Sample records for key assumptions domestic

  1. Key Assumptions Policy Issues

    E-Print Network [OSTI]

    Supply Limitations 8 Withi h B l i8. Within-hour Balancing 9. Capacity and Energy Values for Wind · Independent Power Producers C t ti· Current assumptions · Winter: full availability ~ 3,200 MW · Summer: 1 t b it d d li d· Thermal: must be sited and licensed · Wind/solar: must be sited and licensed · EE

  2. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  4. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  5. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  6. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    will be stacked three high. c. Lead used in the shielding can come from DOE inventories, and any radiological component of the lead will be negligible in the context of the radiological characteristics of the inventory containers handled as three packs 5. Hazardous Waste Facility Permit a. The HWFP will require modification b

  7. From Domestic vs. International to Domestic and International

    E-Print Network [OSTI]

    Amin, S. Massoud

    % 20% 30% 40% 50% 60% 70% 80% 90% 100% Domestic International International Domestic 100% 67% 86% 29

  8. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    assumptions regarding technically recoverable oil resources. Inputs to these resource estimates include the USGS World Petroleum Assessment of 2000 and oil reserves...

  9. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

    E-Print Network [OSTI]

    Keinan, Alon

    Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Ran Canetti-up or public keys. Tel Aviv University, Email: Canetti@tau.ac.il Cornell University, E-Mail: huijia

  10. Optima Dock Synchronization under Different Delay Assumptions

    E-Print Network [OSTI]

    Lynch, Nancy

    Projects, National Autonomous University of Mexico (UNAM). Email: iryktvmhbitnet or anarCwatson. ibm by broadcast networks in which every message arrives to all processors at approximately the same time, message passing systems, networks, optimization, message delay assumptions, precision. Department

  11. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ; adjusted to 2012$, state construction cost index, vintage of cost estimate, scope of estimate to extent's Discussion Aeroderivative Gas Turbine Technology Proposed reference plant and assumptions Preliminary cost Robbins 2 #12;Peaking Power Plant Characteristics 6th Power Plan ($2006) Unit Size (MW) Capital Cost ($/k

  12. Supply-side Resources & Planning Assumptions

    E-Print Network [OSTI]

    - station Solar PV (from 6th Plan) 25 MW dc/20 MW net ac output using flat plate non concentrating single) ­ Storage Resource assessment data needs and applications R d f t Resources proposed for assessment Forecasts ProCost 46/19/2013 #12;6/19/2013 3 Resource data & planning assumptions Reference plant (New

  13. EVA PLANNING ASSUMPTIONS LRV TRAVERSE ASSESSMENT

    E-Print Network [OSTI]

    Rathbun, Julie A.

    VALUE. #12;ASSUMPTIONS {CONT) e METABOLIC RATES · LM OVERHEAD 1050 BTU/HR · ALSEP 1050 BTU/HR · STATION 950 BTU/HR · RIDING 550 BTU/HR #12;ACTIVITY 'METABOLIC .COMPARISON 15 ACTUAL VERSUS 16 PLANNING AVERAGE METABOLIC RATE (BTU I HR) ACTIVITY 15 ACTUAL 16 PLANNING CDR LMP LM OVERHEAD 1246 1060 '1050

  14. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01T23:59:59.000Z

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  15. U.S. Domestic

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Buildingto17 34 44Year Jan Feb Mar Apr May Jun602 1,39720Sales1 Domestic and

  16. U.S. Domestic

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Buildingto17 34 44Year Jan Feb Mar Apr May Jun602 1,39720Sales1 Domestic and2

  17. Role of CCTs in the evolving domestic electricity market

    SciTech Connect (OSTI)

    Grahame, T.J. [Dept. of Energy, Washington, DC (United States). Office of Coal and Power Systems

    1997-12-31T23:59:59.000Z

    The paper summarizes the key points and issues in the role of clean coal technologies in the domestic marketplace. Then suggested solutions to bringing precommercial CCTs to the market are presented. Finally, the outlook for possible actions by government and the private sector are briefly discussed.

  18. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  19. 2013 Domestic Uranium Production Report

    E-Print Network [OSTI]

    Administration (EIA), the statistical and analytical agency within the U.S. Department of Energy. By law, EIA.S. Energy Information Administration | 2013 Domestic Uranium Production Report iii Preface The U.S. Energy://www.eia.doe.gov/glossary/. #12;U.S. Energy Information Administration | 2013 Domestic Uranium Production Report iv Contents

  20. AFFIDAVIT OF TERMINATION OF DOMESTIC PARTNERSHIP Declaration

    E-Print Network [OSTI]

    Ohta, Shigemi

    AFFIDAVIT OF TERMINATION OF DOMESTIC PARTNERSHIP Declaration I of Termination of Domestic Partnership form to my former Domestic Partner on ____________________, 20 or misleading statement made will subject me to disciplinary action up to and including termination

  1. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  2. WA_96_016_AIR_PRODUCTS_AND_CHEMICALS_INC_Waiver_of_Domestic_...

    Broader source: Energy.gov (indexed) [DOE]

    16AIRPRODUCTSANDCHEMICALSINCWaiverofDomestic.pdf WA96016AIRPRODUCTSANDCHEMICALSINCWaiverofDomestic.pdf WA96016AIRPRODUCTSANDCHEMICALSINCWaiverofDomest...

  3. State Support of Domestic Production

    SciTech Connect (OSTI)

    Amy Wright

    2007-12-30T23:59:59.000Z

    This project was developed in response to a cooperative agreement offering by the U.S. Department of Energy (DOE) and the National Energy Technology Laboratory (NETL) under the State Support of Domestic Production DE-FC26-04NT15456. The Interstate Oil and Gas Compact Commission (IOGCC) performed efforts in support of State programs related to the security, reliability and growth if our nation's domestic production of oil and natural gas. The project objectives were to improve the States ability to monitor the security of oil and gas operations; to maximize the production of domestic oil and natural gas thereby minimizing the threat to national security posed by interruptions in energy imports; to assist States in developing and maintaining high standards of environmental protection; to assist in addressing issues that limit the capacity of the industry; to promote the deployment of the appropriate application of technology for regulatory efficiency; and to inform the public about emerging energy issues.

  4. addressing domestic violence: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    domestic violence and abuse. There is help available. Understanding domestic violence and abuse Men can be victims, too Women Leistikow, Bruce N. 9 Domestic violence is a health...

  5. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  6. The domestic travel sector in China

    E-Print Network [OSTI]

    Anders, Jeff, M.B.A. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    China is already the largest domestic tourism market in the world. Chinese citizens made as many as 800 million overnight domestic trips in 2005. While travel is not a new concept in China, the disposable income they wield, ...

  7. MONITORED GEOLOGIC REPOSITORY LIFE CYCLE COST ESTIMATE ASSUMPTIONS DOCUMENT

    SciTech Connect (OSTI)

    R.E. Sweeney

    2001-02-08T23:59:59.000Z

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost (LCC) estimate and schedule update incorporating information from the Viability Assessment (VA) , License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance.

  8. Computational soundness for standard assumptions of formal cryptography

    E-Print Network [OSTI]

    Herzog, Jonathan, 1975-

    2004-01-01T23:59:59.000Z

    This implementation is conceptually simple, and relies only on general assumptions. Specifically, it can be thought of as a 'self-referential' variation on a well-known encryption scheme. 4. Lastly, we show how the ...

  9. 2014 Domestic Uranium Production Report

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40Coal Stocks at Commercial andSeptember 25,9,1996 N Y MDomesticDomestic Uranium

  10. Sandia National Laboratories: domestic reuse of wastewater

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    domestic reuse of wastewater Sandia, the Atlantic Council, and NM Water Resource Research Institute Sponsor Roundtable on Western Water Scarcity On October 4, 2013, in Climate,...

  11. Seeking New Approaches to Investigate Domestication Events |...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department of Anthropology and Zooarcheology Laboratory The domestication of wild animal species has underpinned some of the most fundamental developments in human...

  12. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  13. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  14. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    context of Alaska oil production taxes, comparing MAPA and ACES to the original petroleum profits tax (PPT1 COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1 Matthew Berman In a recent analysis comparing the current oil production tax, More Alaska Production Act (MAPA, also known as SB 21

  15. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  16. Effects of internal gain assumptions in building energy calculations

    SciTech Connect (OSTI)

    Christensen, C.; Perkins, R.

    1981-01-01T23:59:59.000Z

    The utilization of direct solar gains in buildings can be affected by operating profiles, such as schedules for internal gains, thermostat controls, and ventilation rates. Building energy analysis methods use various assumptions about these profiles. The effects of typical internal gain assumptions in energy calculations are described. Heating and cooling loads from simulations using the DOE 2.1 computer code are compared for various internal-gain inputs: typical hourly profiles, constant average profiles, and zero gain profiles. Prototype single-family-detached and multi-family-attached residential units are studied with various levels of insulation and infiltration. Small detached commercial buildings and attached zones in large commercial buildings are studied with various levels of internal gains. The results of this study indicate that calculations of annual heating and cooling loads are sensitive to internal gains, but in most cases are relatively insensitive to hourly variations in internal gains.

  17. GNEP Element:Expand Domestic Use of Nuclear Power | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Expand Domestic Use of Nuclear Power GNEP Element:Expand Domestic Use of Nuclear Power A report discussing the intentions of the GNEP. GNEP Element:Expand Domestic Use of Nuclear...

  18. 16 Heat Transfer and Air Flow in a Domestic Refrigerator

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    445 16 Heat Transfer and Air Flow in a Domestic Refrigerator Onrawee Laguerre UMR Génie Industriel...............................................447 16.2.1 Studies in Domestic Refrigerators...................................................................................... 451 16.3 Cold Production System in Domestic Refrigerators

  19. Notes 01. The fundamental assumptions and equations of lubrication theory

    E-Print Network [OSTI]

    San Andres, Luis

    2009-01-01T23:59:59.000Z

    for unsteady or transient motions ? Journal angular speed (rad/s) NOTES 1. THE FUNDAMENTAL ASSUMPTIONS IN HYDRODYNAMIC LUBRICATION ? Dr. Luis San Andr?s (2009) 2 Fluid flow in a general physical domain is governed by the principles of: a) conservation... of the runner surface. For example, in journal bearings U * =?R J where ? is the journal angular speed in rad/s. Substitution of the dimensionless variables into the continuity equation (1) renders the following expression 0...

  20. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  1. american turkey domestication: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to precontact Native the region, butrules out the South Mexican domestic turkey(Melea- gris gallopavo gallopavo) as a progenitor Kemp, Brian M. 4 The Paradox of Domesticity:...

  2. Global Nuclear Energy Partnership Fact Sheet - Expand Domestic...

    Broader source: Energy.gov (indexed) [DOE]

    Expand Domestic Use of Nuclear Power Global Nuclear Energy Partnership Fact Sheet - Expand Domestic Use of Nuclear Power GNEP will build on the recent advances made by the...

  3. Table 22. Domestic Crude Oil First Purchase Prices for Selected...

    U.S. Energy Information Administration (EIA) Indexed Site

    Form EIA-182, "Domestic Crude Oil First Purchase Report." 22. Domestic Crude Oil First Purchase Prices for Selected Crude Streams 44 Energy Information Administration...

  4. Model Simulating Real Domestic Hot Water Use - Building America...

    Energy Savers [EERE]

    Model Simulating Real Domestic Hot Water Use - Building America Top Innovation Model Simulating Real Domestic Hot Water Use - Building America Top Innovation Image of a pipe...

  5. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy 

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01T23:59:59.000Z

    As workplace demands change, a need has developed for alternatives to traditional education. With advancements in electronic telecommunication technologies, distance education has become a viable alternative to traditional ...

  6. Verification of energy audit assumptions: Why engineering estimates go bad

    SciTech Connect (OSTI)

    Dent, C.L.; Swanson, D.B.; Koca, R.W.; Tibbetts, B.

    1994-12-31T23:59:59.000Z

    Often, local governments do not have the resources to fully assess and implement energy efficiency measures (EEMs) even though initial payback calculations are encouraging. To address this problem, the California Energy Commission (CEC) has been operating the Energy Partnership Program (EPP) to provide technical assistance and funding to local governments for energy efficiency projects in public buildings. A government agency interested in participating in the EPP begins the process by submitting an application which is then reviewed by the CEC for energy savings potential. Selected sites are visited by the CEC, after which they may be granted a full energy audit and recommendation study by an independent energy service company (ESCO). Also, in cases where the local government does not have the capital for new equipment purchases, the CEC can provide a loan to that government which can then be repaid through the reduced utility expenditures. Since industry experience has found that, on average, actual energy savings are only 60 - 70% of engineering estimates, the CEC hired Pacific Science & Technology (PS&T) to perform end-use metering and analysis to evaluate the accuracy of the energy audit. The CEC is not only interested in evaluating the total energy savings, but also improving the accuracy of future energy audits as well. To this end, Pacific Science & Technology is reviewing and evaluating all of the basic assumptions made by the auditor such as equipment power draws, operating schedules, fixture counts, etc. These basic assumptions are common building blocks used in energy use analysis. So, the goal of this project is to improve the audit assumptions and thereby improve the accuracy of future energy audits and EEM assessments.

  7. Sun, Jan 09, 2005 Domestic Economy

    E-Print Network [OSTI]

    Gosselin, Frédéric

    Sun, Jan 09, 2005 Front Page National Domestic Economy Science Panorama Economic Focus Dot Coms on which SM was focusing, the team used a 'bubble test' in which only part of the face is revealed

  8. Assumptions and ambiguities in nonplanar acoustic soliton theory

    SciTech Connect (OSTI)

    Verheest, Frank [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium) [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium); School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa); Hellberg, Manfred A. [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)] [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)

    2014-02-15T23:59:59.000Z

    There have been many recent theoretical investigations of the nonlinear evolution of electrostatic modes with cylindrical or spherical symmetry. Through a reductive perturbation analysis based on a quasiplanar stretching, a modified form of the Korteweg-de Vries or related equation is derived, containing an additional term which is linear in the electrostatic potential and singular at time t?=?0. Unfortunately, these analyses contain several restrictive assumptions and ambiguities which are normally neither properly explained nor discussed, and severely limit the applicability of the technique. Most glaring are the use of plane-wave stretchings, the assumption that shape-preserving cylindrical modes can exist and that, although time is homogeneous, the origin of time (which can be chosen arbitrarily) needs to be avoided. Hence, only in the domain where the nonlinear modes are quasiplanar, far from the axis of cylindrical or from the origin of spherical symmetry can acceptable but unexciting results be obtained. Nonplanar nonlinear modes are clearly an interesting topic of research, as some of these phenomena have been observed in experiments. However, it is argued that a proper study of such modes needs numerical simulations rather than ill-suited analytical approximations.

  9. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  10. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  11. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01T23:59:59.000Z

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  12. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  13. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  14. Validity of conventional assumptions concerning flexible response. Research report

    SciTech Connect (OSTI)

    Gutierrez, M.J.

    1989-01-01T23:59:59.000Z

    The North Atlantic Treaty Organization is an alliance for collective defense. Made up of 16 countries, NATO has been a successful alliance because there has been no war in Europe since 1945. In 1967, NATO adopted the strategy of flexible response, a strategy dependent upon conventional, tactical nuclear, and strategic nuclear weapons to provide deterrence from a Warsaw Pact attack. Although successful, NATO is suffering from an erosion in conventional strength. NATO continues to make assumptions about its conventional capabilities to successfully meet the requirements of the flexible response strategy. In the present day world of NATO, there is limited funding, a fact that is not likely to change any time in the foreseeable future. Limited funding makes it impossible to buy all the conventional force structure needed to ideally support the current strategy, also a fact that is unlikely to change. This paper shows limitations in some of the ways NATO assumes it can conventionally perform its mission. It is the author's position that NATO should modernize its conventional thinking to make it more in line with the realities of the situation NATO finds itself in today.

  15. Assumptions and Strategies for Conducting Research with Learning Disabled Adolescents and Young Adults

    E-Print Network [OSTI]

    Meyen, Edward L.; Schiefelbusch, Richard L.; Deshler, Donald D.; Alley, Gordon R.; Moran, Mary Ross; Clark, Frances L.

    1980-01-01T23:59:59.000Z

    This paper details the assumptions about learning disabled adolescents and young adults as well as assumptions about conducting research with this population held by researchers at the Kansas Institute. Strategies developed ...

  16. The Power of a Few Large Blocks: A credible assumption with incredible efficiency

    E-Print Network [OSTI]

    Foster, Dean P.

    i.i.d. assumption about the error structure, the two-sample t-statistic for oil was significantThe Power of a Few Large Blocks: A credible assumption with incredible efficiency Dongyu Lin and Dean P. Foster Abstract The most powerful assumption in data analysis is that of independence. Unfortu

  17. The Challenge Domestic solar panels produce electricity

    E-Print Network [OSTI]

    Crowther, Paul

    Sheffield Science Gateway. The Challenge Domestic solar panels produce electricity for homes materials to a wide range of optoelectronic devices, including solar panels. This project was one of 10 of renewable energy generated by solar panels. As a country with ambitious targets for renewable energy at both

  18. Office of Domestic and International Health Studies

    Broader source: Energy.gov [DOE]

    The Office of Domestic and International Health Studies engages in the conduct of international scientific studies that may provide new knowledge and information about the human response to ionizing radiation in the workplace or people exposed in communities as a result of nuclear accidents, including providing health and environmental monitoring services to populations specified by law.

  19. Video Mediated Communication for Domestic Environments

    E-Print Network [OSTI]

    Tollmar, Konrad

    ). The core argument is that information and com- munication technologies (ICT) are a prerequisite for the transformation process from a society focused on industrial production to a society dominated by information could change due to new social movements and new use of the domestic environment, we have designed

  20. Domestic medicine in eighteenth centrury Scotland 

    E-Print Network [OSTI]

    Hatfield, Vivienne Gabrielle

    1980-01-01T23:59:59.000Z

    put their services beyond the reach of most people. Even later in the century when roads improved and an increasing number of medical graduates were trained, in rural Scotland domestic medicine was still the only form of treatment available to many...

  1. Home, Habits, and Energy: Examining Domestic Interactions and Energy Consumption

    E-Print Network [OSTI]

    Paulos, Eric

    , habitual, and irrational. Implications for the design of energy-conserving interactions with technology investigate the relationships among "normal" domestic interactions with technology, energy consumptionHome, Habits, and Energy: Examining Domestic Interactions and Energy Consumption James Pierce1

  2. Hydrogen from Diverse Domestic ResourcesHydrogen from Diverse Domestic Resources Distributed

    E-Print Network [OSTI]

    Sequestration Biomass Hydro Wind Solar Biomass Hydro Wind Solar Coal Nuclear Natural Gas Oil Sequestration #12 on foreign oil. · Promote the use of diverse, domestic, and sustainable energy sources. · Reduce carbon

  3. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  4. Q&A About Media Coverage of Domestic Violence New York State Office for the

    E-Print Network [OSTI]

    Qiu, Weigang

    Q&A About Media Coverage of Domestic Violence New York State Office for the Prevention of Domestic..............................................................................................Cover Media Coverage of Domestic Violence...................................................................................... Page 2 Q&A About Media Coverage of Domestic Violence

  5. Energy use of icemaking in domestic refrigerators

    SciTech Connect (OSTI)

    Meier, A. [Lawrence Berkeley National Lab., CA (United States). Energy and Environment Div.; Martinez, M.S. [ENVEST-SCE, Irwindale, CA (United States)

    1996-02-01T23:59:59.000Z

    This study was designed to develop and test a procedure to measure the electrical consumption of ice making in domestic refrigerators. The Department of Energy (DOE) test procedure was modified to include the energy used for icemaking in conventional refrigerators and those equipped with automatic icemakers. The procedure assumed that 500 grams of ice would be produced daily. Using the new test procedure and the existing DOE test (as a benchmark), four refrigerators equipped with automatic icemakers were tested for ice-making energy use. With the revised test, gross electricity consumption increased about 10% (100 kWh/yr) due to automatic icemaking but about 5% (55 kWh/yr) could be attributed to the special features of the automatic icemaker. The test also confirmed the feasibility of establishing procedures for measuring energy use of specific loads and other activities related to domestic refrigerators. Field testing and subsequent retesting revealed a 14% increase in energy use.

  6. International Support for Domestic Climate Policies

    E-Print Network [OSTI]

    Neuhoff, Karsten

    the CO2 emissions from fossil fuel use. Overall carbon emissions can be further reduced using carbon capture and sequestration for fossil fuel combustion, with substantial reductions occurring if the technology is applied to large installations... from Concentrated Solar Power Plants can encourage domestic and international firms to adopt the technology and stimulate its production in South Africa. Large wind resources require appropriate technology and network design to capture...

  7. Domestic institutions, strategic interests, and international conflict

    E-Print Network [OSTI]

    Clare, Joseph Daniel

    2007-04-25T23:59:59.000Z

    (Huth and Russett 1984, 1988; Fearon 1994a, 1995; Zagare and Kilgour 2000; Schultz 2001; Danilovic 2002). Two recent theoretical angles are most relevant for the approach I take here. Though both attempt to explain the same phenomena?strategic bargaining... of resolve are more credible when leaders face domestic punishment for failing to carry out their threats. Most notably advanced in the audience costs approach (Fearon 1994; Smith 1998; Schultz 2001), this premise leads to an expectation for democratic states...

  8. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect (OSTI)

    Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

    2011-10-05T23:59:59.000Z

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  9. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  10. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  11. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  12. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  13. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  14. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  15. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  16. Domestic Uranium Production Report 2004-13

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40Coal Stocks at1,066,688 760,877 951,322 1,381,127by Local(Dollars9.Domestic Thank

  17. Domestic Uranium Production Report - Energy Information Administration

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001)gasoline353/06) 2Yonthly Energy :and CommercialDomestic

  18. Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss

    E-Print Network [OSTI]

    Endriss, Ulle

    Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss Institute aggregation procedure will lift the rationality assumptions from the in- dividual to the collective level, i an axiomatic characterisation of the class of aggregation proce- dures that will lift all rationality

  19. Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions revisited and found inadequate

    E-Print Network [OSTI]

    Sulsky, Deborah L.

    the Arctic Ice Dynamics Joint Experiment (AIDJEX) assumptions about pack ice behavior with an eye to modeling the behavior of pack ice. A model based on these assumptions is needed to represent the deformation and stress in pack ice on scales from 10 to 100 km, and would need to explicitly resolve discontinuities

  20. OIKOS 101: 499504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS

    E-Print Network [OSTI]

    Silvertown, Jonathan

    OIKOS 101: 499­504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS seed seedlings in gaps interact? A field test of assumptions in ESS seed size models. ­ Oikos 101: 499­504. ESS for the occupancy of `safe sites' or vegetation gaps. If mortality rates are high and/or frequency-independent, ESS

  1. Table 21. Domestic Crude Oil First Purchase Prices

    U.S. Energy Information Administration (EIA) Indexed Site

    Information AdministrationPetroleum Marketing Annual 1998 41 Table 21. Domestic Crude Oil First Purchase Prices (Dollars per Barrel) - Continued Year Month PAD District II...

  2. Table 22. Domestic Crude Oil First Purchase Prices for Selected...

    U.S. Energy Information Administration (EIA) Indexed Site

    company data. Source: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report." 44 Energy Information AdministrationPetroleum Marketing Annual...

  3. Table 21. Domestic Crude Oil First Purchase Prices

    U.S. Energy Information Administration (EIA) Indexed Site

    Information Administration Petroleum Marketing Annual 1995 41 Table 21. Domestic Crude Oil First Purchase Prices (Dollars per Barrel) - Continued Year Month PAD District II...

  4. Table 22. Domestic Crude Oil First Purchase Prices for Selected...

    U.S. Energy Information Administration (EIA) Indexed Site

    company data. Source: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report." 44 Energy Information Administration Petroleum Marketing...

  5. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

  6. Appropriate technology for planning hydroelectric power projects in Nepal: the need for assumption analysis

    SciTech Connect (OSTI)

    Chandler, C.G.

    1981-06-01T23:59:59.000Z

    The study focuses on the project development process for hydroelectric project planning in Nepal. Chapter I describes the contrast between the vast potential for hydroelectric power development in Nepal and the current energy shortage within the country, not only for electricity, but for firewood and other fuel sources as well. Chapter II explores some of the unknown factors facing hydropower project planners in Nepal, where data for hydrologic, geologic, environmental, and sociological project components are lacking. The chapter also examines institutional and fiscal factors which constrain the planning process. Chapter III describes the critical role of assumptions in the project development process, and details the stages that a project goes through as it is planned. The chapter introduces the concept of assumption analysis as a technique for project planning, listing the potential conflict between the assumptions of foreign consultants and the host-country users of project outputs as an ingredient in the project's success or failure. Chapter IV demonstrates the mechanics and usefulness of assumption analysis through an Assumption Analysis Chart, which shows the interaction among project objectives, project alternatives, project assumptions, and the project development process. Assumption analysis techniques are expected to be useful among bilateral and multilateral aid donors servicing less developed countries.

  7. Interaction between domestic and international students: a case study on

    E-Print Network [OSTI]

    Amin, S. Massoud

    Interaction between domestic and international students: a case study on the perspective of CIDE of domestic students is limited. Case study conducted in Fall 2009 Purpose to explore current level integration ·Case studies "We cannot simply assume that interaction between local and international students

  8. Comparative Life-Cycle Air Emissions of Coal, Domestic Natural

    E-Print Network [OSTI]

    Jaramillo, Paulina

    come domestically from the production of synthetic natural gas (SNG) via coal gasification- methanation gasification technologies that use coal to produce SNG. This National Gasification Strategy callsComparative Life-Cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity

  9. Behavioral Assumptions Underlying California Residential Sector Energy Efficiency Programs (2009 CIEE Report)

    Broader source: Energy.gov [DOE]

    This paper examines the behavioral assumptions that underlie California’s residential sector energy efficiency programs and recommends improvements that will help to advance the state’s ambitious greenhouse gas reduction goals.

  10. WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window Silicon Valley conjures images of leading edge technology. Las Vegas makes one think of gambling

  11. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  12. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  13. Table 23. Domestic Crude Oil First Purchase Prices by API Gravity

    U.S. Energy Information Administration (EIA) Indexed Site

    Form EIA-182, "Domestic Crude Oil First Purchase Report." 23. Domestic Crude Oil First Purchase Prices by API Gravity Energy Information Administration Petroleum...

  14. COMBINING DIVERSE DATA SOURCES FOR CEDSS, AN AGENT-BASED MODEL OF DOMESTIC ENERGY DEMAND

    E-Print Network [OSTI]

    Gotts, Nicholas Mark; Polhill, Gary; Craig, Tony; Galan-Diaz, Carlos

    2014-01-01T23:59:59.000Z

    Model CEDSS (Community Energy Demand Social Simulator) wasthe determinants of domestic energy demand and covering fivescenarios of domestic energy demand to 2050, and for its

  15. Spotless Italy: Hygiene, Domesticity, and the Ubiquity of Whiteness in Fascist and Postwar Consumer Culture

    E-Print Network [OSTI]

    Lombardi-Diop, Cristina

    2011-01-01T23:59:59.000Z

    Spotless Italy: Hygiene, Domesticity, and the Ubiquity ofa certain obsession with hygiene seems to signal a desireculture, domesticity, hygiene, and whiteness begins. This

  16. INTRODUCTION Maximal performance is a key measurement in linking the ecology,

    E-Print Network [OSTI]

    Azizi, Manny

    rely on the assumption that performance measured in the laboratory represents a true maximum. In few3947 INTRODUCTION Maximal performance is a key measurement in linking the ecology, fitness et al., 2006). Studies of mechanical power output during maximal jumps have revealed that many frog

  17. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  18. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  19. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  20. Applications Received by DOE/FE to Export Domestically Produced...

    Broader source: Energy.gov (indexed) [DOE]

    Applications Received by DOEFE to Export Domestically Produced LNG from the Lower-48 States (as of March 5, 2014) All Changes Since February 11, 2014 Update Are In Red 1 Company...

  1. Domestic Institutions and the Supply and Demand of Remittances

    E-Print Network [OSTI]

    Hicks, Brian N.

    2011-02-22T23:59:59.000Z

    routinely desire to control international immigration and capital movement. Consequently they adopt domestic policies which create and enforce institutions that manage both capital and labor mobility across borders. Additionally, researchers commonly neglect...

  2. Table 21. Domestic Crude Oil First Purchase Prices

    U.S. Energy Information Administration (EIA) Indexed Site

    19.11 18.73 18.63 17.97 18.75 18.10 See footnotes at end of table. 21. Domestic Crude Oil First Purchase Prices Energy Information Administration Petroleum Marketing Annual...

  3. Toxicity studies with Sesbania spp. in domestic and laboratory animals

    E-Print Network [OSTI]

    Whall, Jeffrey DePass

    1982-01-01T23:59:59.000Z

    May 1982 Major Subject: Veterinary Toxicology TOXICITY STUDIES WITH SESBANIA SPP. IN DOMESTIC AND LABORATORY ANIMALS A Thesis by JEFFREY DEPASS WHALL Approved as to style and content by: (- ~ -) Chy an of Comm ttee) Head f Depar t) (Member...

  4. Fact #564: March 30, 2009 Transportation and the Gross Domestic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the U.S. Gross Domestic Product (GDP) in 2007 is related to transportation. Housing, health care, and food are the only categories with greater shares of the GDP. GDP by...

  5. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  6. Changes in the U.S. Domestic Group Tour Market 

    E-Print Network [OSTI]

    Purifoy, Melanie

    2011-08-04T23:59:59.000Z

    of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by MELANIE L. PURIFOY CHAglyph1197GES Iglyph1197 THE U.S. DOMESTIC GROUP TOUR MARKET Approved by: Research Advisor: Ulrike Gretzel Associate... as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by MELANIE L. PURIFOY iii ABSTRACT Changes in the U.S. Domestic Group Tour Market (April 2008) Melanie L. Purifoy Department of Recreation, Parks and Tourism Sciences Texas A&M University...

  7. Visual discrimination at varying distances in domestic goats

    E-Print Network [OSTI]

    Blakeman, Nancy Elizabeth

    1983-01-01T23:59:59.000Z

    VISUAL DISCRIMINATION AT VARYINS DISTANCES IN DOMESTIC BOATS A Theaia by NANCY ELIZABETH SLAKEMAN Submitted ta the Sraduate Cel lege ef Taxaa ACcH Univaraity in partial fulfil leant of the requireeents far the degree ef MASTER OF 'SCIENCE... ) J. W. Bassett (Member ) S. C. Bait (Head' o+ Dept-tment) December 1983 Visual Discrimination at Varying Distances in Domestic Boats (December 1983) Nancy Elizabeth Blakeman, B. S. ~ Texas A S N University Chairman of Advisory Coemittee. Dr...

  8. Impact of an Export Subsidy on the Domestic Cotton Industry.

    E-Print Network [OSTI]

    Wohlgenant, Michael K.

    1986-01-01T23:59:59.000Z

    Elasticities 9 Export Demand Elasticity 10 Elasticity of the Price Transmission of 12 Imported Textiles with Respect to Domestic Cotton Simulation Results for the Effects of Alternative 13 Export Subsidies Estimated Effects on U.S. Price and Quantities... for the three alternative subsidy amounts are presented in Tables 6 through 8. ESTIMATED EFFECTS ON U.s. PRICES AND QUANTITIES The effects of alternative export subsidies on the domestic [14] cotton price, mill consumption of cotton, and cotton exports...

  9. Effect of Increased Natural Gas Exports on Domestic Energy Markets

    Reports and Publications (EIA)

    2012-01-01T23:59:59.000Z

    This report responds to an August 2011 request from the Department of Energy's Office of Fossil Energy (DOE\\/FE) for an analysis of "the impact of increased domestic natural gas demand, as exports." Appendix A provides a copy of the DOE\\/FE request letter. Specifically, DOE\\/FE asked the U.S. Energy Information Administration (EIA) to assess how specified scenarios of increased natural gas exports could affect domestic energy markets, focusing on consumption, production, and prices.

  10. Stress and domestication traits increase the relative fitness of cropwild hybrids in sunflower

    E-Print Network [OSTI]

    ­wild hybrid, domestication, G · E interactions, GM crops, herbicide, introgression, relative fitness

  11. Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input

    E-Print Network [OSTI]

    Quadeer, Ahmed Abdul

    Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input T. Y methods rely on some form of training which reduces the useful data rate. Here instead we blindly estimate maxima of the ML objective function. One is the blind Genetic algorithm and the other is the semi-blind

  12. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N. [Chicago Bridge and Iron Technical Services Co., Plainfield, IL (United States)

    1996-08-01T23:59:59.000Z

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  13. RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS

    E-Print Network [OSTI]

    RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS With Revisions distributed photovoltaic (PV) installations in the Report is unclear and perhaps misleading. At the direction-generation is required. The CEC forecast assumed that 1,082 GWh will be self-generated by consumers from new PV

  14. Human lightness perception is guided by simple assumptions about reflectance and lighting

    E-Print Network [OSTI]

    Murray, Richard

    Human lightness perception is guided by simple assumptions about reflectance and lighting Richard F 0009, Toronto, Ontario, Canada, M3J 1P3 ABSTRACT Lightness constancy is the remarkable ability of human successful approaches to understanding lightness perception that have developed along independent paths

  15. On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models Patrick at transistor level and on conversion of the noise to the clock jitter exploited at the generator level. Using this approach, we can estimate proportion of the jitter coming only from the thermal noise, which is included

  16. An Assumption for the Development of Bootstrap Variants of the Akaike Information Criterion in Mixed Models

    E-Print Network [OSTI]

    Shang, Junfeng

    in Mixed Models Junfeng Shang 1, and Joseph E. Cavanaugh 2, 1 Bowling Green State University, USA 2 of Mathematics and Statistics, 450 Math Science Building, Bowling Green State University, Bowling Green, OH 43403 The University of Iowa, USA Abstract: This note provides a proof of a fundamental assumption in the verification

  17. On the Limitations of Universally Composable Two Party Computation Without Setup Assumptions #

    E-Print Network [OSTI]

    Lindell, Yehuda

    for essentially any cryptographic task in the plain model (i.e., with no setup assumptions beyond regarding the existence of universally composable protocols in the plain model without honest majority of universally composable two­party function evaluation in the plain model. Our results show that in this setting

  18. (Data in kilograms of gallium content unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 2009. One company in Utah

    E-Print Network [OSTI]

    58 GALLIUM (Data in kilograms of gallium content unless otherwise noted) Domestic Production 98% of domestic gallium consumption. About 67% of the gallium consumed was used in integrated and Use: No domestic primary gallium recovery was reported in 2009. One company in Utah recovered

  19. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  20. First determination of the quark mixing matrix element Vtb independent of assumptions of unitarity

    E-Print Network [OSTI]

    John Swain; Lucas Taylor

    1997-12-17T23:59:59.000Z

    We present a new method for the determination of the Cabibbo-Kobayashi-Maskawa quark mixing matrix element $|V_{tb}|$ from electroweak loop corrections, in particular those affecting the process $Z\\to b\\bar{b}$. From a combined analysis of results from the LEP, SLC, Tevatron, and neutrino scattering experiments we determine $|V_{tb}| = 0.77^{+0.18}_{-0.24}$. This is the first determination of $|V_{tb}|$ which is independent of unitarity assumptions.

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. A REVIEW OF ASSUMPTIONS AND ANALYSIS IN EPRI EA-3409, "HOUSEHOLD APPLIANCE CHOICE: REVISION OF REEPS BEHAVIORAL MODELS"

    E-Print Network [OSTI]

    Wood, D.J.

    2010-01-01T23:59:59.000Z

    of Assumptions and Analysis in EPRI EA-3409, "Householdby the Electric Power Research Institute, Inc. ("EPRI").Neither EPRI, members of EPRI, nor Lawrence Berkeley

  3. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  4. Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci

    E-Print Network [OSTI]

    Aiello, Marco

    Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci University of Modena and RE illustrate an implementation includ- ing the interfacing with a physical Smart Meter and provide initial--Intelligent agents, Multiagent systems General Terms Design, Economy Keywords Energy trade, agents, smart meter 1

  5. New York State Office for the Prevention of Domestic Violence

    E-Print Network [OSTI]

    Qiu, Weigang

    serve as a vital tool for responders in domestic violence cases. They are used by prosecutors to build this spring, the NYS Division of Criminal Justice Services (DCJS) is making it possible for DIRs to be shared of strangulation was added to the NYS Penal Law, and 2/22/11, a total of 2,003 people were charged with felony and

  6. Analysis Model for Domestic Hot Water Distribution Systems: Preprint

    SciTech Connect (OSTI)

    Maguire, J.; Krarti, M.; Fang, X.

    2011-11-01T23:59:59.000Z

    A thermal model was developed to estimate the energy losses from prototypical domestic hot water (DHW) distribution systems for homes. The developed model, using the TRNSYS simulation software, allows researchers and designers to better evaluate the performance of hot water distribution systems in homes. Modeling results were compared with past experimental study results and showed good agreement.

  7. A Gameroom of Our Own: Exploring The Domestic Gaming Environment

    E-Print Network [OSTI]

    Greenberg, Saul

    A Gameroom of Our Own: Exploring The Domestic Gaming Environment A. VOIDA Donald Bren School ________________________________________________________________________ Digital gaming plays out within different environments--from arcades to virtual worlds to the family living room. Each of these gaming environments offer different constraints and affordances for gaming

  8. STATE OF CALIFORNIA SOLAR DOMESTIC HOT WATER SYSTEMS (SDHW)

    E-Print Network [OSTI]

    attached CEC F-Chart) # of Collectors in System Collector Size Solar Tank Volume (gallons) §150(j)1B piping shall be insulated. §150(j)4: Solar water-heating system and/or/collectors are certifiedSTATE OF CALIFORNIA SOLAR DOMESTIC HOT WATER SYSTEMS (SDHW) CEC- CF-6R-MECH-02 (Revised 08

  9. The importance of domestic law to international arms control

    SciTech Connect (OSTI)

    Lehman, R.F. II

    1993-11-01T23:59:59.000Z

    Studies of arms control and disarmament tend to focus on political, military, and diplomatic processes. Recently, in the context of the conversion of defense activities to civilian use, the economic aspects of arms control have also received renewed interest. The legal dimension, however, is in need of fresh examination. Both international and domestic law are sailing increasingly in uncharted waters. Recent arms control agreements and related developments in international peacekeeping have expanded the scope of international law and altered how one perceives certain fundamentals, including the principle of national sovereignty. Still, the nation state is largely unchallenged as the primary actor in international affairs. National governments retain near absolute sovereign rights and responsibilities even in an age of trans-national economic integration and codified international norms for human rights, freedom of the press, and the peaceful resolution of disputes. Indeed, the role of domestic law in arms control and disarmament may be more significant now than ever before. A brief review of relationships between arms control and domestic law should illustrate ways in which ones thinking has been underestimating the importance of domestic law. Hopefully, this survey will set the stage properly for the excellent, more detailed case studies by Elinor Hammarskjold and Alan Crawford. Toward that end, this paper will highlight a number of more general, and sometimes provocative, themes. These themes should be kept in mind when those two complementary presentations are considered.

  10. Tyrosinase and Tyrosinase Related Protein 1 Alleles Specify Domestic Cat

    E-Print Network [OSTI]

    Eizirik, Eduardo

    Tyrosinase and Tyrosinase Related Protein 1 Alleles Specify Domestic Cat Coat Color Phenotypes address above, or e-mail: aschmidt@ncifcrf.gov. Abstract The genes encoding enzymes of the tyrosinase tyrosinase (TYR)--a plausible candidate gene for the albino (C) locus, and tyrosinase related protein 1 (TYRP

  11. Uranium in US surface, ground, and domestic waters. Volume 2

    SciTech Connect (OSTI)

    Drury, J.S.; Reynolds, S.; Owen, P.T.; Ross, R.H.; Ensminger, J.T.

    1981-04-01T23:59:59.000Z

    The report Uranium in US Surface, Ground, and Domestic Waters comprises four volumes. Volumes 2, 3, and 4 contain data characterizing the location, sampling date, type, use, and uranium conentrations of 89,994 individual samples presented in tabular form. The tabular data in volumes 2, 3, and 4 are summarized in volume 1 in narrative form and with maps and histograms.

  12. Laying Claim to the Home: Homesteads and National Domesticity in Antebellum America 

    E-Print Network [OSTI]

    Wyckoff, Robert Thomas

    2013-04-04T23:59:59.000Z

    his dissertation examines the rhetoric of the homestead movement in antebellum America as a particular instance of domesticity. Homestead rhetoric alters the modes of identity and subjectivity usually found in domesticity, and alters the home...

  13. Domestic production of medical isotope Mo-99 moves a step closer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Domestic production of medical isotope Mo-99 Domestic production of medical isotope Mo-99 moves a step closer Irradiated uranium fuel has been recycled and reused for molybdenum-99...

  14. The evolution of U.S. commercial domestic aircraft operations from 1991 to 2010

    E-Print Network [OSTI]

    Wulz, Alexander Andrew

    2012-01-01T23:59:59.000Z

    The main objective of this thesis is to explore the evolution of U.S. commercial domestic aircraft operations from 1991 to 2010 and describe the implications for future U.S. commercial domestic fleets. Using data collected ...

  15. The Lessons of Practice: Domestic Policy Reform as a Way to Address...

    Open Energy Info (EERE)

    Practice: Domestic Policy Reform as a Way to Address Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Lessons of Practice: Domestic Policy Reform as a...

  16. Author's personal copy Effectiveness of domestic wastewater treatment using microbial fuel cells

    E-Print Network [OSTI]

    2009 Elsevier Ltd. All rights reserved. 1. Introduction Conventional biological wastewater treatmentAuthor's personal copy Effectiveness of domestic wastewater treatment using microbial fuel cells 2009 Available online 5 September 2009 Keywords: Domestic wastewater treatment Energy recovery

  17. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  18. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  19. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  20. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  1. WA_99_022_AIR_PRODUCTS_AND_CHEMICAL_Waiver_of_Domestic_and_F...

    Broader source: Energy.gov (indexed) [DOE]

    9022AIRPRODUCTSANDCHEMICALWaiverofDomesticandF.pdf WA99022AIRPRODUCTSANDCHEMICALWaiverofDomesticandF.pdf WA99022AIRPRODUCTSANDCHEMICALWaiverofDomestic...

  2. WA_01_022_PRAXAIR_INC_AND_BP_AMOCO_Waiver_of_Domestic_and_Fo...

    Broader source: Energy.gov (indexed) [DOE]

    1022PRAXAIRINCANDBPAMOCOWaiverofDomesticandFo.pdf WA01022PRAXAIRINCANDBPAMOCOWaiverofDomesticandFo.pdf WA01022PRAXAIRINCANDBPAMOCOWaiverofDomestic...

  3. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  4. Rabbit mitochondrial DNA : preliminary comparison between some domestic and wild animals

    E-Print Network [OSTI]

    Boyer, Edmond

    Rabbit mitochondrial DNA : preliminary comparison between some domestic and wild animals Hajer of 6 wild and 5 domestic rabbits belonging respectively to the subspecies Oryctolagus cuniculus algirus, endonucléase de restriction. #12;I. Introduction Living wild and domestic rabbits belong to a unique species

  5. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  6. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01T23:59:59.000Z

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  7. United States Domestic Research Reactor Infrastrucutre TRIGA Reactor Fuel Support

    SciTech Connect (OSTI)

    Douglas Morrell

    2011-03-01T23:59:59.000Z

    The United State Domestic Research Reactor Infrastructure Program at the Idaho National Laboratory manages and provides project management, technical, quality engineering, quality inspection and nuclear material support for the United States Department of Energy sponsored University Reactor Fuels Program. This program provides fresh, unirradiated nuclear fuel to Domestic University Research Reactor Facilities and is responsible for the return of the DOE-owned, irradiated nuclear fuel over the life of the program. This presentation will introduce the program management team, the universities supported by the program, the status of the program and focus on the return process of irradiated nuclear fuel for long term storage at DOE managed receipt facilities. It will include lessons learned from research reactor facilities that have successfully shipped spent fuel elements to DOE receipt facilities.

  8. On the validity of the Poisson assumption in sampling nanometer-sized aerosols

    SciTech Connect (OSTI)

    Damit, Brian E [ORNL] [ORNL; Wu, Dr. Chang-Yu [University of Florida, Gainesville] [University of Florida, Gainesville; Cheng, Mengdawn [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    A Poisson process is traditionally believed to apply to the sampling of aerosols. For a constant aerosol concentration, it is assumed that a Poisson process describes the fluctuation in the measured concentration because aerosols are stochastically distributed in space. Recent studies, however, have shown that sampling of micrometer-sized aerosols has non-Poissonian behavior with positive correlations. The validity of the Poisson assumption for nanometer-sized aerosols has not been examined and thus was tested in this study. Its validity was tested for four particle sizes - 10 nm, 25 nm, 50 nm and 100 nm - by sampling from indoor air with a DMA- CPC setup to obtain a time series of particle counts. Five metrics were calculated from the data: pair-correlation function (PCF), time-averaged PCF, coefficient of variation, probability of measuring a concentration at least 25% greater than average, and posterior distributions from Bayesian inference. To identify departures from Poissonian behavior, these metrics were also calculated for 1,000 computer-generated Poisson time series with the same mean as the experimental data. For nearly all comparisons, the experimental data fell within the range of 80% of the Poisson-simulation values. Essentially, the metrics for the experimental data were indistinguishable from a simulated Poisson process. The greater influence of Brownian motion for nanometer-sized aerosols may explain the Poissonian behavior observed for smaller aerosols. Although the Poisson assumption was found to be valid in this study, it must be carefully applied as the results here do not definitively prove applicability in all sampling situations.

  9. Design package for solar domestic hot water system

    SciTech Connect (OSTI)

    None

    1980-09-01T23:59:59.000Z

    Information used to evaluate the initial design of the Elcam, Inc., Solar Domestic Hot Water System is presented. Included are such items as the system performance specification, detailed design drawings and other information. Elcam, Inc., has developed two solar heated prototype hot water systems and two heat exchangers. The hot water systems consist of the following subsystems: collector, storage, control, transport, auxiliary energy, and government-furnished Site Data Acquisition. The two systems are installed at Tempe, Arizona, and San Diego, California.

  10. Domestic Audiences, Policy Feedback, and Sequential Decisions During Military Interventions

    E-Print Network [OSTI]

    Kuberski, Douglas Walter

    2011-02-22T23:59:59.000Z

    Committee Members, Michael Koch Guy Whitten Charles Hermann Head of Department, James Rogers December 2009 Major Subject: Political Science iii ABSTRACT Domestic Audiences, Policy Feedback, and Sequential Decisions During Military... how an individual citizen?s preference over commitment is impacted by policy feedback. The results of the experimental analyses suggest that citizens act as investors: they favor increasing commitment to military interventions when viewing negative...

  11. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  12. Technical considerations related to interim source-term assumptions for emergency planning and equipment qualification. [PWR; BWR

    SciTech Connect (OSTI)

    Niemczyk, S.J.; McDowell-Boyer, L.M.

    1982-09-01T23:59:59.000Z

    The source terms recommended in the current regulatory guidance for many considerations of light water reactor (LWR) accidents were developed a number of years ago when understandings of many of the phenomena pertinent to source term estimation were relatively primitive. The purpose of the work presented here was to develop more realistic source term assumptions which could be used for interim regulatory purposes for two specific considerations, namely, equipment qualification and emergency planning. The overall approach taken was to adopt assumptions and models previously proposed for various aspects of source term estimation and to modify those assumptions and models to reflect recently gained insights into, and data describing, the release and transport of radionuclides during and after LWR accidents. To obtain illustrative estimates of the magnitudes of the source terms, the results of previous calculations employing the adopted assumptions and models were utilized and were modified to account for the effects of the recent insights and data.

  13. Assessment of Gasification-Based Biorefining at Kraft Pulp and Paper Mills in the United States, Part A: Background and Assumptions

    SciTech Connect (OSTI)

    Larson, E. D.; Consonni, S.; Katofsky, R. E.; Iisa, K.; Frederick, W. J., Jr.

    2008-11-01T23:59:59.000Z

    Commercialization of black liquor and biomass gasification technologies is anticipated in the 2010-2015 time frame, and synthesis gas from gasifiers can be converted into liquid fuels using catalytic synthesis technologies that are already commercially established in the gas-to-liquids or coal-to-liquids industries. This set of two papers describes key results from a major assessment of the prospective energy, environmental, and financial performance of commercial gasification-based biorefineries integrated with kraft pulp and paper mills [1]. Seven detailed biorefinery designs were developed for a reference mill in the southeastern United States, together with the associated mass/energy balances, air emissions estimates, and capital investment requirements. The biorefineries provide chemical recovery services and co-produce process steam for the mill, some electricity, and one of three liquid fuels: a Fischer-Tropsch synthetic crude oil (which could be refined to vehicle fuels at an existing petroleum refinery), dimethyl ether (a diesel engine fuel or propane substitute), or an ethanol-rich mixed-alcohol product. This paper describes the key assumptions that underlie the biorefinery designs. Part B will present analytical results.

  14. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  15. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  16. (Data in kilograms of gallium content unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 2005. One company in Utah

    E-Print Network [OSTI]

    66 GALLIUM (Data in kilograms of gallium content unless otherwise noted) Domestic Production, [(703) 648-7719, dkramer@usgs.gov, fax: (703) 648-7975] #12;67 GALLIUM Consolidation of companies and Use: No domestic primary gallium recovery was reported in 2005. One company in Utah recovered

  17. (Data in kilograms of gallium content, unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 1998. Two companies in

    E-Print Network [OSTI]

    66 GALLIUM (Data in kilograms of gallium content, unless otherwise noted) Domestic Production A. Kramer [(703) 648-7719, dkramer@usgs.gov, fax: (703) 648-7722] #12;67 GALLIUM Events, Trends and Use: No domestic primary gallium recovery was reported in 1998. Two companies in Oklahoma and Utah

  18. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon the 2000

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon the 2000 producer price. The domestic industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania, and Issues: World refinery production of germanium remained steady in 2000. The recycling of scrap continued

  19. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based on the 1999

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based on the 1999 producer price. The domestic industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania@usgs.gov, fax: (703) 648-7757] #12;73 GERMANIUM Events, Trends, and Issues: World refinery production

  20. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based on the 1996 producer

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based on the 1996 producer price. The domestic industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania, and chemotherapy), 5%. Salient Statistics--United States: 1992 1993 1994 1995 1996e Production, refinery 13,000 10

  1. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28T23:59:59.000Z

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  2. Estimating Alarm Thresholds for Process Monitoring Data under Different Assumptions about the Data Generating Mechanism

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Burr, Tom; Hamada, Michael S.; Howell, John; Skurikhin, Misha; Ticknor, Larry; Weaver, Brian

    2013-01-01T23:59:59.000Z

    Process monitoring (PM) for nuclear safeguards sometimes requires estimation of thresholds corresponding to small false alarm rates. Threshold estimation dates to the 1920s with the Shewhart control chart; however, because possible new roles for PM are being evaluated in nuclear safeguards, it is timely to consider modern model selection options in the context of threshold estimation. One of the possible new PM roles involves PM residuals, where a residual is defined as residual = data ? prediction. This paper reviews alarm threshold estimation, introduces model selection options, and considers a range of assumptions regarding the data-generating mechanism for PM residuals.more »Two PM examples from nuclear safeguards are included to motivate the need for alarm threshold estimation. The first example involves mixtures of probability distributions that arise in solution monitoring, which is a common type of PM. The second example involves periodic partial cleanout of in-process inventory, leading to challenging structure in the time series of PM residuals.« less

  3. A METHOD TO EXTRACT THE REDSHIFT DISTORTION {beta} PARAMETER IN CONFIGURATION SPACE FROM MINIMAL COSMOLOGICAL ASSUMPTIONS

    SciTech Connect (OSTI)

    Tocchini-Valentini, Domenico; Barnard, Michael; Bennett, Charles L.; Szalay, Alexander S., E-mail: dtv@pha.jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218-2686 (United States)

    2012-10-01T23:59:59.000Z

    We present a method to extract the redshift-space distortion {beta} parameter in configuration space with a minimal set of cosmological assumptions. We show that a novel combination of the observed monopole and quadrupole correlation functions can remove efficiently the impact of mild nonlinearities and redshift errors. The method offers a series of convenient properties: it does not depend on the theoretical linear correlation function, the mean galaxy density is irrelevant, only convolutions are used, and there is no explicit dependence on linear bias. Analyses based on dark matter N-body simulations and Fisher matrix demonstrate that errors of a few percent on {beta} are possible with a full-sky, 1 (h {sup -1} Gpc){sup 3} survey centered at a redshift of unity and with negligible shot noise. We also find a baryonic feature in the normalized quadrupole in configuration space that should complicate the extraction of the growth parameter from the linear theory asymptote, but that does not have a major impact on our method.

  4. RESIK Solar X-ray flare element abundances on a non-isothermal assumption

    E-Print Network [OSTI]

    Sylwester, B; Sylwester, J; Kepa, A

    2015-01-01T23:59:59.000Z

    Solar X-ray spectra from the RESIK crystal spectrometer on the {\\em CORONAS-F} spacecraft (spectral range $3.3-6.1$~\\AA) are analyzed for thirty-three flares using a method to derive abundances of Si, S, Ar, and K, emission lines of which feature prominently in the spectra. For each spectrum, the method first optimizes element abundances then derives the differential emission measure as a function of temperature based on a procedure given by Sylwester et al. and Withbroe. This contrasts with our previous analyses of RESIK spectra in which an isothermal assumption was used. The revised abundances (on a logarithmic scale with $A({\\rm H}) = 12$) averaged for all the flares in the analysis are $A({\\rm Si}) = 7.53 \\pm 0.08$ (previously $7.89 \\pm 0.13$), $A({\\rm S}) = 6.91 \\pm 0.07$ ($7.16 \\pm 0.17$), $A({\\rm Ar}) = 6.47 \\pm 0.08$ ($6.45 \\pm 0.07$), and $A({\\rm K}) = 5.73 \\pm 0.19$ ($5.86 \\pm 0.20$), with little evidence for time variations of abundances within the evolution of each flare. Our previous estimates of...

  5. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    SciTech Connect (OSTI)

    Joel L. Morrison

    2004-05-17T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the thirteenth quarterly technical progress report for the SWC. Key activities for this reporting period included: (1) hosting three fall technology transfer meetings in Wyoming, Texas, and Pennsylvania, (2) releasing the 2004 SWC request-for-proposal (RFP), and (3) initial planning of the SWC spring meeting in Golden Colorado for selecting the 2004 SWC projects. The Fall technology transfer meetings attracted 100+ attendees between the three workshops. The SWC membership which attended the Casper, Wyoming workshop was able to see several SWC-funded projects operating in the field at the Rocky Mountain Oilfield Testing Center. The SWC is nearing the end of its initial funding cycle. The Consortium has a solid membership foundation and a demonstrated ability to review and select projects that have relevancy to meet the needs of domestic stripper well operators.

  6. Domestic Coal Distribution 2009 Q2 by Destination State: Alabama

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40Coal Stocks at1,066,688 760,877 951,322 1,381,127by Local(Dollars per61 Domestic

  7. Table 5. Domestic Crude Oil Production, Projected vs. Actual

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1Stocks Nov-14Total DeliveredPrincipal shale gas plays:Domestic Crude

  8. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01T23:59:59.000Z

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  9. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15T23:59:59.000Z

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  10. The domestic natural gas and oil initiative. Energy leadership in the world economy

    SciTech Connect (OSTI)

    Not Available

    1993-12-01T23:59:59.000Z

    Two key overarching goals of this Initiative are enhancing the efficiency and competitiveness of U.S. industry and reducing the trends toward higher imports. These goals take into account new Federal policies that reflect economic needs, including economic growth, deficit reduction, job creation and security, and global competitiveness, as well as the need to preserve the environment, improve energy efficiency, and provide for national security. The success of this Initiative clearly requires coordinated strategies that range far beyond policies primarily directed at natural gas and oil supplies. Therefore, this Initiative proposes three major strategic activities: Strategic Activity 1 -- increase domestic natural gas and oil production and environmental protection by advancing and disseminating new exploration, production, and refining technologies; Strategic Activity 2 -- stimulate markets for natural gas and natural-gas-derived products, including their use as substitutes for imported oil where feasible; and Strategic Activity 3 -- ensure cost-effective environmental protection by streamlining and improving government communication, decision making, and regulation. Finally, the Initiative will reexamine the costs and benefits of increase oil imports through a broad new Department of Energy study. This study will form the basis for additional actions found to be warranted under the study.

  11. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  12. Leading without Followers: How Politics and Market Dynamics Trapped Innovations in Japan's Domestic Galapagos Telecommunications Sector

    E-Print Network [OSTI]

    Kushida, Kenji E

    2011-01-01T23:59:59.000Z

    Japan leading without followers in telecommunications by presenting the four technologyJapan’s domestic telecommunications market from global markets despite leading in particular technologies

  13. Table 23. Domestic Crude Oil First Purchase Prices by API Gravity

    U.S. Energy Information Administration (EIA) Indexed Site

    data reported. Source: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report." Energy Information Administration Petroleum Marketing Annual...

  14. Table 23. Domestic Crude Oil First Purchase Prices by API Gravity

    U.S. Energy Information Administration (EIA) Indexed Site

    12.17 12.80 Source: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report." Energy Information AdministrationPetroleum Marketing Annual...

  15. Table 23. Domestic Crude Oil First Purchase Prices by API Gravity

    U.S. Energy Information Administration (EIA) Indexed Site

    17.18 17.64 Source: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report." Energy Information AdministrationPetroleum Marketing Annual...

  16. WA_1994_017_GOLDEN_TECHNOLOGIES_COMPANY_Waiver_of_Domestic_a...

    Broader source: Energy.gov (indexed) [DOE]

    for An Advance Waiver of Domestic and Foreign Rights. January 10, 1995 WA1994011EATONCORPORATIONWaiverofDomesticandForeign.pdf WA1994014GOLDENTECHNOLOGIESCOMPA...

  17. WA_1993_022_NORTON_COMPANY_Waiver_of_Domestic_and_Foreign_Ri...

    Broader source: Energy.gov (indexed) [DOE]

    Golden Technologies Company, Inc. Request for An Advance Waiver of Domestic and Foreign Rights. January 10, 1995 WA1994011EATONCORPORATIONWaiverofDomesticandForeign...

  18. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    SciTech Connect (OSTI)

    Joel L. Morrison

    2002-09-27T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy (DOE), National Energy Technology Laboratory (NETL), will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the eighth quarterly technical progress report for the SWC. Key activities for this reporting period include: (1) issuing subcontracts, (2) SWC membership class expansion, (3) planning SWC technology transfer meetings, and (4) extending selected 2001 project periods of performance. In addition, a literature search that focuses on the use of lasers, microwaves, and acoustics for potential stripper well applications continued.

  19. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    SciTech Connect (OSTI)

    Joel L. Morrison

    2003-04-08T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the ninth quarterly technical progress report for the SWC. Key activities for this reporting period include: (1) organizing and hosting two fall technology transfer meetings, (2) SWC membership class expansion, and (3) planning the SWC 2003 Spring meeting. In addition, a literature search that focuses on the use of lasers, microwaves, and acoustics for potential stripper well applications continued.

  20. Establishment of an Industry-Driven Consortium Focused on Improving the Production Performance of Domestic Stripper Wells

    SciTech Connect (OSTI)

    Joel Morrison; Sharon Elder

    2006-01-24T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the sixth quarterly technical progress report for the SWC. Key activities for this reporting period included: (1) Organized and hosted two technology transfer meetings; (2) Collaborated with the Pennsylvania Oil and Gas Association (POGAM) to host a Natural Gas Outlook conference in Pittsburgh, PA; (3) Provided a SWC presentation at the Interstate Oil and Gas Compact Commission (IOGCC) meeting in Jackson Hole, WY; and (4) Completed and released a stripper well industry documentary entitled: ''Independent Oil: Rediscovering America's Forgotten Wells''.

  1. Establishment of an Industry-Driven Consortium Focused on Improving the Production Performance of Domestic Stripper Wells

    SciTech Connect (OSTI)

    Joel L. Morrison; Sharon L. Elder

    2006-04-21T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy (DOE), National Energy Technology Laboratory (NETL) has established a national industry-driven Stripper Well Consortium (SWC) that is focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the seventh quarterly technical progress report for the SWC. Key activities for this reporting period include: (1) Nomination and election of the Executive Council members for the 2006-07 term, (2) Finalize and release the 2006 Request for Proposals (RFP), (3) Invoice and recruit members, (4) Plan for the spring meeting, (5) Improving communication efforts, and (6) Continue distribution of the DVD entitled: ''Independent Oil: Rediscovering American's Forgotten Wells''.

  2. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    SciTech Connect (OSTI)

    Joel L. Morrison

    2005-01-04T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the seventeenth quarterly technical progress report for the SWC. Key activities for this reporting period include: (1) organizing and hosting the SWC fall technology transfer meetings in Oklahoma City, Oklahoma and State College, Pennsylvania, (2) planning of the upcoming SWC spring proposal meeting, (3) release of the SWC Request-for-proposals (RFP), (4) revision of the SWC By-Laws, and (5) the SWC Executive Council nomination and election for 2005-2006 term members.

  3. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  4. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  5. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  6. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  7. (Data in kilograms of germanium content unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon an estimated

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon an estimated 2004 producer refinery in Utica, NY, produced germanium tetrachloride for optical fiber production. Another refinery

  8. READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management

    E-Print Network [OSTI]

    Oregon, University of

    READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management Conditions of Volunteer Service Please send completed form to the Office of Risk Management: riskmanagement ___________________________________________ (name/title of department supervisor) and the Office of Risk Management, (541) 346-8316, within 24 hours

  9. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based on the 1998 producer

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based on the 1998 producer price. The domestic industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania Production, refinery 10,000 10,000 18,000 20,000 22,000e Total imports 14,700 16,200 27,500 23,700 20

  10. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based on the 1997 producer

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based on the 1997 producer price. The domestic industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania, refinery 10,000 10,000 10,000 18,000 20,000e Total imports 15,000 15,000 16,000 27,000 17,0001 Exports NA

  11. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  12. Trinity College Green Week 2012 Energy Competition Win a Domestic Energy Meter

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    Trinity College Green Week 2012 Energy Competition ­ Win a Domestic Energy Meter As part of College Green Week the "e3" programme and Director of Buildings Office is promoting an energy related would you like to win a domestic whole house energy meter as part of Trinity College Green Week 2012

  13. Comparison Between TRNSYS Software Simulation and F-Chart Program on Solar Domestic Hot Water System

    E-Print Network [OSTI]

    Haberl, J. S.; Baltazar, J. C.; Mao, C.

    2012-01-01T23:59:59.000Z

    This study presents the accuracy test of a TRNSYS Solar Domestic Hot Water (SDHW) System simulation. The testing is based on comparing the results with the F-Chart software. The selected system to carry out the tests was the Active Solar Domestic...

  14. Modeling and experimental studies on a domestic solar dryer A. Saleh a,

    E-Print Network [OSTI]

    Natural circulation solar dryer Sun tracking Thin-layer drying models Drying characteristics a b s t r a cModeling and experimental studies on a domestic solar dryer A. Saleh a, *, I. Badran b Q1 t A domestic solar dryer with transparent external surfaces was designed, built and tested. Thin-layer drying

  15. By Patricia A. Plunkert Domestic primary aluminum production increased slightly in

    E-Print Network [OSTI]

    of primary metal produced domestically in 1995 was Voluntary Aluminum Industrial Partnership (VAIP) committed metal came from new (manufacturing) scrap and 47% from old scrap (discarded aluminum products, and Washington conjunction with the domestic primary aluminum industry, accounted for 36% of the production

  16. IMPROVING THE ENERGY EFFECTIVENESS OF DOMESTIC REFRIGERATORS BY THE APPLICATION OF REFRIGERANT MIXTURES*

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    #12;IMPROVING THE ENERGY EFFECTIVENESS OF DOMESTIC REFRIGERATORS BY THE APPLICATION OF REFRIGERANT.S. and foreign literature on the use of a mixture of refrigerants rather than a single one in a refrigeration-evaporator refrigerator typical of domestic refrigerators showed an energy savings of 12 percent. By acceptance

  17. Comparison Between TRNSYS Software Simulation and F-Chart Program on Solar Domestic Hot Water System 

    E-Print Network [OSTI]

    Haberl, J. S.; Baltazar, J. C.; Mao, C.

    2012-01-01T23:59:59.000Z

    This study presents the accuracy test of a TRNSYS Solar Domestic Hot Water (SDHW) System simulation. The testing is based on comparing the results with the F-Chart software. The selected system to carry out the tests was the Active Solar Domestic...

  18. Rev. 9-29-08 Certification of Tax-Qualified Dependents / Domestic Partner Health & Dental Benefits

    E-Print Network [OSTI]

    Rev. 9-29-08 Certification of Tax-Qualified Dependents / Domestic Partner Health & Dental Benefits of the employee with respect to health and dental plan coverage. This form is to enable the employee the domestic partnership. Prior to completing this form, carefully read the handout entitled "Important Tax

  19. Domestic reformulation of the moral issues at stake in the drive against

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    about the laundering of dirty money is formulated. This article does not, how- ever, set out to study domestic debates on the definition of dirty money emerge and how they modify the objectives of the driveDomestic reformulation of the moral issues at stake in the drive against money laundering: the case

  20. Examination of microbial fuel cell start-up times with domestic wastewater and additional amendments

    E-Print Network [OSTI]

    biological process used for wastewater treatment is desirable to avoid discharge of untreated wastewaterExamination of microbial fuel cell start-up times with domestic wastewater and additional Available online 30 April 2011 Keywords: Microbial fuel cell Domestic wastewater Startup time Substrate a b

  1. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  2. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  3. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  4. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  5. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  6. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  7. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  8. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  9. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  10. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  11. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15T23:59:59.000Z

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  12. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  13. From Space to Smart Homes: Constraint-Based Planning for Domestic Assistance From Space to Smart Homes: Constraint-Based

    E-Print Network [OSTI]

    Flener, Pierre

    From Space to Smart Homes: Constraint-Based Planning for Domestic Assistance From Space to Smart 2009 1 / 43 #12;From Space to Smart Homes: Constraint-Based Planning for Domestic Assistance Outline 1 to Smart Homes: Constraint-Based Planning for Domestic Assistance Motivation: Contextualized Proactive

  14. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01T23:59:59.000Z

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  15. Solar hot water system installed at Quality Inn, Key West, Florida. Final report

    SciTech Connect (OSTI)

    Not Available

    1980-04-01T23:59:59.000Z

    The solar energy hot water system installed in the Quality Inn, Key West, Florida, which consists of four buildings, is described. Three buildings are low-rise, two-story buildings containing 100 rooms. The fourth is a four-story building with 48 rooms. The solar system was designed to provide approximately 50% of the energy required for the domestic hot water system. The solar system consists of approximately 1400 ft/sup 2/ of flat plate collector, two 500 gal storage tanks, a circulating pump, and a controller. Operation of the system was begun in April 1978, and has continued to date with only three minor interruptions for pump repair. In the first year of operation, it was determined that the use of the solar facility resulted in 40% fuel savings.

  16. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  17. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  18. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  19. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  20. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  1. A Comparison of Domestic Water Heating Options in the Austin Electric Service Area

    E-Print Network [OSTI]

    Vliet, G. C.; Hood, D. B.

    1985-01-01T23:59:59.000Z

    , M., and F. C. Fontana, "Heat-Pump Desuperheaters for Supplying Domestic Not Water - Estimation of Energy Savings and Economic Viability For Residential Applications," ORNLICON-114. Oak Ridge National Laboratory, Oak Ridge, TN, May 1983. 11...

  2. Scotland’s rubbish: domestic recycling, policy and practice in everyday life 

    E-Print Network [OSTI]

    Stewart, Fraser Andrew

    2011-11-22T23:59:59.000Z

    This thesis examines the relationships people have with rubbish in everyday life. Focusing on domestic recycling policy and practice, environmental concern and action is explored as a sociological problem in a way that ...

  3. New Technologies that Enhance Environmental Protection, Increase Domestic Production, Result from DOE-Supported Consortium

    Broader source: Energy.gov [DOE]

    New technologies that help small, independent oil and natural gas operators contribute to domestic energy production while improving environmental protection have resulted from U.S. Department of Energy support of the Stripper Well Consortium.

  4. Spatial empowerment : the appropriation of public spaces by Filipina domestic workers in Hong Kong

    E-Print Network [OSTI]

    Tillu, Jasmine Susanna

    2011-01-01T23:59:59.000Z

    On a typical Sunday afternoon, hundreds of Filipina domestic workers (FDW) gather on the floor of public spaces in prime real estate areas of downtown Hong Kong. Over the last few decades, Hong Kong experienced rapid ...

  5. Evolution of domestic traffic and fares at the top 200 US airports between 1990 and 2008

    E-Print Network [OSTI]

    Ben Abda, Mehdi

    2010-01-01T23:59:59.000Z

    The main objective of this thesis is to analyze the evolution of domestic Origin- Destination (O-D) traffic and fares at the Top 200 airports in the United States between 1990 and 2008. The impetus behind this research is ...

  6. Thermodynamic analysis of the reverse Joule–Brayton cycle heat pump for domestic heating

    E-Print Network [OSTI]

    White, Alexander

    2009-03-20T23:59:59.000Z

    The paper presents an analysis of the effects of irreversibility on the performance of a reverse Joule–Brayton cycle heat pump for domestic heating applications. Both the simple and recuperated (regenerative) cycle are considered at a variety...

  7. Leading without Followers: How Politics and Market Dynamics Trapped Innovations in Japan's Domestic Galapagos Telecommunications Sector

    E-Print Network [OSTI]

    Kushida, Kenji E

    2011-01-01T23:59:59.000Z

    excluding the joint venture Sony Ericsson—but that 5% wasmostly Japan’s domestic market. Sony Ericsson, for its part,other international markets. Sony Ericsson held just under

  8. Transitions in domestic architecture and home culture in twentieth century Iran

    E-Print Network [OSTI]

    Karimi, Z. Pamela (Zahra Pamela)

    2009-01-01T23:59:59.000Z

    This dissertation explores the transformation of the Iranian home in twentieth century Iran. While surveying the socio political underpinnings and aesthetic ends of domesticity in Iranian culture from the early twentieth ...

  9. REQUEST BY PRAXAIR, INC.(PRAXAIR) FOR AN ADVANCE WAIVER OF DOMESTIC...

    Broader source: Energy.gov (indexed) [DOE]

    PRAXAIR, INC.(PRAXAIR) FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS TO INVENTIONS MADE UNDER CONTRACT NO. DE-FC26-00NT41027 ENTITLED "NOVEL REACTOR FOR THE...

  10. The Impact on the New Mexico Budget of Offering Domestic Partnerships to Same-Sex Couples

    E-Print Network [OSTI]

    Sears, Brad

    2010-01-01T23:59:59.000Z

    same-sex couples in New Mexico who choose to celebrate theirThe Impact on the New Mexico Budget of Offering DomesticCommittee of the New Mexico Senate Presented by Professor

  11. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  12. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  13. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  14. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  15. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  16. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  17. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  18. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  19. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  20. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  1. Haitian women and domestic violence: an assessment of the influnce of the mother-daughter relationship

    E-Print Network [OSTI]

    Lamothe-Francois, Marie B.

    2009-05-15T23:59:59.000Z

    (Gelles, 1997). However, for purposes of the current paper, which will analyze married, single, and cohabitating couples, we will refer to this behavior as ?domestic violence? Studies investigating domestic violence with non-immigrant groups... to control their partner (Gelles, 1995). Although the motivations may be quite different, the impact of partner abuse is detrimental to both partners and to the well-being of the community as a whole. Purpose of the Study The purpose of this study...

  2. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  3. Applications of shape analysis to domestic and international security.

    SciTech Connect (OSTI)

    Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

    2002-01-01T23:59:59.000Z

    The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

  4. Promising freeze protection alternatives in solar domestic hot water systems

    SciTech Connect (OSTI)

    Bradley, D.E.

    1997-12-31T23:59:59.000Z

    Since the gains associated with solar thermal energy technologies are comparatively small in relation to the required capital investment, it is vital to maximize conversion efficiency. While providing the necessary function of freeze protection, the heat exchanger commonly included in solar domestic water heating systems represents a system inefficiency. This thesis explores two alternate methods of providing freeze protection without resorting to a heat exchanger. Commonly, collectors are made of rigid copper tubes separated by copper or aluminum fins. Cracking damage can occur when water is allowed to freeze and expand inside the non compliant tubes. The possibility of making collectors out of an elastic material was investigated and shown to be effective. Since unlike copper, elastomers typically have low thermal conductivities, the standard collector performance prediction equations do not apply. Modified thermal performance prediction equations were developed which can be used for both low and high thermal conductivity materials to provide accurate predictions within a limited range of plate geometries. An elastomeric collector plate was then designed and shown to have comparable performance to a copper plate collector whose aperture area is approximately 33% smaller. Another options for providing freeze protection to an SDHW system is to turn it off during the winter. Choosing a three-season operating period means two things. First, the system will have different optimums such as slope and collector area. Second, the wintertime solar energy incident on the collector is unavailable for meeting a heating load. However, the system`s heat exchanger becomes unnecessary and removing it increases the amount of energy that arrives at the storage tank during those periods in which the system is operating.

  5. (Data in thousand metric tons of copper content, unless noted) Domestic Production and Use: Domestic mine production in 1995 continued its upward trend, begun in 1984, rising

    E-Print Network [OSTI]

    , Arizona, Utah, New Mexico, Montana, and Michigan, accounted for 97% of domestic production; copper in building construction, 42%; electric and electronic products, 22%; industrial machinery and equipment, 13, refined5 132 205 153 119 135 Employment, mine and mill, thousands 13.7 13.6 13.3 13.2 13.3 Net import

  6. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon an estimated

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon an estimated 2003 producer. A germanium refinery in Utica, NY, produced germanium tetrachloride for optical fiber production. Another refinery in Oklahoma produced refined germanium compounds for the production of fiber optics, infrared

  7. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon the 2002

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon the 2002 producer price-bearing materials generated from the processing of zinc ores. The germanium refinery in Utica, NY, produced germanium tetrachloride for optical fiber production. The refinery in Oklahoma doubled its production

  8. (Data in kilograms of germanium content, unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon the 2001

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon the 2001 producer price-bearing materials generated from the processing of zinc ores. The germanium refineries in New York and Oklahoma and set up in New York. The refinery in Oklahoma expanded, and a new secondary facility was built in North

  9. (Data in kilograms of germanium content, unless noted) Domestic Production and Use: The value of domestic refinery production of germanium, based on the 1995

    E-Print Network [OSTI]

    : The value of domestic refinery production of germanium, based on the 1995 producer price, was approximately industry consisted of three germanium refineries, one each in New York, Oklahoma, and Pennsylvania. World Refinery Production, Reserves, and Reserve Base: Refinery production Reserves6 Reserve base6 1994

  10. (Data in kilograms of germanium content unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon an estimated

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon an estimated 2008 producer of 2008. A germanium refinery in Utica, NY, produced germanium tetrachloride for optical fiber production. Another refinery in Oklahoma produced refined germanium compounds for the production of fiber optics

  11. (Data in kilograms of germanium content unless otherwise noted) Domestic Production and Use: The value of domestic refinery production of germanium, based upon an estimated

    E-Print Network [OSTI]

    and Use: The value of domestic refinery production of germanium, based upon an estimated 2007 producer in the fourth quarter of 2007. A germanium refinery in Utica, NY, produced germanium tetrachloride for optical fiber production. Another refinery in Oklahoma produced refined germanium compounds for the production

  12. (Data in kilograms of gallium content, unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 1997. Two companies in

    E-Print Network [OSTI]

    and Use: No domestic primary gallium recovery was reported in 1997. Two companies in Oklahoma and Utah in optoelectronic devices, which include light-emitting diodes (LED's), laser diodes, photodetectors, and solar-than-expected increase in demand. The company planned to operate its refineries in France and Germany using stockpiled

  13. (Data in kilograms of gallium content, unless noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 1995. Two companies in

    E-Print Network [OSTI]

    : No domestic primary gallium recovery was reported in 1995. Two companies in Oklahoma and Utah recovered devices, which include light-emitting diodes (LED's), laser diodes, photodetectors, and solar cells contract to a consortium of private companies to develop gallium nitride technology. Blue LED's are useful

  14. (Data in kilograms of gallium content, unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 1999. Two companies in

    E-Print Network [OSTI]

    and Use: No domestic primary gallium recovery was reported in 1999. Two companies in Oklahoma and Utah in optoelectronic devices, which include light-emitting diodes (LED's), laser diodes, photodetectors, and solar in July. The additional facility was expected to double the company's refinery capacity to 100

  15. (Data in kilograms of gallium content, unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 2002. Two companies in

    E-Print Network [OSTI]

    and Use: No domestic primary gallium recovery was reported in 2002. Two companies in Oklahoma and Utah diodes, photodetectors, and solar cells. Integrated circuits represented 65% of gallium demand forecasts of market growth, several companies were consolidating, reducing, or eliminating their Ga

  16. (Data in kilograms of gallium content, unless otherwise noted) Domestic Production and Use: No domestic primary gallium recovery was reported in 1996. Two companies in

    E-Print Network [OSTI]

    on world production of primary gallium were unavailable because data on the output of the few producers62 GALLIUM (Data in kilograms of gallium content, unless otherwise noted) Domestic Production in optoelectronic devices, which include light-emitting diodes (LED's), laser diodes, photodetectors, and solar

  17. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  18. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  19. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  20. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  1. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  2. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  3. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  4. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  5. ESTABLISHMENT OF AN INDUSTRY-DRIVEN CONSORTIUM FOCUSED ON IMPROVING THE PRODUCTION PERFORMANCE OF DOMESTIC STRIPPER WELLS

    SciTech Connect (OSTI)

    Joel L. Morrison

    2004-05-10T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy, National Energy Technology Laboratory will establish, promote, and manage a national industry-driven Stripper Well Consortium (SWC) that will be focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The consortium creates a partnership with the U.S. petroleum and natural gas industries and trade associations, state funding agencies, academia, and the National Energy Technology Laboratory. This report serves as the eleventh quarterly technical progress report for the SWC. Key activities for this reporting period include: (1) organizing and hosting the Spring SWC meeting in Pearl River, New York, (2) working with successful applicants and Penn State's Office of Sponsored Research to get subcontracts in place, and (3) planning three SWC technology transfer meetings to take place in the fall of 2003. During this reporting period, the efforts were focused primarily on the organizing and hosting the SWC Spring proposal meeting and organizing the fall technology transfer meetings.

  6. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  7. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  8. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  9. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  10. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  11. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  12. From International Idea to Domestic Policy: Explaining the Emergence of Same-Sex Partnership Recognition in Argentina and Brazil

    E-Print Network [OSTI]

    Schulenberg, Shawn Richard

    2010-01-01T23:59:59.000Z

    into domestic policy in Argentina and Brazil. It begins byConstructing Policy Innovation in Argentina: From GenderNot Possible Argentina DV: Possible SSPR Policy Adoption In

  13. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  14. Opportunities for utility involvement with solar domestic hot water

    SciTech Connect (OSTI)

    Carlisle, N.; Christensen, C. (National Renewable Energy Lab., Golden, CO (United States)); Barrett, L. (Barrett Consulting Associates, Inc., Colorado Springs, CO (United States))

    1992-05-01T23:59:59.000Z

    Solar water heating is one of a number of options that can be considered under utility demand-side management (DSM) programs. Utilities perceive a range of potential benefits for solar water heating in terms of customer service, energy conservation, load management, environmental enhancement, and public relations. The solar industry may benefit from utility marketing efforts, economies of scale, added credibility, financing options, and long-term maintenance arrangements. This paper covers three topics: (1) the energy and demand impacts of solar water heating on utility load profiles based on the results of four studies in the literature, (2) the results of workshops sponsored by the National Renewable Energy Laboratory (NREL) to identify key issues faced by utilities in considering residential solar water heating as a DSM option, (3) several current or planned utility programs to promote solar water heating. 7 refs.

  15. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  16. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  17. A review of "Politicizing Domesticity from Henrietta Maria to Milton's Eve" by Laura Lunger Knoppers

    E-Print Network [OSTI]

    Bunker, Nancy Mohrlock

    2013-01-01T23:59:59.000Z

    and scholars of Milton, Romanticism, and the long eighteenth century in general. Laura Lunger Knoppers. Politicizing Domesticity from Henrietta Maria to Milton?s Eve. Cambridge: Cambridge University Press, #18;#17;#16;#16;. #18;#18;#30; pp. + #1;#17; illus.... $#12;#14;.#17;#17;. Review by #26;#8;#26;#23;#20; ??#24;#21;#11;?#23;#6; #7;#22;#26;#6;#28;#21;, ? ??#11;#28; ?#28;?#21;? #8; #29;#25;#8;#25;#28; #23;?#11;#11;#28;?#28;. Politicizing Domesticity from Henrietta Maria to Milton?s Eve, by Laura Lunger...

  18. Measure Guideline: Combination Forced-Air Space and Tankless Domestic Hot Water Heating Systems

    SciTech Connect (OSTI)

    Rudd, A.

    2012-08-01T23:59:59.000Z

    This document describes design and application guidance for combination space and tankless domestic hot water heating systems (combination systems) used in residential buildings, based on field evaluation, testing, and industry meetings conducted by Building Science Corporation. As residential building enclosure improvements continue to drive heating loads down, using the same water heating equipment for both space heating and domestic water heating becomes attractive from an initial cost and space-saving perspective. This topic is applicable to single- and multi-family residential buildings, both new and retrofitted.

  19. Domestic violence is a health care problem of epidemic proportions. In addition to the immediate trauma caused by abuse, domestic violence contributes to a number of chronic health problems,

    E-Print Network [OSTI]

    Derisi, Joseph

    Domestic violence is a health care problem of epidemic proportions. In addition to the immediate trauma caused by abuse, domestic violence contributes to a number of chronic health problems, including depression, alcohol and substance abuse, sexually transmitted diseases such as HIV/AIDS, and often limits

  20. (Data in metric tons of tin content, unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S.

    E-Print Network [OSTI]

    176 TIN (Data in metric tons of tin content, unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms used about 92% of the primary tin consumed

  1. (Data in metric tons of tin content unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S.

    E-Print Network [OSTI]

    174 TIN (Data in metric tons of tin content unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms used about 80% of the primary tin consumed

  2. (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1998, there was no domestic tin mine production. Production of tin at the only U.S.

    E-Print Network [OSTI]

    180 TIN (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1998, there was no domestic tin mine production. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms consumed about 85% of the primary tin. The major uses

  3. (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1997, there was no domestic tin mine production. Production of tin at the only

    E-Print Network [OSTI]

    178 TIN (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1997, there was no domestic tin mine production. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms consumed about 85% of the primary tin. The major uses

  4. (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1999, there was no domestic tin mine production. Production of tin at the only

    E-Print Network [OSTI]

    176 TIN (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1999, there was no domestic tin mine production. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms consumed about 97% of the primary tin. The major uses

  5. (Data in metric tons of tin content, unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S.

    E-Print Network [OSTI]

    174 TIN (Data in metric tons of tin content, unless otherwise noted) Domestic Production and Use: Tin has not been mined domestically since 1993. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms used about 77% of the primary tin consumed

  6. (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1996, there was no domestic tin mine production. Production of tin at the only U.S.

    E-Print Network [OSTI]

    178 TIN (Data in metric tons of contained tin, unless otherwise noted) Domestic Production and Use: In 1996, there was no domestic tin mine production. Production of tin at the only U.S. tin smelter, at Texas City, TX, stopped in 1989. Twenty-five firms consumed about 85% of the primary tin. The major uses

  7. Dynamic Allocation of a Domestic Heating Task to Gas-Based and Heatpump-Based Heating Agents

    E-Print Network [OSTI]

    Treur, Jan

    Dynamic Allocation of a Domestic Heating Task to Gas-Based and Heatpump-Based Heating Agents Jan for a domestic heating task is introduced and analysed. The model includes two alternative heating agents (for gas-based heating and for heatpump-based heating), and a third allocation agent which determines

  8. Comparative Life-cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity Generation

    E-Print Network [OSTI]

    Jaramillo, Paulina

    1 Comparative Life-cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity from the LNG life-cycle. Notice that local distribution of natural gas falls outside our analysis boundary. Figure 1S: Domestic Natural Gas Life-cycle. Figure 2S: LNG Life-cycle. Processing Transmission

  9. A Leadership-Class U.S. Domestic Stellarator Program Hutch Neilson, David Gates, and Michael Zarnstorff

    E-Print Network [OSTI]

    A Leadership-Class U.S. Domestic Stellarator Program Hutch Neilson, David Gates, and Michael concepts or because they lack the core capabilities for it. U.S. leadership in QS stellarators is both.S. leadership in stellarators requires a domestic program to pursue U.S. innovations targeted to materially

  10. How Do Patents Shape Global Value Chains? International and Domestic Patenting and Value-Added Trade

    E-Print Network [OSTI]

    Sekhon, Jasjeet S.

    -Added Trade October 2014 Preliminary Draft ­ Please do not cite Nikolas J. Zolas, Center for Economic Studies that links patents to industry and trade classifications to characterize how patents affect the structure of value-added trade, we test how domestic and international (bilateral) patenting specifically related

  11. Colorado State University Mail Services DOMESTIC & INTERNATIONAL POSTAGE RATES January 26

    E-Print Network [OSTI]

    Colorado State University ­ Mail Services DOMESTIC & INTERNATIONAL POSTAGE RATES January 26 th Flat Rate Envelope $5.60 Legal Flat Rate Envelope $5.75 Padded Flat Rate Envelope $5.95 Small Flat Rate Box $5.80 Medium Flat Rate Box $12.35 Large Flat Rate Box $17.45 APO/FPO Large Flat Rate Box $15

  12. Ris-R-1203(EN) The Feasibility of Domestic CO2 Emissions

    E-Print Network [OSTI]

    Risø-R-1203(EN) The Feasibility of Domestic CO2 Emissions Trading in Poland By Jochen Hauff Edited feasible in Poland. However, a pilot emissions trading system in the power and Combined Heat and Power (CHP future introduction of a comprehensive system and for the emerging international emissions trading system

  13. Evolutionary dynamics of endogenous feline leukemia virus proliferation among species of the domestic cat lineage

    SciTech Connect (OSTI)

    Polani, Sagi, E-mail: sagi.polani@gmail.co [Koret School of Veterinary Medicine, Robert H. Smith Faculty of Agriculture, Food and Environment, Hebrew University of Jerusalem, Rehovot, 76100 (Israel); Roca, Alfred L., E-mail: roca@illinois.ed [Department of Animal Sciences and Institute for Genomic Biology, University of Illinois at Urbana-Champaign, Urbana, IL 61801 (United States); Rosensteel, Bryan B., E-mail: bryanr1@umbc.ed [University of Maryland, Baltimore, MD 21201 (United States); Kolokotronis, Sergios-Orestis, E-mail: koloko@amnh.or [Sackler Institute for Comparative Genomics, American Museum of Natural History, New York, NY 10024 (United States); Bar-Gal, Gila Kahila, E-mail: bargal@agri.huji.ac.i [Koret School of Veterinary Medicine, Robert H. Smith Faculty of Agriculture, Food and Environment, Hebrew University of Jerusalem, Rehovot, 76100 (Israel)

    2010-09-30T23:59:59.000Z

    Endogenous feline leukemia viruses (enFeLVs) occur in the germ lines of the domestic cat and related wild species (genus Felis). We sequenced the long terminal repeats and part of the env region of enFeLVs in domestic cats and five wild species. A total of 305 enFeLV sequences were generated across 17 individuals, demonstrating considerable diversity within two major clades. Distinct proliferations of enFeLVs occurred before and after the black-footed cat diverged from the other species. Diversity of enFeLVs was limited for the sand cat and jungle cat suggesting that proliferation of enFeLVs occurred within these species after they diverged. Relationships among enFeLVs were congruent with host species relationships except for the jungle cat, which carried only enFeLVs from a lineage that recently invaded the germline (enFeLV-AGTT). Comparison of wildcat and domestic cat enFeLVs indicated that a distinctive germ line invasion of enFeLVs has not occurred since the cat was domesticated.

  14. Domestic electricity consumption is con-tinuously increasing and now accounts

    E-Print Network [OSTI]

    Domestic electricity consumption is con- tinuously increasing and now accounts for about one third") enable detailed electricity consumption infor- mation to be captured, processed, and communicated electricity consumption infor- mation in real-time, enabling occupants to better understand their electricity

  15. WARMWASSER ERNEUERBARE ENERGIEN KLIMA RAUMHEIZUNG Adsorption Heat-Pumps for domestic heating

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    1 #12;WARMWASSER ERNEUERBARE ENERGIEN KLIMA RAUMHEIZUNG Adsorption Heat-Pumps for domestic heating J. Üpping1, E. Wagner1, D. Brühling1, K. Schiefelbein1, I. Daßler2, R. Hermann2, W. Mittelbach2 Heat module Gas adsorption heat pump #12;5 Zeolite ­ a natural mineral [1] von www.vaillant.de [2] www

  16. Domestic dogs and cats as sources of Trypanosoma cruzi infection in rural northwestern Argentina

    E-Print Network [OSTI]

    Cohen, Joel E.

    Domestic dogs and cats as sources of Trypanosoma cruzi infection in rural northwestern Argentina R, Buenos Aires, Argentina 2 Instituto Nacional de Parasitologi´a ``Dr. Mario Fatala Chaben'', Paseo Colo´n 568, 1032 Buenos Aires, Argentina 3 Division of Epidemiology and Preventive Medicine, Department

  17. MBA 505 Section 2 FALL 2012 MBA 505 DOMESTIC AND GLOBAL ECONOMIES

    E-Print Network [OSTI]

    Carter, John

    MBA 505 ­ Section 2 FALL 2012 1 MBA 505 DOMESTIC AND GLOBAL ECONOMIES ALBERS SCHOOL OF BUSINESS financial crisis and how did it turn into a global recession? How do events in the financial markets affect the rest of the economy? What was the role of fiscal policy in alleviating the crisis? How was the Fed

  18. Simulating the energy savings potential in domestic heating scenarios in Switzerland

    E-Print Network [OSTI]

    and ventilation, as well as the heat gains due to internal gains, solar gains and the heating system. In Section 5Simulating the energy savings potential in domestic heating scenarios in Switzerland Wilhelm a new methodology to prepare weather data for simulating the energy consumption of a heating system when

  19. Impact of domestic woodburning appliances on indoor air quality Corinne Mandin1

    E-Print Network [OSTI]

    Boyer, Edmond

    air pollution study (CITEPA), France * Corresponding email: Eva.Leoz@ineris.fr SUMMARY Data pollutants in ambient air. Consequently our study aims at describing both emission factors and inerisImpact of domestic woodburning appliances on indoor air quality Corinne Mandin1 , Jacques Ribéron2

  20. MATERIAL FLUX ANALYSIS (MFA) FOR PLANNING OF DOMESTIC WASTES AND WASTEWATER MANAGEMENT

    E-Print Network [OSTI]

    Richner, Heinz

    i MATERIAL FLUX ANALYSIS (MFA) FOR PLANNING OF DOMESTIC WASTES AND WASTEWATER MANAGEMENT: CASE of Nonthaburi, Statistical office of Nonthaburi and Agricultural extension office of Pak Kret for their kind nutrient management, organic waste, wastewater and septage that contained high concentration of nutrients

  1. Impact of swapping soils on the endophytic bacterial communities of pre-domesticated,

    E-Print Network [OSTI]

    Raizada, Manish N.

    Impact of swapping soils on the endophytic bacterial communities of pre-domesticated, ancient://www.biomedcentral.com/1471-2229/14/233 #12;RESEARCH ARTICLE Open Access Impact of swapping soils on the endophytic bacterial,3 , George Lazarovits2 and Manish N Raizada1* Abstract Background: Endophytes are microbes that live within

  2. 13. Sustainability in Practice: Exploring Innovations in Domestic Solid Waste Management in India

    E-Print Network [OSTI]

    Columbia University

    13. Sustainability in Practice: Exploring Innovations in Domestic Solid Waste Management in India environmental conditions, particularly through solid waste management. Solid waste is defined as the organic and inorganic waste materials generated by household, commercial and institutional establishments. A solid waste

  3. Are domestic load profiles stable over time? An attempt to identify target households for demand

    E-Print Network [OSTI]

    Are domestic load profiles stable over time? An attempt to identify target households for demand Bamberg, Germany Email: thorsten.staake@uni-bamberg.de Abstract--Elaborating demand side management future demand side will largely depend on an automatic control of larger loads, it is also widely agreed

  4. Estimating a Nucleotide Substitution Rate for Maize from Polymorphism at a Major Domestication Locus

    E-Print Network [OSTI]

    Doebley, John

    Estimating a Nucleotide Substitution Rate for Maize from Polymorphism at a Major Domestication To estimate a rate for single nucleotide substitutions for maize (Zea mays ssp. mays), we have taken advantage ge- nealogy, we have derived estimates for the nucleotide substitution rate for the tb1 intergenic

  5. THE EFFECT OF DOMESTIC WORK ON GIRLS' SCHOOLING: EVIDENCE FROM EGYPT

    E-Print Network [OSTI]

    Levinson, David M.

    1 THE EFFECT OF DOMESTIC WORK ON GIRLS' SCHOOLING: EVIDENCE FROM EGYPT Ragui Assaad, Deborah Levison, and Nadia Zibani forthcoming in Feminist Economics (2010) ABSTRACT In Egypt, girls' work to ban labor force work of children will have practically no effect on girls' education in Egypt, while

  6. Side-effects of plant domestication: ecosystem impacts of changes in litter quality

    E-Print Network [OSTI]

    Wall, Diana

    Side-effects of plant domestication: ecosystem impacts of changes in litter quality Pablo Garcia such as drought or pathogens. We hypothesized that predictions derived from the comparison of low vs high resource in microbial-poor and microbial-rich soils to exemplify intensively and extensively managed agricultural soils

  7. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  8. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  9. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  10. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  11. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  12. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  13. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  14. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  15. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  16. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  17. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  18. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  19. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  20. The Role Of Modeling Assumptions And Policy Instruments in Evaluating The Global Implications Of U.S. Biofuel Policies

    SciTech Connect (OSTI)

    Oladosu, Gbadebo A [ORNL; Kline, Keith L [ORNL

    2010-01-01T23:59:59.000Z

    The primary objective of current U.S. biofuel law the Energy Independence and Security Act of 2007 (EISA) is to reduce dependence on imported oil, but the law also requires biofuels to meet carbon emission reduction thresholds relative to petroleum fuels. EISA created a renewable fuel standard with annual targets for U.S. biofuel use that climb gradually from 9 billion gallons per year in 2008 to 36 billion gallons (or about 136 billion liters) of biofuels per year by 2022. The most controversial aspects of the biofuel policy have centered on the global social and environmental implications of its potential land use effects. In particular, there is an ongoing debate about whether indirect land use change (ILUC) make biofuels a net source, rather sink, of carbon emissions. However, estimates of ILUC induced by biofuel production and use can only be inferred through modeling. This paper evaluates how model structure, underlying assumptions, and the representation of policy instruments influence the results of U.S. biofuel policy simulations. The analysis shows that differences in these factors can lead to divergent model estimates of land use and economic effects. Estimates of the net conversion of forests and grasslands induced by U.S. biofuel policy range from 0.09 ha/1000 gallons described in this paper to 0.73 ha/1000 gallons from early studies in the ILUC change debate. We note that several important factors governing LUC change remain to be examined. Challenges that must be addressed to improve global land use change modeling are highlighted.

  1. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01T23:59:59.000Z

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  2. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  3. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  4. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  5. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  6. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  7. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  9. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  10. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  11. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  12. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  13. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  14. Solar heating, cooling and domestic hot water system installed at Columbia Gas System Service Corp. , Columbus, Ohio. Final report

    SciTech Connect (OSTI)

    None

    1980-11-01T23:59:59.000Z

    The Solar Energy System located at the Columbia Gas Corporation, Columbus, Ohio, has 2978 ft/sup 2/ of Honeywell single axis tracking, concentrating collectors and provides solar energy for space heating, space cooling and domestic hot water. A 1,200,000 Btu/h Bryan water-tube gas boiler provides hot water for space heating. Space cooling is provided by a 100 ton Arkla hot water fired absorption chiller. Domestic hot water heating is provided by a 50 gallon natural gas domestic storage water heater. Extracts are included from the site files, specification references, drawings, installation, operation and maintenance instructions.

  15. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    is with the Department of Electrical and Computer Engineering, University of Wisconsin, Madison, WI 53706 USA (e Abstract--One important assumption in a model of an electricity market is the format of bids and costs. Most literature on electricity markets uses piecewise linear or quadratic functions to represent costs

  16. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 reduction can be written V 2 = exp \\Gammaoe 2 h ; where oe 2 h is the high­pass phase jitter, given by the frequency \\Gamma2 , C = 0:128. When jitter correction is applied, I have tended to use a conservative value C = 0

  17. 1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2reduction can be written

    E-Print Network [OSTI]

    1 Jitter correction formulae; mmc 11 Oct 97 We start with the assumption that the V 2 jitter, given by the frequency- domain integral Z oe2h: for W (f) / f-2 , C = 0.128. When jitter correction is applied, I have tended to use a conservative

  18. The potential use of domestic safeguards interior monitors in International Safeguards

    SciTech Connect (OSTI)

    Williams, J.D.; Dupree, S.A. [Sandia National Labs., Albuquerque, NM (United States); Sonnier, C.S. [Jupiter Corp., Albuquerque, NM (United States)

    1998-08-01T23:59:59.000Z

    An important future element of International Safeguards instrumentation is expected to be the merging of containment/surveillance and nondestructive assay equipment with domestic physical protection equipment into integrated systems, coupled with remote monitoring. Instrumentation would include interior monitoring and assessment and entry/exit monitoring. Of particular importance is the application of interior monitors in spaces of declared inactivity; for example, in nuclear material storage locations that are entered infrequently. The use of modern interior monitors in International Safeguards offers potential for improving effectiveness and efficiency. Within the context of increased cooperation, one can readily envision increased interaction between International Safeguards and Domestic Safeguards, including increased joint use of State System of Accounting and Control data.

  19. Expert Meeting Report: Recommendations for Applying Water Heaters in Combination Space and Domestic Water Heating Systems

    SciTech Connect (OSTI)

    Rudd, A.; Ueno, K.; Bergey, D.; Osser, R.

    2012-07-01T23:59:59.000Z

    The topic of this meeting was 'Recommendations For Applying Water Heaters In Combination Space And Domestic Water Heating Systems.' Presentations and discussions centered on the design, performance, and maintenance of these combination systems, with the goal of developing foundational information toward the development of a Building America Measure Guideline on this topic. The meeting was held at the Westford Regency Hotel, in Westford, Massachusetts on 7/31/2011.

  20. The nutritional impact of domestic food programs in the United States

    E-Print Network [OSTI]

    Keplinger, Keith Oswald

    1981-01-01T23:59:59.000Z

    event in U. S. legislative history. Even more recent is the evolution of domestic food programs from the status of being primarily vents for surplus agricultural production to their present form where they exist as welfare programs in their own right... of the Food Stamp Program on food consumption in the Southern U. S. Many of the same variables are included in the analysis athough the specification is different. In particular, the food stamp variable, interacting with other independent variables...

  1. Energy Consumption and Demand as Affected by Heat Pumps that Cool, Heat and Heat Domestic Water

    E-Print Network [OSTI]

    Cawley, R.

    heaters. The methods presented demonstrate how integrated systems can be of value in reducing daily summertime peaks. INTRODUCTION A need for descriptors to evaluate systems that condition space and heat domestic water has been recognized for several... added to and used by the water from the desuperheated refrigerant - heat normally provided by the electric water heater's resistance elements. DESCRIPTION OF EQUIPMENT The system considered for this study is best described by U.S. Patent No. 4...

  2. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  3. Evolving Trends of U.S. Domestic Airfares: The Impacts of Competition, Consolidation, and Low-Cost Carriers

    E-Print Network [OSTI]

    Wittman, Michael D.

    2013-08-15T23:59:59.000Z

    This paper investigates the effects of flight reductions and disciplined airline capacity management strategies on average one-way domestic airfares at 445 U.S. airports from 2007-2012. Average one-way airfares are found ...

  4. The use of public space by foreign female domestic workers in Hong Kong, Singapore and Kuala Lumpur

    E-Print Network [OSTI]

    Koh, Cha-ly

    2009-01-01T23:59:59.000Z

    In globalizing cities around the world, middle class women are departing from their traditional domestic roles in child rearing and home management. This activity change creates a large influx of young, single and lower ...

  5. Domestic smoke pollution and acute respiratory infections in a rural community of the hill region of Nepal

    SciTech Connect (OSTI)

    Pandey, M.R.; Neupane, R.P.; Gautam, A.; Shrestha, I.B. (Mrigendra Medical Trust, Kathmandu (Nepal))

    1989-01-01T23:59:59.000Z

    Acute respiratory infections (ARI) are the cause of death for at least five million children per year under five years of age. Most of these deaths occur in developing countries. Domestic smoke pollution is very common in many parts of the developing world, and appropriate technology, such as smokeless stoves, is available to reduce this type of pollution. The present study has been undertaken in a rural community of the hill region of Nepal to find out if there is any association between domestic smoke pollution and ARI in infants and children younger than two years of age. This preliminary study showed that episodes of moderate and severe ARI increased with increases in the level of exposure to domestic smoke pollution, thus suggesting domestic smoke pollution to be an important, preventable risk factor of ARI.

  6. Determining the antiquity of dog origins: canine domestication as a model for the consilience between molecular genetics and archaeology

    E-Print Network [OSTI]

    Raisor, Michelle Jeanette

    2004-11-15T23:59:59.000Z

    genetics are so complex that most archaeologists have difficulty in providing evidence that would be contradictory to molecular theory. Fourth, both fields of study continually ignore innate behavioral characteristics of wolves that would make domestication...

  7. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  8. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  12. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  13. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  14. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  15. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  16. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  17. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  18. Audit Report on "The Department's Management of Nuclear Materials Provided to Domestic Licensees"

    SciTech Connect (OSTI)

    None

    2009-02-01T23:59:59.000Z

    The objective if to determine whether the Department of Energy (Department) was adequately managing its nuclear materials provided to domestic licensees. The audit was performed from February 2007 to September 2008 at Department Headquarters in Washington, DC, and Germantown, MD; the Oak Ridge Office and the Oak Ridge National Laboratory in Oak Ridge, TN. In addition, we visited or obtained data from 40 different non-Departmental facilities in various states. To accomplish the audit objective, we: (1) Reviewed Departmental and Nuclear Regulatory Commission (NRC) requirements for the control and accountability of nuclear materials; (2) Analyzed a Nuclear Materials Management and Safeguards System (NMMSS) report with ending inventory balances for Department-owned nuclear materials dated September 30, 2007, to determine the amount and types of nuclear materials located at non-Department domestic facilities; (3) Held discussions with Department and NRC personnel that used NMMSS information to determine their roles and responsibilities related to the control and accountability over nuclear materials; (4) Selected a judgmental sample of 40 non-Department domestic facilities; (5) Met with licensee officials and sent confirmations to determine whether their actual inventories of Department-owned nuclear materials were consistent with inventories reported in the NMMSS; and, (6) Analyzed historical information related to the 2004 NMMSS inventory rebaselining initiative to determine the quantity of Department-owned nuclear materials that were written off from the domestic licensees inventory balances. This performance audit was conducted in accordance with generally accepted Government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The audit included tests of controls and compliance with laws and regulations related to managing the Department-owned nuclear materials provided to non-Departmental domestic licensees. Because our review was limited it would not necessarily have disclosed all internal control deficiencies that may have existed at the time of our audit. We examined the establishment of performance measures in accordance with Government Performance and Results Act of 1993, as they related to the audit objective. We found that the Department had established performance measures related to removing or disposing of nuclear materials and radiological sources around the world. We utilized computer generated data during our audit and performed procedures to validate the reliability of the information as necessary to satisfy our audit objective. As noted in the report, we questioned the reliability of the NMMSS data.

  19. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  20. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  1. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  2. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  3. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  4. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  5. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  6. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  7. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  8. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  9. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  10. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  11. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  12. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  13. A review of "Literature and Domestic Travel in Early Modern England" by Andrew McRae

    E-Print Network [OSTI]

    Aune, M. G.

    2012-01-01T23:59:59.000Z

    century, and the kind of work it does today. Andrew McRae. Literature and Domestic Travel in Early Modern England. Cambridge: Cambridge University Press, 2009. xi + 247 pp. + 9 illus. $90.00. Review by #21;.#8;. #25;#29;#27;#30;, #24;#25; #18...;#7;#20;#31;#27;#18;#25; #29;#27;#18;#17;#30;#31;#26;#18;#19;#16; #20;#7; #6;#30;#27;#27;#26;#16; #17;#25;#27;#18;#25;. #14;e work of Andrew McRae, professor of English at the University of Exeter demonstrates a consistent interest in the intersections of lit- erature...

  14. Japanese suppliers in transition from domestic nuclear reactor vendors to international suppliers

    SciTech Connect (OSTI)

    Forsberg, C.W.; Reich, W.J.; Rowan, W.J.

    1994-06-27T23:59:59.000Z

    Japan is emerging as a major leader and exporter of nuclear power technology. In the 1990s, Japan has the largest and strongest nuclear power supply industry worldwide as a result of the largest domestic nuclear power plant construction program. The Japanese nuclear power supply industry has moved from dependence on foreign technology to developing, design, building, and operating its own power plants. This report describes the Japanese nuclear power supply industry and examines one supplier--the Mitsubishi group--to develop an understanding of the supply industry and its relationship to the utilities, government, and other organizations.

  15. Appearance of the first cemental annulation of permanent incisor teeth of the domestic cat (Felis catus)

    E-Print Network [OSTI]

    Choi, In-Back

    1983-01-01T23:59:59.000Z

    APPEARANCE OF THE FIRST CEMENTAL ANNULATION OF PERMANENT INCISOR TEETH OF THE OOMESTIC CAT (FELIS CA US) A Thesis by IN-BACK CHOI Submitted to the Graduate College of Texas AIlM University in partial fulfillment of the requirements for degree... of MASTER OF SCIENCE August 19S3 Major Subject: Veterinary Anatomy APPEARANCE OF THE FIRST CEMENTAL ANNULATION OF THE FFRMANENT INCISOR TEETH OF THE DOMEST'C CAT (EEL IS CATL'S) A Thesis by IN-BACK CHOI Approved as to styie and content by: is, D. V...

  16. Sacrifice as the ideal hunt: ?a cosmological explanation for the origin of reindeer domestication

    E-Print Network [OSTI]

    Willerslev, Rane; Vitebsky, Piers; Alekseyev, Anatoly

    2014-07-04T23:59:59.000Z

    ’s sources are an idealized fiction. In less extreme critiques, Anderson (2002: 127) also criticises the idea that animals surrender themselves freely, and Knight objects to the ‘hunting-as-sharing’ hypothesis promoted by Ingold (2000) and Nurit Bird... moose stood motionless, as if carved out of a rock.’ This image of immobility is strikingly similar to the way a domestic reindeer is captured by lasso, tied up and unable to run away during a sacrificial slaughter, and we interpret these techniques as a...

  17. Treatment of domestic wastewater for reuse with activated silica and magnesia 

    E-Print Network [OSTI]

    Lindner, John Howard

    1985-01-01T23:59:59.000Z

    and lime are effective at removing these components' The effectiveness of these coagulants was determined by running a series of jar tests on treated domestic wastewater over a range of pH values. Samples were taken of each coagulant dose added and a... of activated silica in combination with 60 mg/1 alum. Both series 20 were run at pH values of 4, 5, 6, 7, 8 and 9. A third series of jar tests were conducted with low doses of activated silica and sufficient lime to obtain a pH of 9, 10 and 11...

  18. Domestic U.S. Reactor Conversions: Fact Sheet | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscovering How MusclesAdministration Domestic U.S.

  19. Domestic production of medical isotope Mo-99 moves a step closer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscovering How MusclesAdministrationDomestic

  20. U.S. Domestic and Foreign Coal Distribution by State of Origin

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Buildingto17 34 44Year Jan Feb Mar Apr May Jun602 1,39720Sales1 Domestic

  1. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  2. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  3. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  4. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  5. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  6. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  7. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  8. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  9. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  10. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  11. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  12. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  13. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  14. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  15. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  16. Research needs to maximize economic producibility of the domestic oil resource

    SciTech Connect (OSTI)

    Tham, M.K.; Burchfield, T.; Chung, Ting-Horng; Lorenz, P.; Bryant, R.; Sarathi, P.; Chang, Ming Ming; Jackson, S.; Tomutsa, L. (National Inst. for Petroleum and Energy Research, Bartlesville, OK (United States)); Dauben, D.L. (K and A Energy Consultants, Inc., Tulsa, OK (United States))

    1991-10-01T23:59:59.000Z

    NIPER was contracted by the US Department of Energy Bartlesville (Okla.) Project Office (DOE/BPO) to identify research needs to increase production of the domestic oil resource, and K A Energy Consultants, Inc. was subcontracted to review EOR field projects. This report summarizes the findings of that investigation. Professional society and trade journals, DOE reports, dissertations, and patent literature were reviewed to determine the state-of-the-art of enhanced oil recovery (EOR) and drilling technologies and the constraints to wider application of these technologies. The impacts of EOR on the environment and the constraints to the application of EOR due to environmental regulations were also reviewed. A review of well documented EOR field projects showed that in addition to the technical constraints, management factors also contributed to the lower-than-predicted oil recovery in some of the projects reviewed. DOE-sponsored projects were reviewed, and the achievements by these projects and the constraints which these projects were designed to overcome were also identified. Methods of technology transfer utilized by the DOE were reviewed, and several recommendations for future technology transfer were made. Finally, several research areas were identified and recommended to maximize economic producibility of the domestic oil resource. 14 figs., 41 tabs.

  17. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols -- FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2008-12-05T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities.

  18. Compiled 11/ 14/ 2011 by OPBA. These assumptions are for modeling purposes only. They are subject to change. Page 1 of 2

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    .1 Electricity 2% 2% 231.7 3.7 Fuel Oil 9% 8% 240.8 3.9 Natural Gas -25% 0% 253.1 5.1 Lab Gas 0% 0% 260.3 2.8 Water 3% 3% 273.2 5.0 Sewer 6% 5% 279.3 2.2 Garbage 4% 4% 281.8 0.9 *FY13 based on projections dated 6.03% 18.46% 3.33% 5.54% Higher Education Price Index (HEPI)* Utility Assumptions Fiscal Year 2002 3,679 3

  19. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  20. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  1. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production of copper in 2010 declined by about 5% to 1.12 million

    E-Print Network [OSTI]

    --Arizona, Utah, Nevada, New Mexico, and Montana--accounted for more than 99% of domestic production; copper also, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 49%; electric and mill, thousands 8.4 9.7 11.9 8.3 8.7 Net import reliance 4 as a percentage of apparent consumption 38

  2. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production in 2006 rose to more than 1.2 million tons and was

    E-Print Network [OSTI]

    Mexico, Nevada, and Montana--accounted for 99% of domestic production; copper was also recovered at mines, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 49%; electric, and metal exchanges 1,030 657 134 66 115 Employment, mine and mill, thousandse 7.0 6.8 7.0 7.0 7.2 Net

  3. (Data in thousand metric tons of copper content, unless otherwise noted) Domestic Production and Use: Domestic mine production in 1997 was essentially unchanged at 1.9 million metric

    E-Print Network [OSTI]

    Mexico, Nevada, and Montana, accounted for 98% of domestic production; copper was also recovered at mines in building construction, 43%; electric and electronic products, 24%; industrial1 machinery and equipment, 12 119 163 146 2505 Employment, mine and mill, thousands 13.3 13.1 13.8 13.2 13.3 Net import reliance

  4. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production in 2005 fell nominally to 1.15 million tons and was

    E-Print Network [OSTI]

    Mexico, Nevada, and Montana, accounted for 99% of domestic production; copper was also recovered at mines, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 49%; electric exchanges 952 1,030 657 134 70 Employment, mine and mill, thousands 8.2 7.0 6.8 7.0 7.0 Net import reliance4

  5. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production in 2008 increased by about 12% to 1.3 million tons and

    E-Print Network [OSTI]

    --Arizona, Utah, New Mexico, Nevada, and Montana--accounted for more than 99% of domestic production; copper also, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 49%; electric, mine and mill, thousands 6.4 7.0 8.4 9.7 11.2 Net import reliance4 as a percentage of apparent

  6. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production in 2007 declined nominally to 1.19 million tons, but its

    E-Print Network [OSTI]

    --Arizona, Utah, New Mexico, Nevada, and Montana--accounted for 99% of domestic production; copper was also, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 51%; electric, mine and mill, thousandse 6.8 7.0 7.0 7.2 7.3 Net import reliance4 as a percentage of apparent

  7. (Data in thousand metric tons of copper content unless otherwise noted) Domestic Production and Use: Domestic mine production in 2009 declined by about 9% to 1.2 million tons and its

    E-Print Network [OSTI]

    --Arizona, Utah, New Mexico, Nevada, and Montana--accounted for more than 99% of domestic production; copper also, and miscellaneous consumers. Copper and copper alloy products were used in building construction, 50%; electric and mill, thousands 7.0 8.4 9.7 11.9 9.1 Net import reliance4 as a percentage of apparent consumption 42 38

  8. (Data in thousand metric tons, unless noted) Domestic Production and Use: In 1995, clays were produced in most States except Alaska, Delaware, Hawaii,

    E-Print Network [OSTI]

    44 CLAYS (Data in thousand metric tons, unless noted) Domestic Production and Use: In 1995, clays, these firms operated about 983 mines. Estimated value of all marketable clay produced was about $1.8 billion. Major domestic uses for specific clays were estimated as follows: kaolin--55% paper, 8% kiln furniture

  9. (Data in thousand metric tons, unless otherwise noted) Domestic Production and Use: In 1998, clays were produced in most States except Alaska, Delaware, Hawaii, Idaho,

    E-Print Network [OSTI]

    50 CLAYS (Data in thousand metric tons, unless otherwise noted) Domestic Production and Use: In 1998, clays were produced in most States except Alaska, Delaware, Hawaii, Idaho, New Hampshire, Rhode clay produced was about $2.14 billion. Major domestic uses for specific clays were estimated as follows

  10. (Data in thousand metric tons of metal, unless otherwise noted) Domestic Production and Use: In 2000, 12 companies operated 23 primary aluminum reduction plants. Montana,

    E-Print Network [OSTI]

    , and Issues: Domestic primary aluminum production decreased owing in large part to the smelter production cutbacks caused by increased energy costs, particularly in the Pacific Northwest. Domestic smelters aluminum smelter in Hawesville, KY. The acquisition was subject to the completion of a labor agreement

  11. (Data in metric tons of contained lithium, unless noted) Domestic Production and Use: The United States was the largest producer and consumer of lithium minerals and

    E-Print Network [OSTI]

    by Joyce A. Ober, (703) 648-7717. #12;97 LITHIUM Events, Trends, and Issues: The Department of Energy (DOE produced lithium compounds for domestic consumption as well as for export to other countries. The use% of estimated domestic consumption. Other major end uses for lithium were in the manufacture of lubricants

  12. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  13. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    and incentives for renewable resources Federal Production Tax Credit (PTC) 2.3 cents/kWh over first 10 years of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar, fuel cell and small wind (geothermal, CHP BETC ­ just Oregon (now expired) 5 #12

  14. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking Over OurSecretaryFigureAtmospheric

  15. Domestic Water Conservation Technologies: Federal Energy Management Program (FEMP) Federal Technology Alert (Booklet)

    SciTech Connect (OSTI)

    Not Available

    2002-10-01T23:59:59.000Z

    Executive Order 13123 calls for the Federal government to conserve water as well as energy in its 500,000 facilities. To help set priorities among water-saving measures, the Federal Energy Management Program conducted a study of Federal water use in 1997. The study indicated that the government consumes more than 50% of its water in just three types of Federal facilities: housing, hospitals, and office buildings. These facilities have enough kitchens, rest rooms, and laundry areas to provide facility managers with many opportunities to begin reducing their water use (and utility costs) with appropriate water-saving fixtures and products. Therefore, this Federal Technology Alert focuses on domestic technologies, products, and appliances such as water-efficient faucets, showerheads, toilets, urinals, washing machines, and dishwashers. Conserving water also saves the energy needed to treat, pump, and heat that water in homes, businesses, and other buildings.

  16. Total ionizing dose effects of domestic SiGe HBTs under different dose rate

    E-Print Network [OSTI]

    Mo-Han, Liu; Wu-Ying, Ma; Xin, Wang; Qi, Guo; Cheng-Fa, He; Ke, Jiang; Xiao-Long, Li; Ming-Zhu, Xiong

    2015-01-01T23:59:59.000Z

    The total ionizing radiation (TID) response of commercial NPN silicon germanium hetero-junction bipolar transistors (SiGe HBTs) produced domestic were investigated under the dose rate of 800mGy(Si)/s and 1.3mGy(Si)/s with Co-60 gamma irradiation source, respectively. The changes of the transistor parameter such as Gummel characteristics, excess base current before and after irradiation are investigated. The results of the experiments shows that for the KT1151, the radiation damage have slightly difference under the different dose rate after the prolonged annealing, shows an time dependent effect(TDE). But for the KT9041, the degradations of low dose rate irradiation are more higher than the high dose rate, demonstrate that there have potential enhanced low dose rate sensitive(ELDRS) effect exist on KT9041. The underlying physical mechanisms of the different dose rates response induced by the gamma ray are detailed discussed.

  17. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  18. One Machine for Heating Cooling & Domestic Hot Water: Multi-Function Heat Pumps to Enable Zero Net Energy Homes

    E-Print Network [OSTI]

    California at Davis, University of

    One Machine for Heating Cooling & Domestic Hot Water: Multi-Function Heat Pumps to Enable Zero Net at the core of a zero-net-energy demonstration home designed to generate enough electricity to also power policy initiatives to advance zero net energy homes as standard practice. #12;As heat pump systems become

  19. Domestic plan summary of benefits* SHIP members must use University Health Services (UHS) for allavailableprimary,urgent,andpreventive

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    -of-pocket expense. MedicalandMentalHealthCounselingservicesatUHSinclude: Primary Care;Women's Health; STITesting andMadisonOptometricCenter,globalOut-Of-Networkcoverage, andworldwideassistance(includingmedicalevacuationandrepatriation). Benefit Category Health Care at UHS Health Care In-Network** HealthCareOut-Of-Network 2013­14 premium rates -- Domestic plan PlanYear Deductible None $250 $500

  20. Ultra-High Performance Concrete with Tailored Properties Cementitious materials comprise a large portion of domestic structures and

    E-Print Network [OSTI]

    Li, Mo

    Ultra-High Performance Concrete with Tailored Properties Cementitious materials comprise a large portion of domestic structures and infrastructure. The development of ultra-high performance concrete of buildings or structures to dynamic loading and fire. Overview of research program on UHPC or CEP (concrete

  1. EA-1929: NorthStar Medical Technologies LLC, Commercial Domestic Production of the Medical Isotope Molybdenum-99

    Broader source: Energy.gov [DOE]

    This EA evaluates the potential environmental impacts of a proposal to use federal funds to support and accelerate Northstar Medical Radioisotopes' project to develop domestic, commercial production capability for the medical isotope Molybdenum-99 without the use of highly enriched uranium.

  2. Yield Comparison for Domestic Photovoltaic Installation across the UK Scottish Institute for Solar Energy Research, May 2014

    E-Print Network [OSTI]

    Painter, Kevin

    Yield Comparison for Domestic Photovoltaic Installation across the UK Scottish Institute for Solar Energy Research, May 2014 This study has been carried out in order to assess the available electricity to simulate the potential yield for a range of solar technologies. The software is preinstalled with global

  3. Magnetic refrigeration, based on the magnetocaloric ef-fect, has great promise for domestic and industrial use and is at-

    E-Print Network [OSTI]

    Canet, Léonie

    Magnetic refrigeration, based on the magnetocaloric ef- fect, has great promise for domestic the magnetization phase, and heat is withdrawn from the volume to be refrigerated during the demagnetization phase but these LaFeSi ma- terials seem to have the best properties in view of magnetic refrigeration applications

  4. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  5. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  6. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  7. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  8. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  9. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  10. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  11. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  12. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  13. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  14. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  15. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  16. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  17. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  18. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  19. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  20. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  1. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  2. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  3. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  4. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  5. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  6. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  7. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  8. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  9. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  10. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  11. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  12. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  13. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01T23:59:59.000Z

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  14. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  15. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  16. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  17. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  18. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  19. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  20. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  1. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  2. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  3. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  4. The discussion on improving regu-latory approval for domestic resource

    E-Print Network [OSTI]

    Hadly, Elizabeth

    . The introductory letter in the report carries the headline "Cali- fornia Ranks with Bolivia, Lags Behind Kyrgyzstan jurisdictions worldwide, along- side regimes such as Bolivia, Mongolia, and Guatemala." Fred McMahon, coor such as the alternative energy industry, a key component in the current administra- tion's recovery program

  5. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  6. Comparison of domestic olivine and European magnesite for electrically charged thermal energy storage

    SciTech Connect (OSTI)

    Laster, W.R.; Gay, B.M.; Palmour, H.; Schoenhals, R.J.

    1982-01-01T23:59:59.000Z

    Electrically charged thermal energy storage (TES) heaters employing high heat capacity ceramic refractories for sensible heat storage have been in use in Europe for several years. With these devices, low cost off-peak electrical energy is stored by heating a storage core composed of ceramic material to approximately 800/sup 0/C. During the peak period, no electrical energy is used as the building heating needs are supplied by extracting the stored energy from the core by forced air circulation. The recent increase in use of off-peak TES units in the U.S. has led to the search for a domestic supply of high heat capacity ceramic refractory material. North Carolina's extensive but underutilized supply of refractory grade olivine has been proposed as a source of storage material for these units. In this paper the suitability of North Carolina olivine for heat storage applications is assessed by comparing its thermal performance with that of European materials. Using the method of ASHRAE Standard 94.2, the thermal performance of two commercially available room-size TES units was determined experimentally with two different storage materials, North Carolina olivine and German magnesite. Comparisons are made and conclusions are drawn.

  7. Summary history of domestic uranium procurement under US Atomic Energy Commission contracts. Final report

    SciTech Connect (OSTI)

    Albrethsen, H. Jr.; McGinley, F.E.

    1982-09-01T23:59:59.000Z

    During the period 1947 through 1970, the Atomic Energy Commission (AEC) fostered the rapid development and expansion of the domestic uranium mining and milling industry by providing a market for uranium. Some thirty-two mills were constructed during that period to produce U/sub 3/O/sub 8/ concentrates for sale to the AEC. In addition, there were various pilot plants, concentrators, upgraders, heap leach, and solution mining facilities that operated during the period. The purpose of this report is to compile a short narrative history of the AEC's uranium concentrate procurement program and to describe briefly each of the operations that produced uranium for sale to the AEC. Contractual arrangements are described and data are given on quantities of U/sub 3/O/sub 8/ purchased and prices paid. Similar data are included for V/sub 2/O/sub 5/, where applicable. Mill and other plant operating data were also compiled from old AEC records. These latter data were provided by the companies, as a contractual requirement, during the period of operation under AEC contracts. Additionally, an effort was made to determine the present status of each facility by reference to other recently published reports. No sites were visited nor were the individual reports reviewed by the companies, many of which no longer exist. The authors relied almost entirely on published information for descriptions of facilities and milling processes utilized.

  8. Evaluating Domestic Hot Water Distribution System Options With Validated Analysis Models

    SciTech Connect (OSTI)

    Weitzel, E.; Hoeschele, M.

    2014-09-01T23:59:59.000Z

    A developing body of work is forming that collects data on domestic hot water consumption, water use behaviors, and energy efficiency of various distribution systems. A full distribution system developed in TRNSYS has been validated using field monitoring data and then exercised in a number of climates to understand climate impact on performance. This study builds upon previous analysis modelling work to evaluate differing distribution systems and the sensitivities of water heating energy and water use efficiency to variations of climate, load, distribution type, insulation and compact plumbing practices. Overall 124 different TRNSYS models were simulated. Of the configurations evaluated, distribution losses account for 13-29% of the total water heating energy use and water use efficiency ranges from 11-22%. The base case, an uninsulated trunk and branch system sees the most improvement in energy consumption by insulating and locating the water heater central to all fixtures. Demand recirculation systems are not projected to provide significant energy savings and in some cases increase energy consumption. Water use is most efficient with demand recirculation systems, followed by the insulated trunk and branch system with a central water heater. Compact plumbing practices and insulation have the most impact on energy consumption (2-6% for insulation and 3-4% per 10 gallons of enclosed volume reduced). The results of this work are useful in informing future development of water heating best practices guides as well as more accurate (and simulation time efficient) distribution models for annual whole house simulation programs.

  9. Life cycle costs for the domestic reactor-based plutonium disposition option

    SciTech Connect (OSTI)

    Williams, K.A.

    1999-10-01T23:59:59.000Z

    Projected constant dollar life cycle cost (LCC) estimates are presented for the domestic reactor-based plutonium disposition program being managed by the US Department of Energy Office of Fissile Materials Disposition (DOE/MD). The scope of the LCC estimate includes: design, construction, licensing, operation, and deactivation of a mixed-oxide (MOX) fuel fabrication facility (FFF) that will be used to purify and convert weapons-derived plutonium oxides to MOX fuel pellets and fabricate MOX fuel bundles for use in commercial pressurized-water reactors (PWRs); fuel qualification activities and modification of facilities required for manufacture of lead assemblies that will be used to qualify and license this MOX fuel; and modification, licensing, and operation of commercial PWRs to allow irradiation of a partial core of MOX fuel in combination with low-enriched uranium fuel. The baseline cost elements used for this document are the same as those used for examination of the preferred sites described in the site-specific final environmental impact statement and in the DOE Record of Decision that will follow in late 1999. Cost data are separated by facilities, government accounting categories, contract phases, and expenditures anticipated by the various organizations who will participate in the program over a 20-year period. Total LCCs to DOE/MD are projected at approximately $1.4 billion for a 33-MT plutonium disposition mission.

  10. Fridge of the future: Designing a one-kilowatt-hour/day domestic refrigerator-freezer

    SciTech Connect (OSTI)

    Vineyard, E.A.; Sand, J.R.

    1998-03-01T23:59:59.000Z

    An industry/government Cooperative Research and Development Agreement (CRADA) was established to evaluate and test design concepts for a domestic refrigerator-freezer unit that represents approximately 60% of the US market. The goal of the CRADA was to demonstrate advanced technologies which reduce, by 50 percent, the 1993 NAECA standard energy consumption for a 20 ft{sup 3} (570 I) top-mount, automatic-defrost, refrigerator-freezer. For a unit this size, the goal translated to an energy consumption of 1.003 kWh/d. The general objective of the research was to facilitate the introduction of cost-efficient technologies by demonstrating design changes that can be effectively incorporated into new products. A 1996 model refrigerator-freezer was selected as the baseline unit for testing. Since the unit was required to meet the 1993 NAECA standards, the energy consumption was quite low (1.676 kWh/d), thus making further reductions in energy consumption very challenging. Among the energy saving features incorporated into the original design of the baseline unit were a low-wattage evaporator fan, increased insulation thicknesses, and liquid line flange heaters.

  11. Experimental and cost analyses of a one kilowatt-hour/day domestic refrigerator-freezer

    SciTech Connect (OSTI)

    Vineyard, E.A.; Sand, J.R.

    1997-05-01T23:59:59.000Z

    Over the past ten years, government regulations for energy standards, coupled with the utility industry`s promotion of energy-efficient appliances, have prompted appliance manufacturers to reduce energy consumption in refrigerator-freezers by approximately 40%. Global concerns over ozone depletion have also required the appliance industry to eliminate CFC-12 and CFC-11 while concurrently improving energy efficiency to reduce greenhouse emissions. In response to expected future regulations that will be more stringent, several design options were investigated for improving the energy efficiency of a conventionally designed, domestic refrigerator-freezer. The options, such as cabinet and door insulation improvements and a high-efficiency compressor were incorporated into a prototype refrigerator-freezer cabinet and refrigeration system. Baseline energy consumption of the original 1996 production refrigerator-freezer, along with cabinet heat load and compressor calorimeter test results, were extensively documented to provide a firm basis for experimentally measured energy savings. The goal for the project was to achieve an energy consumption that is 50% below in 1993 National Appliance Energy Conservation Act (NAECA) standard for 20 ft{sup 3} (570 l) units. Based on discussions with manufacturers to determine the most promising energy-saving options, a laboratory prototype was fabricated and tested to experimentally verify the energy consumption of a unit with vacuum insulation around the freezer, increased door thicknesses, a high-efficiency compressor, a low wattage condenser fan, a larger counterflow evaporator, and adaptive defrost control.

  12. Improving thermosyphon solar domestic hot water system model performance. Final report, March 1994--February 1995

    SciTech Connect (OSTI)

    Swift, T.N.

    1996-09-01T23:59:59.000Z

    Data from an indoor solar simulator experimental performance test is used to develop a systematic calibration procedure for a computer model of a thermosyphoning, solar domestic hot water heating system with a tank-in-tank heat exchanger. Calibration is performed using an indoor test with a simulated solar collector to adjust heat transfer in the heat exchanger and heat transfer between adjacent layers of water in the storage tank. An outdoor test is used to calibrate the calculation of the friction drop in the closed collector loop. Additional indoor data with forced flow in the annulus of the heat exchanger leads to improved heat transfer correlations for the inside and outside regions of the tank-in-tank heat exchanger. The calibrated simulation model is compared to several additional outdoor tests both with and without auxiliary heating. Integrated draw energies are predicted with greater accuracy and draw temperature profiles match experimental results to a better degree. Auxiliary energy input predictions improve significantly. 63 figs., 29 tabs.

  13. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  14. Housing sexuality: domestic space and the development of female sexuality in the fiction of Angela Carter and Jeanette Winterson 

    E-Print Network [OSTI]

    Cantrell, Samantha E.

    2005-08-29T23:59:59.000Z

    Whirter (Member) ___________________________ Melanie Hawthorne (Member) ___________________________ Paul A. Parrish (Head of Department) May 2004 Major Subject: English iii ABSTRACT Housing Sexuality Domestic Space and the Development of Female Sexuality... committee: Marian Eide, Melanie Hawthorne, Pam Matthews, and David McWhirter. Their confidence in me and patience with me helped me to face the daunting task of writing. Paulette Bomnskie in the English Graduate Studies Office offered vital support as I...

  15. Situation and outlook for foreign and domestic rice trade: recommendations to expand U.S. market share 

    E-Print Network [OSTI]

    Bates, Kathy

    1991-01-01T23:59:59.000Z

    SITUATION AND OUTLOOK FOR FOREIGN AND DOMESTIC RICE TRADE: RECOMMENDATIONS TO EXPAND U. S. MARKET SHARE A Professional Paper by Kathy Bates Submitted to the College of Agriculture and Life Sciences of Texas A&M University in partial... was compiled, I created a 157 page circular which was approved by the World Agricultural Outlook Board and published in October of 1989. This publication contains the latest available supply and distribution estimates for each country in the Foreign...

  16. Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (United States). Civil and Environmental Engineering Department

    2007-09-15T23:59:59.000Z

    The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

  17. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  18. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  19. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  20. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  1. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  2. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  3. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  4. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  6. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  7. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  8. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  9. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  10. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  11. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  12. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  13. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  14. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  15. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  16. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  17. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  18. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  19. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  20. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's