; Gao, Lei

    2015-05-27T23:59:59.000Z

    University, 163 Xianlin Avenue, Nanjing, China, 210023 2 Key Laboratory of Ministry of Education for Geomechanics and Embankment Engineering, Hohai University, 1 Xikang Road, Nanjing 210098, China 3 Department of Engineering, University of Cambridge... ), the National Basic Research Program of China (2011CB710605) and the Key Laboratory of Ministry of Education for Geomechanics and Embankment Engineering, Hohai University (GH201406). The first author would like to thank the China Scholarship Council...

  7. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  8. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  9. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  10. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  11. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  12. Oklahoma BEEF Incorporated (OBI) Bull Delivery Sheet Central bull testing at Oklahoma BEEF, Incorporated, is managed and supervised with the emphasis on the performance, health, and safety of the bulls; however, Oklahoma

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    Oklahoma BEEF Incorporated (OBI) Bull Delivery Sheet Central bull testing at Oklahoma BEEF; however, Oklahoma BEEF, Incorporated, its board of directors, employees, advisors and office secretary for Oklahoma Cattle *Out of state cattle must comply with Oklahoma Animal Health requirements Date Tested

  13. Action of aspartate on the /sup 32/Pi incorporation into phospholipids of cerebral cortex

    SciTech Connect (OSTI)

    de Scarnati, O.C.; Sato, M.; De Robertis, E.

    1982-02-01T23:59:59.000Z

    The effect of L-aspartate on the /sup 32/Pi incorporation of phospholipids, was studied on slices of rat cerebral cortex. This amino acid produced an inhibitory effect in concentrations 0.01-10 mM, which was more evident at 120 min. This effect was not stereospecific and did not imply a change in Pi uptake and in nucleotides approximating P precursors. The inhibition was present in PS, PC, PE and to a lesser extent in Pi. On liver slices 1 mM L-aspartate had the opposite effect, stimulating the incorporation of /sup 32/Pi into total phospholipids. Our results suggest that the effect of L-aspartate is by a non-specific mechanism, probably not mediated by a receptor.

  14. Incorporating any amendments approved at subsequent Council meetings The University of Dublin

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    Walsh, of the School of Education. (iv) CL12-13/063, delete the sentence `Professor D C Williams ... two) CL12-13/024 (i), line 5, amend to Dean of Students. (iii) CL12-13/025, third line from end, Professor will be incorporated into DCU and thus form part of the institute of education made up of DCU, St Patrick's College

  15. Incorporation of analgesics into rodent embryo transfer protocols: assessing the effects on reproductive outcomes 

    E-Print Network [OSTI]

    Burckhardt, Heather Ann

    2009-05-15T23:59:59.000Z

    Approved by: Chair of Committee, Melanie M. Ihrig Committee Members, Ann B. Kier Jane C. Welsh Head of Department, Gerald R. Bratton December 2006 Major Subject: Laboratory Animal Medicine iii ABSTRACT Incorporation... of Analgesics into Rodent Embryo Transfer Protocols: Assessing the Effects on Reproductive Outcomes. (December 2006) Heather Ann Burckhardt, B.S., Texas A&M University Chair of Advisory Committee: Dr. Melanie M. Ihrig Surgical embryo transfer...

  16. Creating Reliable Data and Reporting to Support Strategic Energy Management at Corning Incorporated

    E-Print Network [OSTI]

    Garforth, P.

    2014-01-01T23:59:59.000Z

    Creating Reliable Data & Reporting to Support Strategic Energy Management at Corning Incorporated Industrial Energy Technology Conference May 20th, 2014 New Orleans, Louisiana Peter Garforth Garforth International llc Energy Managers’ Workshop ESL... relevant energy data to support Corporate performance targets ESL-IE-14-05-29 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference New Orleans, LA. May 20-23, 2014 Performance Reporting Totals – Usage, Cost, GHG-Emissions Corp Division...

  17. Effect of silver incorporation in phase formation and band gap tuning of tungsten oxide thin films

    SciTech Connect (OSTI)

    Jolly Bose, R.; Kumar, R. Vinod; Sudheer, S. K.; Mahadevan Pillai, V. P. [Department of Optoelectronics, University of Kerala, Kariyavattom, Thiruvananthapuram, Kerala 695581 (India); Reddy, V. R.; Ganesan, V. [UGC - DAE Consortium for Scientific Research, Khandwa Road, Indore 452017, Madhyapradesh (India)

    2012-12-01T23:59:59.000Z

    Silver incorporated tungsten oxide thin films are prepared by RF magnetron sputtering technique. The effect of silver incorporation in micro structure evolution, phase enhancement, band gap tuning and other optical properties are investigated using techniques such as x-ray diffraction, micro-Raman spectroscopy, atomic force microscopy, scanning electron microscopy, energy dispersive x-ray spectroscopy, and UV-Visible spectroscopy. Effect of silver addition in phase formation and band gap tuning of tungsten oxide thin films are investigated. It is found that the texturing and phase formation improves with enhancement in silver content. It is also found that as the silver incorporation enhances the thickness of the films increases at the same time the strain in the film decreases. Even without annealing the desired phase can be achieved by doping with silver. A broad band centered at the wavelength 437 nm is observed in the absorption spectra of tungsten oxide films of higher silver incorporation and this can be attributed to surface plasmon resonance of silver atoms present in the tungsten oxide matrix. The transmittance of the films is decreased with increase in silver content which can be due to increase in film thickness, enhancement of scattering, and absorption of light caused by the increase of grain size, surface roughness and porosity of films and enhanced absorption due to surface plasmon resonance of silver. It is found that silver can act as the seed for the growth of tungsten oxide grains and found that the grain size increases with silver content which in turn decreases the band gap of tungsten oxide from 3.14 eV to 2.70 eV.

  18. Program management: The keys to a successful ERWM contract

    SciTech Connect (OSTI)

    Lenyk, R.G.; Cusack, J.G. [Foster Wheeler Environmental Corp., Oak Ridge, TN (United States)

    1995-12-31T23:59:59.000Z

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals.

  19. First-principles calculations of the stability and incorporation of helium, xenon and krypton in uranium

    SciTech Connect (OSTI)

    B. Beeler; B. Good; S. Rashkeev; M. Baskes; M. Okuniewski

    2012-06-01T23:59:59.000Z

    While metallic fuels have a long history of reactor use, their fundamental physical and thermodynamic properties are not well understood. Many metallic nuclear fuels are body-centered cubic alloys of uranium that swell under fission conditions, creating fission product gases such as helium, xenon and krypton. In this paper, helium, xenon, and krypton point defects are investigated in the a and ? phases of metallic uranium using first principles calculations. A density functional theory (DFT) framework is utilized with projector augmented-wave (PAW) pseudopotentials. Formation and incorporation energies of He, Xe, and Kr are calculated at various defect positions for the prediction of fission gas behavior in uranium. In most cases, defect energies follow a size effect, with helium incorporation and formation energies being the smallest. The most likely position for the larger Xe and Kr atoms in uranium is the substitutional site. Helium atoms are likely to be found in a wide variety of defect positions due to the comparable formation energies of all defect configurations analyzed. This is the first detailed study of the stability and incorporation of fission gases in uranium.

  20. Improving the Power Conversion Efficiency of Ultrathin Organic Solar Cells by Incorporating Plasmonic Effects of Spheroidal Metallic Nanoparticles

    E-Print Network [OSTI]

    Park, Namkyoo

    Improving the Power Conversion Efficiency of Ultrathin Organic Solar Cells by Incorporating be exploited to achieve efficient harvesting of solar energy. Notably, the incorporation of plasmonic effects can allow the light harvesting capability of a solar cell to be maintained even as the thickness

  1. Test Procedure for 170.302.h Incorporate Laboratory Test Results APPROVED Version 1.1 September 24, 2010

    E-Print Network [OSTI]

    Test Procedure for §170.302.h Incorporate Laboratory Test Results APPROVED Version 1.1 September 24, 2010 1 Test Procedure for §170.302 (h) Incorporate Laboratory Test Results This document describes the test procedure for evaluating conformance of complete EHRs or EHR modules1

  2. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  3. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  4. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  5. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  6. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  7. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  8. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  9. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  10. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  11. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  12. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  13. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  14. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  15. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  16. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  17. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  18. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  19. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  20. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  1. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  2. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  3. Alteration of Sediments by Hyperalkaline KRich Cement Leachate: Implications for Strontium Adsorption and Incorporation

    E-Print Network [OSTI]

    Burke, Ian

    speciation and mobility is key to the safe decommissioning of nuclear sites, some of which are considered, LS2 9JT, United Kingdom Research Centre for Radwaste and Decommissioning and Williamson Research13 9PL, United Kingdom § National Nuclear Laboratory, Risley, Warrington, Cheshire, WA3 6AE, United

  4. A Physically Based Analytical Model to Predict Quantized Eigen Energies and Wave Functions Incorporating Penetration Effect

    E-Print Network [OSTI]

    Nadim Chowdhury; Imtiaz Ahmed; Zubair Al Azim; Md. Hasibul Alam; Iftikhar Ahmad Niaz; Quazi D. M. Khosru

    2014-04-14T23:59:59.000Z

    We propose a physically based analytical compact model to calculate Eigen energies and Wave functions which incorporates penetration effect. The model is applicable for a quantum well structure that frequently appears in modern nano-scale devices. This model is equally applicable for both silicon and III-V devices. Unlike other models already available in the literature, our model can accurately predict all the eigen energies without the inclusion of any fitting parameters. The validity of our model has been checked with numerical simulations and the results show significantly better agreement compared to the available methods.

  5. An Optical Offgas Sensor Network Incorporating a HG Cavity Ringdown Spectrometer and IR Diode Lasers

    SciTech Connect (OSTI)

    George P. Miller

    2007-12-30T23:59:59.000Z

    A multi-element cavity ringdown system was evaluated with the objective of developing an intelligent sensor network to be incorporated into the control systems for advanced coal combustion facilities. Using a combination of a YAG-pumped dye laser and a tunable NIR/IR laser a dual cavity was constructed and a labview program was developed to provide multi-channel, real-time data to permit the real-time monitoring of typical exhaust emission gases, (for example: CO{sub 2}, SO{sub 2}, and mercury) of concern to the next generation of coal-powered facilities.

  6. Site specific incorporation of heavy atom-containing unnatural amino acids into proteins for structure determination

    DOE Patents [OSTI]

    Xie, Jianming (San Diego, CA); Wang, Lei (San Diego, CA); Wu, Ning (Boston, MA); Schultz, Peter G. (La Jolla, CA)

    2008-07-15T23:59:59.000Z

    Translation systems and other compositions including orthogonal aminoacyl tRNA-synthetases that preferentially charge an orthogonal tRNA with an iodinated or brominated amino acid are provided. Nucleic acids encoding such synthetases are also described, as are methods and kits for producing proteins including heavy atom-containing amino acids, e.g., brominated or iodinated amino acids. Methods of determining the structure of a protein, e.g., a protein into which a heavy atom has been site-specifically incorporated through use of an orthogonal tRNA/aminoacyl tRNA-synthetase pair, are also described.

  7. Tools for incorporating a D-wave contribution in Skyrme energy density functionals

    E-Print Network [OSTI]

    P. Becker; D. Davesne; J. Meyer; A. Pastore; J. Navarro

    2014-06-02T23:59:59.000Z

    The possibility of adding a D-wave term to the standard Skyrme effective interaction has been widely considered in the past. Such a term has been shown to appear in the next-to-next-to-leading order of the Skyrme pseudo-potential. The aim of the present article is to provide the necessary tools to incorporate this term in a fitting procedure: first, a mean-field equation written in spherical symmetry in order to describe spherical nuclei and second, the response function to detect unphysical instabilities. With these tools it will be possible to build a new fitting procedure to determine the coupling constants of the new functional.

  8. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  9. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  10. Incorporation of Multi-Member Substructure Capabilities in FAST for Analysis of Offshore Wind Turbines: Preprint

    SciTech Connect (OSTI)

    Song, H.; Robertson, A.; Jonkman, J.; Sewell, D.

    2012-05-01T23:59:59.000Z

    FAST, developed by the National Renewable Energy Laboratory (NREL), is an aero-hydro-servo-elastic tool widely used for analyzing onshore and offshore wind turbines. This paper discusses recent modifications made to FAST to enable the examination of offshore wind turbines with fixed-bottom, multi-member support structures (which are commonly used in transitional-depth waters).; This paper addresses the methods used for incorporating the hydrostatic and hydrodynamic loading on multi-member structures in FAST through its hydronamic loading module, HydroDyn. Modeling of the hydrodynamic loads was accomplished through the incorporation of Morison and buoyancy loads on the support structures. Issues addressed include how to model loads at the joints of intersecting members and on tapered and tilted members of the support structure. Three example structures are modeled to test and verify the solutions generated by the modifications to HydroDyn, including a monopile, tripod, and jacket structure. Verification is achieved through comparison of the results to a computational fluid dynamics (CFD)-derived solution using the commercial software tool STAR-CCM+.

  11. The incorporation of technetium into a representative low-activity waste glass

    SciTech Connect (OSTI)

    Ebert, W.L.; Bakel, A.J.; Bowers, D.L.; Buck, E.C.; Emery, J.W.

    1997-08-01T23:59:59.000Z

    A glass that has been tested to understand the corrosion behavior of waste glasses with high soda contents for immobilizing Hanford incidental wastes has been made by melting crushed glass with either TcO{sub 2} or NaTcO{sub 4} at 1,100--1,300 C. Incorporation of technetium in the glass was affected by solubility or kinetic effects. Metallic technetium inclusions formed in all the TcO{sub 2}-doped glasses. Inclusions also formed in glasses with added NaTcO{sub 4} that were melted at 1,100 C, but a glass melted at 1,200 C did not contain detectable inclusions. The presence of Tc-bearing inclusions complicates the interpretation of results from dissolution tests because of the simultaneous release of technetium from more than one phase, the unknown surface areas of each phase, and the possible incorporation of technetium that is released from one phase into another phase. A glass containing about 0.15 mass % Tc dissolved in the glass is being used in dissolution tests to study the release behavior of technetium.

  12. Oxygen Incorporation During Fabrication of Substrate CdTe Photovoltaic Devices: Preprint

    SciTech Connect (OSTI)

    Duenow, J. N.; Dhere, R. G.; Kuciauskas, D.; Li, J. V.; Pankow, J. W.; DeHart, C. M.; Gessert, T. A.

    2012-06-01T23:59:59.000Z

    Recently, CdTe photovoltaic (PV) devices fabricated in the nonstandard substrate configuration have attracted increasing interest because of their potential compatibility with flexible substrates such as metal foils and polymer films. This compatibility could lead to the suitability of CdTe for roll-to-roll processing and building-integrated PV. Currently, however, the efficiencies of substrate CdTe devices reported in the literature are significantly lower ({approx}6%-8%) than those of high-performance superstrate devices ({approx}17%) because of significantly lower open-circuit voltage (Voc) and fill factor (FF). In our recent device development efforts, we have found that processing parameters required to fabricate high-efficiency substrate CdTe PV devices differ from those necessary for traditional superstrate CdTe devices. Here, we investigate how oxygen incorporation in the CdTe deposition, CdCl2 heat treatment, CdS deposition, and post-deposition heat treatment affect device characteristics through their effects on the junction. By adjusting whether oxygen is incorporated during these processing steps, we have achieved Voc values greater than 860 mV and efficiencies greater than 10%.

  13. Behavior of aluminum adsorption and incorporation at GaN(0001) surface: First-principles study

    SciTech Connect (OSTI)

    Qin, Zhenzhen; Xiong, Zhihua, E-mail: xiong-zhihua@126.com; Wan, Qixin [Key Laboratory for Optoelectronics and Communication of Jiangxi Province, Jiangxi Science and Technology Normal University, Nanchang 330018 (China); Qin, Guangzhao [Theoretical Condensed Matter Physics and Computational Materials Physics Laboratory, University of Chinese Academy of Sciences, Beijing 101408 (China)

    2013-11-21T23:59:59.000Z

    First-principles calculations are performed to study the energetics and atomic structures of aluminum adsorption and incorporation at clean and Ga-bilayer GaN(0001) surfaces. We find the favorable adsorption site changes from T4 to T1 as Al coverage increased to 1 monolayer on the clean GaN(0001) surface, and a two-dimensional hexagonal structure of Al overlayer appears. It is interesting the Al atoms both prefer to concentrate in one deeper Ga layer of clean and Ga-bilayer GaN(0001) surface, respectively, while different structures could be achieved in above surfaces. For the case of clean GaN(0001) surface, corresponding to N-rich and moderately Ga-rich conditions, a highly regular superlattice structure composed of wurtzite GaN and AlN becomes favorable. For the case of Ga-bilayer GaN(0001) surface, corresponding to extremely Ga-rich conditions, the Ga bilayer is found to be sustained stable in Al incorporating process, leading to an incommensurate structure directly. Furthermore, our calculations provide an explanation for the spontaneous formation of ordered structure and incommensurate structure observed in growing AlGaN films. The calculated results are attractive for further development of growth techniques and excellent AlGaN/GaN heterostructure electronic devices.

  14. Superharmonic nonlinear lateral vibrations of a segmented driveline incorporating a tuned damper excited by non-constant velocity joints

    E-Print Network [OSTI]

    Browne, Michael

    2010-07-14T23:59:59.000Z

    SUPERHARMONIC NONLINEAR LATERAL VIBRATIONS OF A SEGMENTED DRIVELINE INCORPORATING A TUNED DAMPER EXCITED BY NON-CONSTANT VELOCITY JOINTS A Dissertation by MICHAEL SCOTT BROWNE Submitted to the Office of Graduate Studies... of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2009 Major Subject: Mechanical Engineering SUPERHARMONIC NONLINEAR LATERAL VIBRATIONS OF A SEGMENTED DRIVELINE INCORPORATING A...

  15. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  16. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  17. Influence of Cobalt Nanoparticles' Incorporation on the Magnetic Properties of the Nickel Nanofibers: Cobalt-Doped Nickel Nanofibers Prepared by Electrospinning

    E-Print Network [OSTI]

    Kim, Bongsoo

    , magnetic refrigeration systems, and contrast enhancement in magnetic resonance imaging carriers for drugsInfluence of Cobalt Nanoparticles' Incorporation on the Magnetic Properties of the Nickel, 2009 Among the common ferromagnetic metals, cobalt has distinct magnetic properties, so incorporation

  18. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  19. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  20. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas