Sample records for key assumptions product

  1. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  2. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01T23:59:59.000Z

    .................................................................................76 22 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy for Course A................78 23 Students? Level of Self-Directedness Compared with Students? Level of Agreement... with the Key Assumptions of Andragogy in Course B..................79 24 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy in Course C..................80 25 Students? Level of Self...

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  4. Science with the Square Kilometer Array: Motivation, Key Science Projects, Standards and Assumptions

    E-Print Network [OSTI]

    C. Carilli; S. Rawlings

    2004-09-12T23:59:59.000Z

    The Square Kilometer Array (SKA) represents the next major, and natural, step in radio astronomical facilities, providing two orders of magnitude increase in collecting area over existing telescopes. In a series of meetings, starting in Groningen, the Netherlands (August 2002) and culminating in a `science retreat' in Leiden (November 2003), the SKA International Science Advisory Committee (ISAC), conceived of, and carried-out, a complete revision of the SKA science case (to appear in New Astronomy Reviews). This preface includes: (i) general introductory material, (ii) summaries of the key science programs, and (iii) a detailed listing of standards and assumptions used in the revised science case.

  5. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    Key assumptions The level of oil production by OPEC is a key factor influencing the oil price projections incorporated into AEO2013. Non-OPEC production, worldwide regional...

  6. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    oil prices, production rates, and costs. He noted that comparative revenues are highly sensitive to future costs and oil prices. Oil prices are notoriously difficult to forecast. Future North Slope oil prices, production, and costs that support their arguments. Given the inherent uncertainty about oil

  7. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15T23:59:59.000Z

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  8. Keys to Canola Production in South Texas

    E-Print Network [OSTI]

    Livingston, Stephen; Bremer, John E.; Parker, Roy D.; Miller, Travis

    1995-11-22T23:59:59.000Z

    Canola is a term patented by the Canadian government. It refers to rapeseed (Brassica napus), which has specific chemical properties that lend themselves to the production of a high-quality cooking oil and an edible meal used in livestock rations...

  9. Ethanol Production, Distribution, and Use: Discussions on Key Issues (Presentation)

    SciTech Connect (OSTI)

    Harrow, G.

    2008-05-14T23:59:59.000Z

    From production to the environment, presentation discusses issues surrounding ethanol as a transportation fuel.

  10. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  11. Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass

    E-Print Network [OSTI]

    California at Riverside, University of

    Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass cellulosic ethanol com- petitive. Improvements in dilute acid pretreatment and cellulase produced by Trichoderma reesei discov- ered during World War II led to most of the historic cellulosic ethanol cost

  12. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols -- FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2008-12-05T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities.

  13. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01T23:59:59.000Z

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  14. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    /Transportation a. Shielded containers will have these characteristics: i. overall external dimensions approximating those of a 55 gallon drum ( 24" dia x 35" height) ii. internal dimensions sufficient to install a 30 shielded containers plus all surrounding dunnage, slip sheets, pallets, spacers, etc. will weigh no more

  15. Behavioral Assumptions Underlying California Residential Sector...

    Broader source: Energy.gov (indexed) [DOE]

    Behavioral Assumptions Underlying California Residential Sector Energy Efficiency Programs (2009 CIEE Report) Behavioral Assumptions Underlying California Residential Sector Energy...

  16. Idaho National Engineering Laboratory installation roadmap assumptions document. Revision 1

    SciTech Connect (OSTI)

    Not Available

    1993-05-01T23:59:59.000Z

    This document is a composite of roadmap assumptions developed for the Idaho National Engineering Laboratory (INEL) by the US Department of Energy Idaho Field Office and subcontractor personnel as a key element in the implementation of the Roadmap Methodology for the INEL Site. The development and identification of these assumptions in an important factor in planning basis development and establishes the planning baseline for all subsequent roadmap analysis at the INEL.

  17. The Production Tax Credit is Key to a Strong U.S. Wind Industry

    Office of Energy Efficiency and Renewable Energy (EERE)

    New report finds the production tax credit has been critical to the growth of the U.S. wind industry.

  18. Potential Benefits from Improved Energy Efficiency of KeyElectrical Products: The Case of India

    SciTech Connect (OSTI)

    McNeil, Michael; Iyer, Maithili; Meyers, Stephen; Letschert,Virginie; McMahon, James E.

    2005-12-20T23:59:59.000Z

    The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These products--refrigerators, room air conditioners, electric motors, and distribution transformers--are important targets for efficiency improvement in India and in other developing countries. India is an interesting subject of study because of it's size and rapid economic growth. Implementation of efficient technologies in India would save billions in energy costs, and avoid hundreds of megatons of greenhouse gas emissions. India also serves as an example of the kinds of improvement opportunities that could be pursued in other developing countries.

  19. Keys To Profitable Small Grain Production In East Texas and Coast Prairie.

    E-Print Network [OSTI]

    Hodges , R.J. Jr.; Gilmore, Earl C.; McDaniel, M.E.

    1979-01-01T23:59:59.000Z

    is restricted to deep sands of East Texas where it is used as a cover crop and for grazing. Some triticale varieties with intermediate growth habit are promising for forage production. Grain pro duction of triticale has not been ,equal to that of other s... patterns in separate fields. Separately managed fields of early and late for age varieties usually provide more forage than a mix ture of the two. Growth of all small grains essentially 5 1 1111111 11I1'lll f1111111111 11111 11111 1111111111 11111...

  20. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

    E-Print Network [OSTI]

    Keinan, Alon

    Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Ran Canetti-up or public keys. Tel Aviv University, Email: Canetti@tau.ac.il Cornell University, E-Mail: huijia

  1. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Broader source: Energy.gov (indexed) [DOE]

    Definitions and Assumptions, October 2012 Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012 footprintsassumptionsdefinitions2012.pdf More...

  2. Empirically Revisiting the Test Independence Assumption

    E-Print Network [OSTI]

    Ernst, Michael

    Empirically Revisiting the Test Independence Assumption Sai Zhang, Darioush Jalali, Jochen Wuttke}@cs.washington.edu ABSTRACT In a test suite, all the test cases should be independent: no test should affect any other test's result, and running the tests in any order should produce the same test results. Techniques such as test

  3. Supply-side Resources & Planning Assumptions

    E-Print Network [OSTI]

    - station Solar PV (from 6th Plan) 25 MW dc/20 MW net ac output using flat plate non concentrating single) ­ Storage Resource assessment data needs and applications R d f t Resources proposed for assessment Forecasts ProCost 46/19/2013 #12;6/19/2013 3 Resource data & planning assumptions Reference plant (New

  4. EVA PLANNING ASSUMPTIONS LRV TRAVERSE ASSESSMENT

    E-Print Network [OSTI]

    Rathbun, Julie A.

    VALUE. #12;ASSUMPTIONS {CONT) e METABOLIC RATES · LM OVERHEAD 1050 BTU/HR · ALSEP 1050 BTU/HR · STATION 950 BTU/HR · RIDING 550 BTU/HR #12;ACTIVITY 'METABOLIC .COMPARISON 15 ACTUAL VERSUS 16 PLANNING AVERAGE METABOLIC RATE (BTU I HR) ACTIVITY 15 ACTUAL 16 PLANNING CDR LMP LM OVERHEAD 1246 1060 '1050

  5. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01T23:59:59.000Z

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  6. Experimental assessment of unvalidated assumptions in classical plasticity theory.

    SciTech Connect (OSTI)

    Brannon, Rebecca Moss (University of Utah, Salt Lake City, UT); Burghardt, Jeffrey A. (University of Utah, Salt Lake City, UT); Bauer, Stephen J.; Bronowski, David R.

    2009-01-01T23:59:59.000Z

    This report investigates the validity of several key assumptions in classical plasticity theory regarding material response to changes in the loading direction. Three metals, two rock types, and one ceramic were subjected to non-standard loading directions, and the resulting strain response increments were displayed in Gudehus diagrams to illustrate the approximation error of classical plasticity theories. A rigorous mathematical framework for fitting classical theories to the data, thus quantifying the error, is provided. Further data analysis techniques are presented that allow testing for the effect of changes in loading direction without having to use a new sample and for inferring the yield normal and flow directions without having to measure the yield surface. Though the data are inconclusive, there is indication that classical, incrementally linear, plasticity theory may be inadequate over a certain range of loading directions. This range of loading directions also coincides with loading directions that are known to produce a physically inadmissible instability for any nonassociative plasticity model.

  7. SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II

    SciTech Connect (OSTI)

    Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

    2011-10-31T23:59:59.000Z

    Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

  8. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    ................................................................ 10 Wholesale Electricity Prices further. Wholesale electricity prices are expected to increase from about $30 per megawatt-hour in 2010

  9. Assumptions to the Annual Energy Outlook 2013

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    explain the growth in GDP: the growth rate of nonfarm employment and the rate of productivity change associated with employment. As Table 2.1 indicates, in the Reference case,...

  10. Production and screening of carbon products precursors from coal. Quarterly technical progress report and key personnel staffing report No. 6, April 1, 1996--June 30, 1996

    SciTech Connect (OSTI)

    NONE

    1996-07-01T23:59:59.000Z

    The main goal of this program is to demonstrate the utility of coal extracts from the West Virginia University (WVU) extraction process as suitable base raw materials for the carbon products encompassed by the Carbon Products Consortium (CPC) team. This quarterly report covers activities during the period from April 1, 1996 through June 30, 1996. The first year of the project ended in February, 1996; however, the WVU research effort has continued on a no-cost extension of the original contract. Samples have been supplied to CPC participants so they could conduct their portions of the project as contracted through ORNL. Progress reports are presented for the following tasks: project planning and administration; consortium administration and reporting; coal extraction; technical/economic evaluation of WVU extraction process; and technology transfer. Previous work has shown that the WVU coal extraction process coupled with hydrotreatment, does have the potential for producing suitable base raw materials for carbon products. Current effort, therefore, involved the screening and evaluation of extracts produced by the WVU Group and recommending appropriate materials for scaleup for subsequent evaluation by Consortium Team members. As part of this program, the activation of the coal extraction residues was investigated for the purpose of producing a useful active carbon. A further task, which was started towards the end of the program, was to fabricate a small graphite artifact using Coke derived from coal extract as the filler and the coal extract itself as a binder. The results of these studies are summarized in this report.

  11. Production and screening of carbon products precursors from coal. Quarterly technical progress report and key personnel staffing report No. 3, July 1, 1995--Sepember 30, 1995

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    Tasks 1 and 2 involve preparation of a Project Management Plan and establishment of a Participants Agreement/Proprietary Information Agreement for members of the Carbon Products Consortium (CPC). These tasks are now complete. Task 3 is to provide a series of samples of solvent extracted coal to the CPC participants and to incorporate their feedback and suggestions into subsequent samples. As of September 30, 1995, UCAR has received two rounds of samples; Koppers has received one round of samples; ALCOA and AMOCO have not yet specified the types of samples they wish to receive; FMI has received one round of samples and has requested a rather large, five kilogram, sample of coal extracts to do multiple impregnation on a large carbon fiber preform. There are extensive communications between the WVU research team and the five industrial partners. Task 4, cooperation with MITRE on their preparation of an economic analysis of the solvent extraction, is complete. Task 5, Technology Transfer, is an on going endeavor with research team meetings, general CPC meetings, presentations of conference papers, and submission of required reports. The CPC is finally functioning as it has been envisioned, i.e., with the WVU solvent extracted coal materials being evaluated by several companies as precursor for their individual product lines. The companies are comparing the WVU materials with commercially available pitches and cokes.

  12. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  13. Production and screening of carbon products precursors from coal: Carbon products consortium. Quarterly technical progress report and key personnel staffing report, No. 1, February 15, 1995--March 30, 1995

    SciTech Connect (OSTI)

    NONE

    1995-06-01T23:59:59.000Z

    The Carbon Products Consortium (CPC) is a university, industry, national laboratory cooperative research, development and commercialization partnership focused on the use of coal-derived precursors for a wide range of carbon products. The CPC program has evolved over five years through the combined efforts of academic, congressional, industrial, and government agency participation and support. The PETC funded WVU portion of the CPC involves both administration and research. During the preceding quarter, the Project Management Plan specified in Task 1 of the Workplan has been initiated and a draft will be submitted to the DOE COR. A CPC Participants Agreement has been approved and signed by the university and industrial participants. The WVU carbon products group has added three additional technicians to help initiate the project. Several new reactor systems have been obtained for the solvent extraction lab. Due to WVU`s experience and background in solvent extraction of coal, the WVU portion of the project will be in operation very soon. Several small samples (one ounce or less) of coal extracts will be provided to UCAR for initial screening.

  14. U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff

    Broader source: Energy.gov [DOE]

    U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

  15. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  16. Effects of internal gain assumptions in building energy calculations

    SciTech Connect (OSTI)

    Christensen, C.; Perkins, R.

    1981-01-01T23:59:59.000Z

    The utilization of direct solar gains in buildings can be affected by operating profiles, such as schedules for internal gains, thermostat controls, and ventilation rates. Building energy analysis methods use various assumptions about these profiles. The effects of typical internal gain assumptions in energy calculations are described. Heating and cooling loads from simulations using the DOE 2.1 computer code are compared for various internal-gain inputs: typical hourly profiles, constant average profiles, and zero gain profiles. Prototype single-family-detached and multi-family-attached residential units are studied with various levels of insulation and infiltration. Small detached commercial buildings and attached zones in large commercial buildings are studied with various levels of internal gains. The results of this study indicate that calculations of annual heating and cooling loads are sensitive to internal gains, but in most cases are relatively insensitive to hourly variations in internal gains.

  17. The production and utilization of a clean, abundant, and renewable energy source is widely accepted as one of the key challenges facing mankind today. Population

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    The production and utilization of a clean, abundant, and renewable energy source is widely accepted-splitter and may one day be used as a source of clean energy.The components include (a) Membrane assembly of underdeveloped nations will increase our current demand for energy. Although fossil fuels may power the planet

  18. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  19. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  20. Assessment of Gasification-Based Biorefining at Kraft Pulp and Paper Mills in the United States, Part A: Background and Assumptions

    SciTech Connect (OSTI)

    Larson, E. D.; Consonni, S.; Katofsky, R. E.; Iisa, K.; Frederick, W. J., Jr.

    2008-11-01T23:59:59.000Z

    Commercialization of black liquor and biomass gasification technologies is anticipated in the 2010-2015 time frame, and synthesis gas from gasifiers can be converted into liquid fuels using catalytic synthesis technologies that are already commercially established in the gas-to-liquids or coal-to-liquids industries. This set of two papers describes key results from a major assessment of the prospective energy, environmental, and financial performance of commercial gasification-based biorefineries integrated with kraft pulp and paper mills [1]. Seven detailed biorefinery designs were developed for a reference mill in the southeastern United States, together with the associated mass/energy balances, air emissions estimates, and capital investment requirements. The biorefineries provide chemical recovery services and co-produce process steam for the mill, some electricity, and one of three liquid fuels: a Fischer-Tropsch synthetic crude oil (which could be refined to vehicle fuels at an existing petroleum refinery), dimethyl ether (a diesel engine fuel or propane substitute), or an ethanol-rich mixed-alcohol product. This paper describes the key assumptions that underlie the biorefinery designs. Part B will present analytical results.

  1. The contour method cutting assumption: error minimization and correction

    SciTech Connect (OSTI)

    Prime, Michael B [Los Alamos National Laboratory; Kastengren, Alan L [ANL

    2010-01-01T23:59:59.000Z

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  2. Assumptions and ambiguities in nonplanar acoustic soliton theory

    SciTech Connect (OSTI)

    Verheest, Frank [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium) [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281, B–9000 Gent (Belgium); School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa); Hellberg, Manfred A. [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)] [School of Chemistry and Physics, University of KwaZulu-Natal, Durban 4000 (South Africa)

    2014-02-15T23:59:59.000Z

    There have been many recent theoretical investigations of the nonlinear evolution of electrostatic modes with cylindrical or spherical symmetry. Through a reductive perturbation analysis based on a quasiplanar stretching, a modified form of the Korteweg-de Vries or related equation is derived, containing an additional term which is linear in the electrostatic potential and singular at time t?=?0. Unfortunately, these analyses contain several restrictive assumptions and ambiguities which are normally neither properly explained nor discussed, and severely limit the applicability of the technique. Most glaring are the use of plane-wave stretchings, the assumption that shape-preserving cylindrical modes can exist and that, although time is homogeneous, the origin of time (which can be chosen arbitrarily) needs to be avoided. Hence, only in the domain where the nonlinear modes are quasiplanar, far from the axis of cylindrical or from the origin of spherical symmetry can acceptable but unexciting results be obtained. Nonplanar nonlinear modes are clearly an interesting topic of research, as some of these phenomena have been observed in experiments. However, it is argued that a proper study of such modes needs numerical simulations rather than ill-suited analytical approximations.

  3. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01T23:59:59.000Z

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  4. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  5. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  6. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  7. Keys to Profitable Blackberry Production in Texas.

    E-Print Network [OSTI]

    Lipe, John A.

    1986-01-01T23:59:59.000Z

    of nitrogen to apply if using ammoni um sulfate (21-0-0) fertilizer works out to 200 pounds per acre (4.6 pounds per 100 feet of row) in February and 100 pounds per acre (2.3 pounds per 100 feet of row) in June . Apply about one-half this amount...

  8. Range Condition: Key to Sustained Ranch Productivity

    E-Print Network [OSTI]

    McGinty, Allan; White, Larry D.

    2000-04-25T23:59:59.000Z

    species composition is the criteria used to make this determination. Range condition is evaluated for each range site on a ranch. Range sites are areas with the potential for producing similar amounts and kinds of vegetation (for example, shallow hillside... site, deep upland site, draw site, etc.). Sites are determined by climatic, soil, topographic and vegetation features. A complete listing and description of all range sites on a ranch can be obtained from the Soil Conservation Service (SCS). Range...

  9. Assumptions to Annual Energy Outlook - Energy Information Administration

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecember 2005 (Thousand Barrels per Day)A4. Residential sector keyAnalysis &

  10. Assumptions and Strategies for Conducting Research with Learning Disabled Adolescents and Young Adults

    E-Print Network [OSTI]

    Meyen, Edward L.; Schiefelbusch, Richard L.; Deshler, Donald D.; Alley, Gordon R.; Moran, Mary Ross; Clark, Frances L.

    1980-01-01T23:59:59.000Z

    This paper details the assumptions about learning disabled adolescents and young adults as well as assumptions about conducting research with this population held by researchers at the Kansas Institute. Strategies developed ...

  11. On the self-similarity assumption in dynamic models for large eddy simulations

    E-Print Network [OSTI]

    Van Den Eijnden, Eric

    that the present formulation of the DP is usually incompatible with its under- lying self-similarity assumption SSAOn the self-similarity assumption in dynamic models for large eddy simulations Daniele Carati eddy simulations and their underlying self-similarity assumption is discussed. The interpretation

  12. Production

    Broader source: Energy.gov [DOE]

    Algae production R&D focuses on exploring resource use and availability, algal biomass development and improvements, characterizing algal biomass components, and the ecology and engineering of...

  13. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  14. Production

    Broader source: Energy.gov [DOE]

    Algae production R&D focuses on exploring resource use and availability, algal biomass development and improvements, characterizing algal biomass components, and the ecology and engineering of cultivation systems.

  15. ARM - Key Science Questions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

  16. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

  17. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  18. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  19. OIKOS 101: 499504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS

    E-Print Network [OSTI]

    Silvertown, Jonathan

    OIKOS 101: 499­504, 2003 Do seedlings in gaps interact? A field test of assumptions in ESS seed seedlings in gaps interact? A field test of assumptions in ESS seed size models. ­ Oikos 101: 499­504. ESS for the occupancy of `safe sites' or vegetation gaps. If mortality rates are high and/or frequency-independent, ESS

  20. Granular Matter 4(3) (2002) How good is the equipartition assumption for the transport

    E-Print Network [OSTI]

    Luding, Stefan

    Granular Matter 4(3) (2002) How good is the equipartition assumption for the transport properties of a granular mixture? Meheboob Alam (1) , Stefan Luding (1;2) ? Abstract Kinetic-theory, with the assumption of equipar- tition of granular energy, suggests that the pressure and viscosity of a granular mixture vary

  1. Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss

    E-Print Network [OSTI]

    Endriss, Ulle

    Lifting Rationality Assumptions in Binary Aggregation Umberto Grandi and Ulle Endriss Institute aggregation procedure will lift the rationality assumptions from the in- dividual to the collective level, i an axiomatic characterisation of the class of aggregation proce- dures that will lift all rationality

  2. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Kerosene Petroleum Other Products Refinery Gas Diesel OilGasoline Liquid Petroleum Gas Refinery Production by ProductPetroleum Other Products Refinery Gas Diesel Oil Gasoline

  3. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Washing Coking Petroleum Refineries Gas Works Gas Works -Gas Petroleum Other Products Refinery Production by ProductGas Petroleum Other Products Refinery Gas Consumption Total

  4. Moldy Assumptions

    E-Print Network [OSTI]

    Heully, Gustave Paul

    2012-01-01T23:59:59.000Z

    sustainability movements. 2 Despite these noble intentions, using human responsibility as a base for architecture

  5. Behavioral Assumptions Underlying California Residential Sector Energy Efficiency Programs (2009 CIEE Report)

    Broader source: Energy.gov [DOE]

    This paper examines the behavioral assumptions that underlie California’s residential sector energy efficiency programs and recommends improvements that will help to advance the state’s ambitious greenhouse gas reduction goals.

  6. Length measurement of a moving rod by a single observer without assumptions concerning its magnitude

    E-Print Network [OSTI]

    Bernhard Rothenstein; Ioan Damian

    2005-07-03T23:59:59.000Z

    We extend the results presented by Weinstein concerning the measurement of the length of a moving rod by a single observer, without making assumptions concerning the distance between the moving rod and the observer who measures its length.

  7. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Others Total Total Crude Oil Production by Region (1985-North West Chinese Crude Oil Production by Regional SharesEnergy Production (Mtce) AAGR Coal Raw Crude Oil Primary

  8. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Growth of China's Total Primary Energy Production (TPE) byFuel (Mtce) Primary Energy Production (Mtce) AAGR Coal Rawof China's Total Primary Energy Production (Mtce) AAGR Total

  9. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    of China's Total Primary Energy Production by Source (1950-AAGR EJ Primary Energy Production (Mtce) Coal Oil NaturalRenewables Total Primary Energy Production by Source Shares*

  10. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Diesel Oil Fuel Oil Total Primary Energy Supply Indigenous Production Indigenous Production - Hydro PowerDiesel Oil Fuel Oil Mt Mt Mt Mt Mt Total Primary Energy Supply Indigenous Production Indigenous Production - Hydro Power

  11. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Diesel Oil Fuel Oil Total Primary Energy Supply Indigenous Production Indigenous Production - Hydro PowerDiesel Oil Fuel Oil Total Primary Energy Supply Indigenous Production Indigenous Production - Hydro Power

  12. NREL: News - NREL Scientists Find Key Function for Ferredoxins...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

  13. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  14. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  15. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  16. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    South Korea Other Crude Oil Production by Region (1985-2010)West Chinese Crude Oil Production by Regional Shares EastHenan Other Total Crude Oil Production: 209 Mt China's Crude

  17. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    South Korea Other Crude Oil Production by Region (1985-2010)North West Chinese Crude Oil Production by Regional SharesHenan Other Total Crude Oil Production: 209 Mt China's Crude

  18. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Total Primary Energy Production per GDP (MER*) (2009) *Total Primary Energy Production per GDP (PPP**) **PurchasingNorth West China's Energy Consumption per Unit of GDP Energy

  19. The LOFAR Transients Key Project

    E-Print Network [OSTI]

    Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

    2006-11-09T23:59:59.000Z

    LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

  20. Biennial Assessment of the Fifth Power Plan Interim Report on Fuel Price Assumptions

    E-Print Network [OSTI]

    . In addition, the delivered price of coal to power plants located in the region will be affected by diesel fuelBiennial Assessment of the Fifth Power Plan Interim Report on Fuel Price Assumptions Summary The Fifth Power Plan includes price forecasts for natural gas, oil, and coal. Natural gas prices have by far

  1. Draft -F. Nicoud 1 About the zero Mach number assumption in

    E-Print Network [OSTI]

    Nicoud, Franck

    Draft - F. Nicoud 1 About the zero Mach number assumption in the calculation of thermoacoustic as the the flame forcing ('Rayleigh') term. Besides, the net effect of the non zero Mach number terms the frequency of oscillation and growth rate are modified when the Mach number is not zero. It is demonstrated

  2. An Assumption for the Development of Bootstrap Variants of the Akaike Information Criterion in Mixed Models

    E-Print Network [OSTI]

    Shang, Junfeng

    in Mixed Models Junfeng Shang 1, and Joseph E. Cavanaugh 2, 1 Bowling Green State University, USA 2 of Mathematics and Statistics, 450 Math Science Building, Bowling Green State University, Bowling Green, OH 43403 The University of Iowa, USA Abstract: This note provides a proof of a fundamental assumption in the verification

  3. Biennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions

    E-Print Network [OSTI]

    from the heat recovery steam generator powers an additional steam turbine, providing extra electricBiennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions October 17, 2006 Simple- and combined-cycle gas turbine power plants fuelled by natural gas are among the bulk

  4. Cognitive Assessment Models with Few Assumptions, and Connections with Nonparametric IRT

    E-Print Network [OSTI]

    Junker, Brian

    Cognitive Assessment Models with Few Assumptions, and Connections with Nonparametric IRT Brian of the monotonicity conditions discussed in Section 4. #12;Abstract In recent years, as cognitive theories of learning" on student achievement relative to theory-driven lists of examinee skills, beliefs and other cognitive

  5. Cognitive Assessment Models with Few Assumptions, and Connections with Nonparametric IRT

    E-Print Network [OSTI]

    Junker, Brian

    Cognitive Assessment Models with Few Assumptions, and Connections with Nonparametric IRT Brian of the monotonicity conditions discussed in Section 4. #12; Abstract In recent years, as cognitive theories and other cognitive features needed to perform tasks in a particular assess­ ment domain. Cognitive

  6. Impact of assumption of log-normal distribution on monthly rainfall estimation from TMI

    E-Print Network [OSTI]

    Lee, Dong Heon

    2001-01-01T23:59:59.000Z

    -evaluate the assumption for estimates from TMI, which, unlike the SSM/I, has a 10 GHz channel. The minimum chi-square estimation technique was used for the log-normal method. To check the credibility of the estimation routines, log-normally distributed synthetic data were...

  7. Models of transcription factor binding: Sensitivity of activation functions to model assumptions

    E-Print Network [OSTI]

    Kent, University of

    on statistical physics, a Markov-chain model and a computational simulation. Comparison of these models suggests for cooperativity. The simulation model suggests that direct interactions between TFs are unlikely to be the main in this contribution, the assumption of the cell being a well stirred reactor makes a qualitative difference

  8. On the Limitations of Universally Composable Two Party Computation Without Setup Assumptions #

    E-Print Network [OSTI]

    Lindell, Yehuda

    for essentially any cryptographic task in the plain model (i.e., with no setup assumptions beyond regarding the existence of universally composable protocols in the plain model without honest majority of universally composable two­party function evaluation in the plain model. Our results show that in this setting

  9. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N. [Chicago Bridge and Iron Technical Services Co., Plainfield, IL (United States)

    1996-08-01T23:59:59.000Z

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  10. Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input

    E-Print Network [OSTI]

    Quadeer, Ahmed Abdul

    Blind Channel Estimation in OFDM Systems by Relying on the Gaussian Assumption of the Input T. Y methods rely on some form of training which reduces the useful data rate. Here instead we blindly estimate maxima of the ML objective function. One is the blind Genetic algorithm and the other is the semi-blind

  11. Key Workplace Documents Federal Publications

    E-Print Network [OSTI]

    to protect IPR and afford market access for IPR- related products, discriminatory regulations on imported

  12. User cost in oil production

    E-Print Network [OSTI]

    Adelman, Morris Albert

    1990-01-01T23:59:59.000Z

    The assumption of an initial fixed mineral stock is superfluous and wrong. User cost (resource rent) in mineral production is the present value of expected increases in development cost. It can be measured as the difference ...

  13. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    AAGR EJ Total Primary Energy (Mtce) Coal Production (1985-AAGR EJ Primary Energy Production (Mtce) Coal Oil Naturalby Fuel Shares Coal Oil Natural Gas Energy-Related CO 2

  14. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Total Primary Energy Production per GDP (2008) tce/thousandTotal Primary Energy Production per GDP (PPP*) tce/thousand2008) Energy-Related CO 2 Emissions per GDP (2008) kg CO 2 /

  15. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

  16. Key Activities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

  17. Key Activities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

  18. A REVIEW OF ASSUMPTIONS AND ANALYSIS IN EPRI EA-3409, "HOUSEHOLD APPLIANCE CHOICE: REVISION OF REEPS BEHAVIORAL MODELS"

    E-Print Network [OSTI]

    Wood, D.J.

    2010-01-01T23:59:59.000Z

    of Assumptions and Analysis in EPRI EA-3409, "Householdby the Electric Power Research Institute, Inc. ("EPRI").Neither EPRI, members of EPRI, nor Lawrence Berkeley

  19. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Jawitz, James W.

    Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

  20. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Consumption Total Primary Energy Consumption by Source AAGRFuel Wind Total Primary Energy Consumption by Source SharesPrimary Energy Production per Capita (2009) tce/capita Electricity Consumption

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  3. Design of product development systems

    E-Print Network [OSTI]

    Aguirre Granados, Adrian

    2008-01-01T23:59:59.000Z

    The development of successful new products in less time and using fewer resources is key to the financial success of most consumer product companies. In this thesis we have studied the development of new products and how ...

  4. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    AAGR Total Primary Energy (Mtce) Coal Production (1985-2009)Physical Unit to Coal Equivalent For this energy form 1Total Primary Energy Supply Coke Coal Gas not Coke Other

  5. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01T23:59:59.000Z

    Gas Consumption Total Primary Energy Consumption by Source (Nuclear Fuel Total Primary Energy Consumption by Fuel SharesPrimary Energy Production per Capita (2008) tce per capita Electricity Consumption

  6. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

  7. Key Activities | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

  8. Public/private key certification authority and key distribution. Draft

    SciTech Connect (OSTI)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25T23:59:59.000Z

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  9. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  10. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  11. Single, Key Gene Discovery Could Streamline Production of Biofuels |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe House Committee on Energy andDepartment of EnergyAprilAShale

  12. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01T23:59:59.000Z

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  13. CRITICAL ASSUMPTIONS IN THE F-TANK FARM CLOSURE OPERATIONAL DOCUMENTATION REGARDING WASTE TANK INTERNAL CONFIGURATIONS

    SciTech Connect (OSTI)

    Hommel, S.; Fountain, D.

    2012-03-28T23:59:59.000Z

    The intent of this document is to provide clarification of critical assumptions regarding the internal configurations of liquid waste tanks at operational closure, with respect to F-Tank Farm (FTF) closure documentation. For the purposes of this document, FTF closure documentation includes: (1) Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the FTF PA) (SRS-REG-2007-00002), (2) Basis for Section 3116 Determination for Closure of F-Tank Farm at the Savannah River Site (DOE/SRS-WD-2012-001), (3) Tier 1 Closure Plan for the F-Area Waste Tank Systems at the Savannah River Site (SRR-CWDA-2010-00147), (4) F-Tank Farm Tanks 18 and 19 DOE Manual 435.1-1 Tier 2 Closure Plan Savannah River Site (SRR-CWDA-2011-00015), (5) Industrial Wastewater Closure Module for the Liquid Waste Tanks 18 and 19 (SRRCWDA-2010-00003), and (6) Tank 18/Tank 19 Special Analysis for the Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the Tank 18/Tank 19 Special Analysis) (SRR-CWDA-2010-00124). Note that the first three FTF closure documents listed apply to the entire FTF, whereas the last three FTF closure documents listed are specific to Tanks 18 and 19. These two waste tanks are expected to be the first two tanks to be grouted and operationally closed under the current suite of FTF closure documents and many of the assumptions and approaches that apply to these two tanks are also applicable to the other FTF waste tanks and operational closure processes.

  14. Hydrogen Production - Current Technology | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Current Technology Hydrogen Production - Current Technology The development of clean, sustainable, and cost-competitive hydrogen production processes is key to a viable future...

  15. The Role Of Modeling Assumptions And Policy Instruments in Evaluating The Global Implications Of U.S. Biofuel Policies

    SciTech Connect (OSTI)

    Oladosu, Gbadebo A [ORNL; Kline, Keith L [ORNL

    2010-01-01T23:59:59.000Z

    The primary objective of current U.S. biofuel law the Energy Independence and Security Act of 2007 (EISA) is to reduce dependence on imported oil, but the law also requires biofuels to meet carbon emission reduction thresholds relative to petroleum fuels. EISA created a renewable fuel standard with annual targets for U.S. biofuel use that climb gradually from 9 billion gallons per year in 2008 to 36 billion gallons (or about 136 billion liters) of biofuels per year by 2022. The most controversial aspects of the biofuel policy have centered on the global social and environmental implications of its potential land use effects. In particular, there is an ongoing debate about whether indirect land use change (ILUC) make biofuels a net source, rather sink, of carbon emissions. However, estimates of ILUC induced by biofuel production and use can only be inferred through modeling. This paper evaluates how model structure, underlying assumptions, and the representation of policy instruments influence the results of U.S. biofuel policy simulations. The analysis shows that differences in these factors can lead to divergent model estimates of land use and economic effects. Estimates of the net conversion of forests and grasslands induced by U.S. biofuel policy range from 0.09 ha/1000 gallons described in this paper to 0.73 ha/1000 gallons from early studies in the ILUC change debate. We note that several important factors governing LUC change remain to be examined. Challenges that must be addressed to improve global land use change modeling are highlighted.

  16. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  17. Production design for plate products in the steel industry

    E-Print Network [OSTI]

    Sanjeeb Dash

    2007-04-05T23:59:59.000Z

    Apr 5, 2007 ... The use of these tools provides two types of benefits: improvements in the productivity of the plant and an approach to making the key business ...

  18. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28T23:59:59.000Z

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  19. A METHOD TO EXTRACT THE REDSHIFT DISTORTION {beta} PARAMETER IN CONFIGURATION SPACE FROM MINIMAL COSMOLOGICAL ASSUMPTIONS

    SciTech Connect (OSTI)

    Tocchini-Valentini, Domenico; Barnard, Michael; Bennett, Charles L.; Szalay, Alexander S., E-mail: dtv@pha.jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218-2686 (United States)

    2012-10-01T23:59:59.000Z

    We present a method to extract the redshift-space distortion {beta} parameter in configuration space with a minimal set of cosmological assumptions. We show that a novel combination of the observed monopole and quadrupole correlation functions can remove efficiently the impact of mild nonlinearities and redshift errors. The method offers a series of convenient properties: it does not depend on the theoretical linear correlation function, the mean galaxy density is irrelevant, only convolutions are used, and there is no explicit dependence on linear bias. Analyses based on dark matter N-body simulations and Fisher matrix demonstrate that errors of a few percent on {beta} are possible with a full-sky, 1 (h {sup -1} Gpc){sup 3} survey centered at a redshift of unity and with negligible shot noise. We also find a baryonic feature in the normalized quadrupole in configuration space that should complicate the extraction of the growth parameter from the linear theory asymptote, but that does not have a major impact on our method.

  20. RESIK Solar X-ray flare element abundances on a non-isothermal assumption

    E-Print Network [OSTI]

    Sylwester, B; Sylwester, J; Kepa, A

    2015-01-01T23:59:59.000Z

    Solar X-ray spectra from the RESIK crystal spectrometer on the {\\em CORONAS-F} spacecraft (spectral range $3.3-6.1$~\\AA) are analyzed for thirty-three flares using a method to derive abundances of Si, S, Ar, and K, emission lines of which feature prominently in the spectra. For each spectrum, the method first optimizes element abundances then derives the differential emission measure as a function of temperature based on a procedure given by Sylwester et al. and Withbroe. This contrasts with our previous analyses of RESIK spectra in which an isothermal assumption was used. The revised abundances (on a logarithmic scale with $A({\\rm H}) = 12$) averaged for all the flares in the analysis are $A({\\rm Si}) = 7.53 \\pm 0.08$ (previously $7.89 \\pm 0.13$), $A({\\rm S}) = 6.91 \\pm 0.07$ ($7.16 \\pm 0.17$), $A({\\rm Ar}) = 6.47 \\pm 0.08$ ($6.45 \\pm 0.07$), and $A({\\rm K}) = 5.73 \\pm 0.19$ ($5.86 \\pm 0.20$), with little evidence for time variations of abundances within the evolution of each flare. Our previous estimates of...

  1. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  2. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01T23:59:59.000Z

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  3. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  4. The Productivity Dilemma in Manufacturing

    E-Print Network [OSTI]

    Byrer, T. G.

    1983-01-01T23:59:59.000Z

    industry's needs, improve productivity, and reduce costs is known, but the technology transfer needed to impact our industrial productivity has not taken place. A key factor in accomplishing technology transfer and implementation is the availability...

  5. Economy key to 1992 U. S. oil, gas demand

    SciTech Connect (OSTI)

    Beck, R.J.

    1992-01-27T23:59:59.000Z

    This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

  6. Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE

    E-Print Network [OSTI]

    Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

  7. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  8. Residential Appliance Data, Assumptions and Methodology for End-Use Forecasting with EPRI-REEPS 2.1

    E-Print Network [OSTI]

    LBL-34046 UC-350 Residential Appliance Data, Assumptions and Methodology for End-Use Forecasting-use forecasting of appliance energy use in the U.S. residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which

  9. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Florida, University of

    -292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  12. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  13. STIGMERGY: A DESIGN PATTERN FOR PRODUCT-DRIVEN SYSTEMS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    STIGMERGY: A DESIGN PATTERN FOR PRODUCT-DRIVEN SYSTEMS Rémi Pannequin, André Thomas Research Centre be used to develop product-driven systems. Agent-oriented components which implement it are presented) is based on the assumption that the product is the core object is this system. Indeed, the product

  14. Hydrogen Production Roadmap: Technology Pathways to the Future, January 2009

    Fuel Cell Technologies Publication and Product Library (EERE)

    Roadmap to identify key challenges and priority R&D needs associated with various hydrogen fuel production technologies.

  15. Int. J. Spray and Comb. Dynamics -Accepted for publication 1 About the zero Mach number assumption in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    as much as the the flame forcing ('Rayleigh') term. Besides, the net effect of the non zero Mach numberInt. J. Spray and Comb. Dynamics - Accepted for publication 1 About the zero Mach number assumption in the calculation of thermoacoustic instabilities By F. N I C O U D1 AND K. W I E C Z O R E K1,2 1 University

  16. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  17. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  18. Research Summary Key Ingredients of Collaborative Management

    E-Print Network [OSTI]

    , wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

  19. Analyzing Natural Gas Based Hydrogen Infrastructure - Optimizing Transitions from Distributed to Centralized H2 Production

    E-Print Network [OSTI]

    Yang, Christopher; Ogden, Joan M

    2005-01-01T23:59:59.000Z

    focus is on modeling of hydrogen production and distributionto centralized hydrogen production. One key question thatCalifornia, Davis Hydrogen Production via Natural Gas Steam

  20. MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1

    E-Print Network [OSTI]

    Nagurka, Mark L.

    of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

  1. Pressure Normalization of Production Rates Improves Forecasting Results

    E-Print Network [OSTI]

    Lacayo Ortiz, Juan Manuel

    2013-08-07T23:59:59.000Z

    . However, these new decline curve analysis (DCA) methods are still based only on production rate data, relying on the assumption of stable flowing pressure. Since this stabilized state is not reached rapidly in most cases, the applicability of these methods...

  2. Continuous Production of Biodiesel Via an Intensified Reactive/Extractive Process

    SciTech Connect (OSTI)

    Tsouris, Costas [ORNL] [ORNL; McFarlane, Joanna [ORNL] [ORNL; Birdwell Jr, Joseph F [ORNL] [ORNL; Jennings, Hal L [ORNL] [ORNL

    2008-01-01T23:59:59.000Z

    Biodiesel is considered as a means to diversify our supply of transportation fuel, addressing the goal of reducing our dependence on oil. For a number of reasons ranging from production issues to end use, biodiesel represents only a small fraction of the transportation fuel used worldwide. This work addresses the aspect of biodiesel production that limits it to a slow batch process. Conventional production methods are batch in nature, based on the assumption that the rates of the key chemical reactions are slow. The hypothesis motivating this work is that the reaction kinetics for the transesterification of the reagent triglyceride is sufficiently fast, particularly in an excess of catalyst, and that interfacial mass transfer and phase separation control the process. If this is the case, an intensified two-phase reactor adapted from solvent extraction equipment may be utilized to greatly increase biodiesel production rates by increasing interphase transport and phase separation. To prove this idea, we are investigating two aspects: (1) determining the rate-limiting step in biodiesel production by evaluating the reaction kinetics, and (2) enhancing biodiesel production rates by using an intensified reactor. A centrifugal contactor combining interphase mass transfer, chemical reaction, and phase separation is employed for process intensification.

  3. Toda Material/Component Production Facilities

    Broader source: Energy.gov (indexed) [DOE]

    for battery customers worldwide 7 Toda Background * World's leading manufacturer of Solid State Chemistry Particles with 186 year history * Broad product breadth of all key...

  4. Toda Material/Component Production Facilities

    Broader source: Energy.gov (indexed) [DOE]

    confidential and restricted circulation 6 * World's leading manufacturer of Solid State Chemistry Particles with 186 year history * Broad product breadth of all key cathode...

  5. Mediated Semi-Quantum Key Distribution

    E-Print Network [OSTI]

    Walter O. Krawec

    2014-11-21T23:59:59.000Z

    In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

  6. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  7. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  8. Transportation radiological risk assessment for the programmatic environmental impact statement: An overview of methodologies, assumptions, and input parameters

    SciTech Connect (OSTI)

    Monette, F.; Biwer, B.; LePoire, D.; Chen, S.Y.

    1994-02-01T23:59:59.000Z

    The U.S. Department of Energy is considering a broad range of alternatives for the future configuration of radioactive waste management at its network of facilities. Because the transportation of radioactive waste is an integral component of the management alternatives being considered, the estimated human health risks associated with both routine and accident transportation conditions must be assessed to allow a complete appraisal of the alternatives. This paper provides an overview of the technical approach being used to assess the radiological risks from the transportation of radioactive wastes. The approach presented employs the RADTRAN 4 computer code to estimate the collective population risk during routine and accident transportation conditions. Supplemental analyses are conducted using the RISKIND computer code to address areas of specific concern to individuals or population subgroups. RISKIND is used for estimating routine doses to maximally exposed individuals and for assessing the consequences of the most severe credible transportation accidents. The transportation risk assessment is designed to ensure -- through uniform and judicious selection of models, data, and assumptions -- that relative comparisons of risk among the various alternatives are meaningful. This is accomplished by uniformly applying common input parameters and assumptions to each waste type for all alternatives. The approach presented can be applied to all radioactive waste types and provides a consistent and comprehensive evaluation of transportation-related risk.

  9. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  10. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  11. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estčve; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  12. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

  13. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  14. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  15. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  16. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  17. Residential HVAC Data, Assumptions and Methodology for End-Use Forecasting with EPRI-REEPS 2.1

    E-Print Network [OSTI]

    Johnson, F.X.

    2010-01-01T23:59:59.000Z

    residential home heating equipment, depending on product class and size. Figure E.6b: Electric Heat Pump

  18. Experimental quantum key distribution with finite-key security analysis for noisy channels

    E-Print Network [OSTI]

    Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

    2014-06-17T23:59:59.000Z

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  19. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  20. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  1. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  2. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01T23:59:59.000Z

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  3. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  4. Vehicle Electrification is Key to Reducing Petroleum Dependency...

    Broader source: Energy.gov (indexed) [DOE]

    Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

  5. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  6. Sandia National Laboratories: Direct Measurement of Key Molecule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

  7. Host and Derivative Product Modeling and Synthesis

    E-Print Network [OSTI]

    Davis, Matthew Louis Turner

    2010-10-12T23:59:59.000Z

    , implementation, and refinement of design methodologies is the notion that both the structure of the development process and the structure of the developed product are key factors in creating value in a firm’s product line. With respect to the latter key factor...

  8. Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps

    E-Print Network [OSTI]

    Brownstone, Rob

    Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

  9. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  10. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

  11. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

  12. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

  13. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

  14. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

  15. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  16. NREL builds community and industry support by addressing concerns voiced by key standards organizations.

    E-Print Network [OSTI]

    NREL builds community and industry support by addressing concerns voiced by key standards standards developed through consensus processes. Because U.S. PV module safety stan- dards are not aligned with international standards, manufacturers must test their modules twice--and sometimes maintain separate product

  17. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  18. The Potential of Cellulosic Ethanol Production from Municipal Solid Waste: A Technical and Economic Evaluation

    E-Print Network [OSTI]

    Shi, Jian; Ebrik, Mirvat; Yang, Bin; Wyman, Charles E.

    2009-01-01T23:59:59.000Z

    key to unlocking low-cost cellulosic ethanol. 2(1):26-40.1995 19941216. Commercial ethanol production process.facility and commercial ethanol production process.

  19. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01T23:59:59.000Z

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  20. Measurements of Methane Emissions at Natural Gas Production Sites

    E-Print Network [OSTI]

    Lightsey, Glenn

    Measurements of Methane Emissions at Natural Gas Production Sites in the United States #12;Why = 21 #12;Need for Study · Estimates of methane emissions from natural gas production , from academic in assumptions in estimating emissions · Measured data for some sources of methane emissions during natural gas

  1. Shale Gas Production: Potential versus Actual GHG Emissions

    E-Print Network [OSTI]

    Shale Gas Production: Potential versus Actual GHG Emissions Francis O'Sullivan and Sergey Paltsev, and environmental effects. In turn, the greenhouse gas and atmospheric aerosol assumptions underlying climate://globalchange.mit.edu/ Printed on recycled paper #12;1 Shale Gas Production: Potential versus Actual GHG Emissions Francis O

  2. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  3. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  4. Updated distribution and reintroduction of the Lower Keys marsh rabbit

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17T23:59:59.000Z

    Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

  5. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  6. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  7. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  8. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  9. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    is with the Department of Electrical and Computer Engineering, University of Wisconsin, Madison, WI 53706 USA (e Abstract--One important assumption in a model of an electricity market is the format of bids and costs. Most literature on electricity markets uses piecewise linear or quadratic functions to represent costs

  10. K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request

    E-Print Network [OSTI]

    Rhoads, James

    K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

  11. Environmental labelling of green electricity with LCA key parameter models

    E-Print Network [OSTI]

    unknown authors

    Since the opening of European electricity markets, companies are launching green electricity products. In Switzerland the privately initiated eco-label “naturemade star ” ensures the environmental and ecological quality of electricity from renewable energy sources on a local scale and from a life cycle perspective. For the life cycle perspective, a simplified and partly site-specific life cycle assessment (LCA) is applied using the Eco-indicator 99 (Hierachist perspective) impact assessment method. In a first step, detailed LCAs case studies are made for power plants and technologies that are candidates for the „naturemade star “ label. They allow identifying technology-specific parameters that dominate the outcome of the LCA and for which data are available for the owner or operator of the power plant at issue. Based on this knowledge, key parameter models for photovoltaic, wind and hydroelectric power and electricity from biogas have been established on a spreadsheet-basis. With the help of the parameter models, operators of power plants can carry out the required LCA within a few hours. At the same time, they can check whether the plant fulfils the “naturemade star ” threshold or not, which has been set to 50 % of the environmental impact of a gas combined cycle power plant. Within a few months since the introduction of the labelling scheme, companies successfully applied the parameter models on nearly 50 photovoltaic and on several hydroelectric power plants. LCA is, in combination with other tools, a useful method for the definition of standards for environmental labelling of green electricity.

  12. Maximum Utility Product Pricing Models and Algorithms Based on Reservation Prices

    E-Print Network [OSTI]

    Tunçel, Levent

    Maximum Utility Product Pricing Models and Algorithms Based on Reservation Prices R. Shioda L. Tun for pricing a product line with several customer segments under the assumption that customers' product choices utility model and formulate it as a mixed-integer programming problem, design heuristics and valid cuts

  13. USING FIRM OPTIMIZATION TO EVALUATE AND ESTIMATE PRODUCTIVITY AND RETURNS TO SCALE

    E-Print Network [OSTI]

    Sadoulet, Elisabeth

    USING FIRM OPTIMIZATION TO EVALUATE AND ESTIMATE PRODUCTIVITY AND RETURNS TO SCALE Yuriy, not production function. Given this observation, the paper argues that, under weak assumptions, micro profits. The puzzle arises because popular estimators ignore heterogeneity and endogeneity in factor/product

  14. Plant and microbial research seeks biofuel production from lignocellulose

    E-Print Network [OSTI]

    Bartley, Laura E; Ronald, Pamela C

    2009-01-01T23:59:59.000Z

    sugar yields for biofuel production. Nat Biotechnol 25(7):Plant and microbial research seeks biofuel production fromA key strategy for biofuel produc- tion is making use of the

  15. Approaches for identifying consumer preferences for the design of technology products : a case study of residential solar panels .

    E-Print Network [OSTI]

    Chen, Heidi Qianyi

    2012-01-01T23:59:59.000Z

    ??This thesis investigates ways to obtain consumer preferences for technology products to help designers identify the key attributes that contribute to a product's market success.… (more)

  16. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  17. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  18. TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...

    Broader source: Energy.gov (indexed) [DOE]

    Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

  19. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

  20. Hydrodynamic experiment provides key data for Stockpile Stewardship

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

  1. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  2. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  3. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  4. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  5. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  6. Review of technical justification of assumptions and methods used by the Environmental Protection Agency for estimating risks avoided by implementing MCLs for radionuclides

    SciTech Connect (OSTI)

    Morris, S.C.; Rowe, M.D.; Holtzman, S.; Meinhold, A.F.

    1992-11-01T23:59:59.000Z

    The Environmental Protection Agency (EPA) has proposed regulations for allowable levels of radioactive material in drinking water (40 CFR Part 141, 56 FR 33050, July 18, 1991). This review examined the assumptions and methods used by EPA in calculating risks that would be avoided by implementing the proposed Maximum Contaminant Levels for uranium, radium, and radon. Proposed limits on gross alpha and beta-gamma emitters were not included in this review.

  7. Development of a tool dedicated to the evaluation of hydrogen term source for technological Wastes: assumptions, physical models, and validation

    SciTech Connect (OSTI)

    Lamouroux, C. [CEA Saclay, Nuclear Energy Division /DANS, Department of physico-chemistry, 91191 Gif sur yvette (France); Esnouf, S. [CEA Saclay, DSM/IRAMIS/SIS2M/Radiolysis Laboratory , 91191 Gif sur yvette (France); Cochin, F. [Areva NC,recycling BU, DIRP/RDP tour Areva, 92084 Paris La Defense (France)

    2013-07-01T23:59:59.000Z

    In radioactive waste packages hydrogen is generated, in one hand, from the radiolysis of wastes (mainly organic materials) and, in the other hand, from the radiolysis of water content in the cement matrix. In order to assess hydrogen generation 2 tools based on operational models have been developed. One is dedicated to the determination of the hydrogen source term issues from the radiolysis of the wastes: the STORAGE tool (Simulation Tool Of Emission Radiolysis Gas), the other deals with the hydrogen source term gas, produced by radiolysis of the cement matrices (the Damar tool). The approach used by the STORAGE tool for assessing the production rate of radiolysis gases is divided into five steps: 1) Specification of the data packages, in particular, inventories and radiological materials defined for a package medium; 2) Determination of radiochemical yields for the different constituents and the laws of behavior associated, this determination of radiochemical yields is made from the PRELOG database in which radiochemical yields in different irradiation conditions have been compiled; 3) Definition of hypothesis concerning the composition and the distribution of contamination inside the package to allow assessment of the power absorbed by the constituents; 4) Sum-up of all the contributions; And finally, 5) validation calculations by comparison with a reduced sampling of packages. Comparisons with measured values confirm the conservative character of the methodology and give confidence in the safety margins for safety analysis report.

  8. An Integrated ACO Approach for the Joint Production and Preventive Maintenance Scheduling

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Integrated ACO Approach for the Joint Production and Preventive Maintenance Scheduling Problem, an integrated ACO approach to solve joint production and preventive maintenance scheduling problem very effective solutions for this problem. Key words-- ACO, Production, Preventive maintenance

  9. Product Life Cycle, and Market Entry and Exit Decisions Under Uncertainty

    E-Print Network [OSTI]

    Chi, Tailan; Liu, John

    2001-01-01T23:59:59.000Z

    A key characteristic of the product life cycle (PLC) is the depletion of the product’s market potential due to technological obsolescence. Based on this concept, we develop a stochastic model for evaluating market entry and exit decisions during...

  10. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  11. Prairie Fruit Summary, 2010 Some key considerations for the homeowner

    E-Print Network [OSTI]

    Peak, Derek

    1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

  12. Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Wang, Yu

    Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

  13. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  14. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  15. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  16. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

  17. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  18. Practical Key-Recovery for All Possible Parameters of SFLASH

    E-Print Network [OSTI]

    Fouque, Pierre-Alain

    function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

  19. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS Risø-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

  20. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  1. The licensing of patents in return for a fee or royalties has a key role in drug discovery.

    E-Print Network [OSTI]

    Cai, Long

    The licensing of patents in return for a fee or royalties has a key role in drug discovery. Now the licensee brings out a new product, it may be unclear whether they need to pay royalty fees to the patentee patents in exchange for royalty payments; however, they disputed whether the licence of two patents

  2. PRODUCTION OF CARBON PRODUCTS USING A COAL EXTRACTION PROCESS

    SciTech Connect (OSTI)

    Dady Dadyburjor; Chong Chen; Elliot B. Kennel; Liviu Magean; Peter G. Stansberry; Alfred H. Stiller; John W. Zondlo

    2006-02-23T23:59:59.000Z

    The purpose of this DOE-funded effort is to develop technologies for carbon products from coal-derived feedstocks. Carbon products can include precursor materials such as solvent extracted carbon ore (SECO) and synthetic pitch (Synpitch). In addition, derived products include carbon composites, fibers, foams and others. Key milestones included producing hydrogenated coal in the Hydrotreating Facility for the first time. The facility is now operational, although digital controls have not yet been completely wired. In addition, ultrasound is being used to investigate enhanced dissolution of coal. Experiments have been carried out.

  3. Keys to Profitable Small Grain Production In the Rolling Plains and Edwards Plateau.

    E-Print Network [OSTI]

    Alexander, U.U.; Gass, Willis B.; Boring, Emory P. III; Fuchs, Thomas W.

    1985-01-01T23:59:59.000Z

    pasture. Rye is grown primarily for grazing and is more winter-hardy than wheat. Small grains respond well to irrigation, which is available in limited quantities. Soils need adequate surface drainage to permit normal plant growth and root development.... Damage often occurs first in the part of the field where small grain is making the most luxurious growth . The greenbug is the most damaging of the pests found in small grains. Weather conditions are the major factor contributing to a green bug...

  4. ?-Lactones as Key Building Blocks: Synthetic Applications to Diverse Natural Products

    E-Print Network [OSTI]

    Shirley, Morgan

    2014-06-06T23:59:59.000Z

    cyclopentanes an organocatalyzed tandem Michael aldol-lactonization process is reported. Subsequently revealing conditions for an enantioselective variant generating two C-C bonds, one C-O bond, two rings, and up to three contiguous stereocenters from simple...

  5. Potential for Hydrogen Production from Key Renewable Resources in the United States

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006PhotovoltaicSeptember 22, 2014SocietyJ. Dudhia515Atom ofPRSPotential

  6. Relating horsepower to drilling productivity

    SciTech Connect (OSTI)

    Givens, R.; Williams, G.; Wingfield, B.

    1996-12-31T23:59:59.000Z

    Many technological advancements have been made in explosive products and applications over the last 15 years resulting in productivity and cost gains. However, the application of total energy (engine horsepower) in the majority of rotary drilling technology, has remained virtually unchanged over that period. While advancements have been made in components, efficiency, and types of hydraulic systems used on drills, the application of current hydraulic technology to improve drilling productivity has not been interactive with end users. This paper will investigate how traditional design assumptions, regarding typical application of horsepower in current rotary drill systems, can actually limit productivity. It will be demonstrated by numeric analysis how changing the partitioning of available hydraulic energy can optimize rotary drill productivity in certain conditions. Through cooperative design ventures with drill manufacturers, increased penetration rates ranging from 20% to 100% have been achieved. Productivity was increased initially on some rigs by careful selection of optional hydraulic equipment. Additional gains were made in drilling rates by designing the rotary hydraulic circuit to meet the drilling energies predicted by computer modeling.

  7. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  8. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  9. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  10. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  11. Building America Expert Meeting: Key Innovations for Adding Energy...

    Broader source: Energy.gov (indexed) [DOE]

    This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

  12. Families First: Keys to Successful Family Functioning Communication

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

  13. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  14. Nano Lect 1 Questions and Keypoints Key Points

    E-Print Network [OSTI]

    Smy, Tom

    Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

  15. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect (OSTI)

    None

    2008-01-31T23:59:59.000Z

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  16. Outer Continental Shelf Production

    U.S. Energy Information Administration (EIA) Indexed Site

    Reference case projections. 3 The complete AEO2014, which was released in May, includes alternative assumptions regarding resources, technology advances, and world energy prices...

  17. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    ) Mountain Air Wind Farm (138 MW) ­ Elmore County, ID (Image courtesy of Terna-Energy) 3 #12;Current of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar" prior to 12/31/16 Post-2016, credit drops to 10% - solar PV, geothermal 6 #12;Status of Regional RPS

  18. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) Sr (2)ScienceScientistsONDelivered5Atmospheric

  19. A Study of Maintenance Contribution to a Joint Production and Preventive maintenance Scheduling Problem in the Robustness

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Study of Maintenance Contribution to a Joint Production and Preventive maintenance Scheduling production and Preventive Maintenance (PM) scheduling problem in the robustness framework. The contributions equipment reliability and performance loss under disruption Key words: Production, Preventive maintenance

  20. SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS

    E-Print Network [OSTI]

    into the IT system development life cycle, and rigorously select the products, algorithms, and protocols that meet

  1. Microsoft PowerPoint - HTGR Key Requirements Design Functional...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    * Cracking facilities * Ammonia Production - Enhanced oil recovery * Oil Sands * Oil Shale * Oil Shale - Hydrogen * Hydrogenation * General industrial merchant market -...

  2. Development of water production type curves for horizontal wells in coalbed methane reservoirs.

    E-Print Network [OSTI]

    Burka Narayana, Praveen Kumar.

    2007-01-01T23:59:59.000Z

    ??Coalbed methane is an unconventional gas resource that consists of methane production from the coal seams. The key parameters for the evaluation of coalbed methane… (more)

  3. Dieselzymes: development of a stable and methanol tolerant lipase for biodiesel production by directed evolution

    E-Print Network [OSTI]

    Korman, Tyler P; Sahachartsiri, Bobby; Charbonneau, David M; Huang, Grace L; Beauregard, Marc; Bowie, James U

    2013-01-01T23:59:59.000Z

    J, Campelo JM, Romero AA: Biodiesel as feasible petrol fueltowards ever greener biodiesel production. Biotechnol Adv 3.T, Bielecki S: Enzymatic biodiesel synthesis - key factors

  4. Quantum-Secure Authentication with a Classical Key

    E-Print Network [OSTI]

    Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

    2014-06-03T23:59:59.000Z

    Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

  5. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  6. Security Proof of a Semi-Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Walter O. Krawec

    2014-11-30T23:59:59.000Z

    Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

  7. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01T23:59:59.000Z

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  8. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

  9. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

  10. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

  11. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

  12. Key Concepts in Project Development and Financing in Alaska

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

  13. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  14. REGIONAL INTEGRATION AND PRODUCTIVITY GROWTH IN SOUTH ASIA

    E-Print Network [OSTI]

    Title REGIONAL INTEGRATION AND PRODUCTIVITY GROWTH IN SOUTH ASIA Authors Amirul Islam Department;Abstract Understanding the role of regional integration in in productivity growth remains a key question effect of the free trade agreement on productivity. Most of the countries in South Asia have suffered

  15. Product Demonstrations

    Broader source: Energy.gov [DOE]

    The Consortium will pursue a number of demonstrations following the general procedure used by DOE's GATEWAY demonstration program. Specific products to be featured in a demonstration may be...

  16. Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments

    E-Print Network [OSTI]

    Florida, University of

    Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

  17. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  18. TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt

    E-Print Network [OSTI]

    ·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

  19. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  20. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  1. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  2. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

  3. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  4. SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK

    E-Print Network [OSTI]

    SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

  5. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  6. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  7. Key words: STREAMLINE, yeast, scale up, automation, sanitization.

    E-Print Network [OSTI]

    Lebendiker, Mario

    adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

  8. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  9. Essentials of Energy Key concepts for the day

    E-Print Network [OSTI]

    Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

  10. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  11. BERNAL and RESTREPO Key issues for decentralization in municipal

    E-Print Network [OSTI]

    Boyer, Edmond

    BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

  12. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  13. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  14. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  15. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  16. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  17. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  18. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  19. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  20. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  1. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  2. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    thermodynamic parameters, such as fuel depletion ratio, relative irreversibility, productivity lack and exergetic factor) used in the analysis are presented first. Next,...

  3. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    oil production. High voltage transmission lines carry electrical power. Networks, smart grids: new model for synchronization May, 21 2013 - Researchers developed a...

  4. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    near Hatch, New Mexico. Lab scientist from Espaola provides technical assistance to small New Mexico businesses November, 1 2014 - Wind, solar and hydro energy production can...

  5. Life Cycle Analysis of the Production of Aviation Fuels Using the CE-CERT Process

    E-Print Network [OSTI]

    Hu, Sangran

    2012-01-01T23:59:59.000Z

    production and supply to keep pace with the growth in world energy.production scenarios, Energy Policy, 2009, 37, 10, p4003-4010 8 International Energy Agency (IEA), Key World

  6. A Comprehensive Energy Audit of a Large Production Unit in Six Weeks

    E-Print Network [OSTI]

    Korich, R. D.

    1980-01-01T23:59:59.000Z

    Past energy audits of petrochemical plant production units at Union Carbide have demonstrated that the key to an effective, comprehensive audit of a large production unit is to minimize the time period requirement for the team activity. This paper...

  7. Process reengineering for new product introduction at an analytical instrument manufacturing firm

    E-Print Network [OSTI]

    Ranjan, Aditya

    2014-01-01T23:59:59.000Z

    The process of transforming Research and Development knowledge to successfully introducing new products in the market forms a key competency of an innovative company. This new product introduction process was studied at ...

  8. Health and productivity benefits of improved indoor air quality

    SciTech Connect (OSTI)

    Dorgan, C.B. [Dorgan Associates, Inc., Madison, WI (United States); Dorgan, C.E.; Kanarek, M.S. [Univ. of Wisconsin, Madison, WI (United States); Willman, A.J. [Quantum Technology, Inc., Springfield, VA (United States)

    1998-10-01T23:59:59.000Z

    This paper is a summary of two studies completed for a national contractor`s association on the health costs and productivity benefits of improved IAQ. The original study documented the general health costs and productivity benefits of improved IAQ. The second study expanded the scope to include medical cost reductions for specific illnesses from improved IAQ. General information on the objectives, assumptions, definitions, and results of the studies are presented, followed by detailed information on research methodology, building inventory and wellness categories, health and medical effects of poor IAQ, health cost benefits, productivity benefits, recommended improvements, and conclusions and future improvements.

  9. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  10. IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

    E-Print Network [OSTI]

    IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R Infinitesimal Perturbation Analysis (IPA) in the class of Make-to Stock (MTS) production-inventory systems regularity assumptions. The paper then analyzes the SFM counterpart and derives closed-form IPA derivative

  11. I t=106sec3a 10 Energy key) 10'

    E-Print Network [OSTI]

    . Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

  12. City of Key West, Florida (Utility Company) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

  13. Hydrogen demand, production, and cost by region to 2050.

    SciTech Connect (OSTI)

    Singh, M.; Moore, J.; Shadis, W.; Energy Systems; TA Engineering, Inc.

    2005-10-31T23:59:59.000Z

    This report presents an analysis of potential hydrogen (H{sub 2}) demand, production, and cost by region to 2050. The analysis was conducted to (1) address the Energy Information Administration's (EIA's) request for regional H{sub 2} cost estimates that will be input to its energy modeling system and (2) identify key regional issues associated with the use of H{sub 2} that need further study. Hydrogen costs may vary substantially by region. Many feedstocks may be used to produce H{sub 2}, and the use of these feedstocks is likely to vary by region. For the same feedstock, regional variation exists in capital and energy costs. Furthermore, delivery costs are likely to vary by region: some regions are more rural than others, and so delivery costs will be higher. However, to date, efforts to comprehensively and consistently estimate future H{sub 2} costs have not yet assessed regional variation in these costs. To develop the regional cost estimates and identify regional issues requiring further study, we developed a H{sub 2} demand scenario (called 'Go Your Own Way' [GYOW]) that reflects fuel cell vehicle (FCV) market success to 2050 and allocated H{sub 2} demand by region and within regions by metropolitan versus non-metropolitan areas. Because we lacked regional resource supply curves to develop our H{sub 2} production estimates, we instead developed regional H{sub 2} production estimates by feedstock by (1) evaluating region-specific resource availability for centralized production of H{sub 2} and (2) estimating the amount of FCV travel in the nonmetropolitan areas of each region that might need to be served by distributed production of H{sub 2}. Using a comprehensive H{sub 2} cost analysis developed by SFA Pacific, Inc., as a starting point, we then developed cost estimates for each H{sub 2} production and delivery method by region and over time (SFA Pacific, Inc. 2002). We assumed technological improvements over time to 2050 and regional variation in energy and capital costs. Although we estimate substantial reductions in H{sub 2} costs over time, our cost estimates are generally higher than the cost goals of the U.S. Department of Energy's (DOE's) hydrogen program. The result of our analysis, in particular, demonstrates that there may be substantial variation in H{sub 2} costs between regions: as much as $2.04/gallon gasoline equivalent (GGE) by the time FCVs make up one-half of all light-vehicle sales in the GYOW scenario (2035-2040) and $1.85/GGE by 2050 (excluding Alaska). Given the assumptions we have made, our analysis also shows that there could be as much as a $4.82/GGE difference in H{sub 2} cost between metropolitan and non-metropolitan areas by 2050 (national average). Our national average cost estimate by 2050 is $3.68/GGE, but the average H{sub 2} cost in metropolitan areas in that year is $2.55/GGE and that in non-metropolitan areas is $7.37/GGE. For these estimates, we assume that the use of natural gas to produce H{sub 2} is phased out. This phase-out reflects the desire of DOE's Office of Hydrogen, Fuel Cells and Infrastructure Technologies (OHFCIT) to eliminate reliance on natural gas for H{sub 2} production. We conducted a sensitivity run in which we allowed natural gas to continue to be used through 2050 for distributed production of H{sub 2} to see what effect changing that assumption had on costs. In effect, natural gas is used for 66% of all distributed production of H{sub 2} in this run. The national average cost is reduced to $3.10/GGE, and the cost in non-metropolitan areas is reduced from $7.37/GGE to $4.90, thereby reducing the difference between metropolitan and non-metropolitan areas to $2.35/GGE. Although the cost difference is reduced, it is still substantial. Regional differences are similarly reduced, but they also remain substantial. We also conducted a sensitivity run in which we cut in half our estimate of the cost of distributed production of H{sub 2} from electrolysis (our highest-cost production method). In this run, our national average cost estimate is reduced even further, to

  14. Leading Particle Production in Light Flavour Jets

    E-Print Network [OSTI]

    Abbiendi, G; Ĺkesson, P F; Alexander, Gideon; Allison, J; Anderson, K J; Arcelli, S; Asai, S; Ashby, S F; Axen, D A; Azuelos, Georges; Bailey, I; Ball, A H; Barberio, E; Barlow, R J; Batley, J Richard; Baumann, S; Behnke, T; Bell, K W; Bella, G; Bellerive, A; Bentvelsen, Stanislaus Cornelius Maria; Bethke, Siegfried; Betts, S; Biebel, O; Biguzzi, A; Bloodworth, Ian J; Bock, P; Böhme, J; Boeriu, O; Bonacorsi, D; Boutemeur, M; Braibant, S; Bright-Thomas, P G; Brigliadori, L; Brown, R M; Burckhart, Helfried J; Capiluppi, P; Carnegie, R K; Carter, A A; Carter, J R; Chang, C Y; Charlton, D G; Chrisman, D; Ciocca, C; Clarke, P E L; Clay, E; Cohen, I; Conboy, J E; Cooke, O C; Couchman, J; Couyoumtzelis, C; Coxe, R L; Cuffiani, M; Dado, S; Dallavalle, G M; Dallison, S; Davis, R; de Roeck, A; Dervan, P J; Desch, Klaus; Dienes, B; Dixit, M S; Donkers, M; Dubbert, J; Duchovni, E; Duckeck, G; Duerdoth, I P; Estabrooks, P G; Etzion, E; Fabbri, Franco Luigi; Fanfani, A; Fanti, M; Faust, A A; Feld, L; Ferrari, P; Fiedler, F; Fierro, M; Fleck, I; Frey, A; Fürtjes, A; Futyan, D I; Gagnon, P; Gary, J W; Gaycken, G; Geich-Gimbel, C; Giacomelli, G; Giacomelli, P; Gingrich, D M; Glenzinski, D A; Goldberg, J; Gorn, W; Grandi, C; Graham, K; Gross, E; Grunhaus, Jacob; Gruwé, M; Hajdu, C; Hanson, G G; Hansroul, M; Hapke, M; Harder, K; Harel, A; Hargrove, C K; Harin-Dirac, M; Hauschild, M; Hawkes, C M; Hawkings, R; Hemingway, Richard J; Herten, G; Heuer, R D; Hildreth, M D; Hill, J C; Hobson, P R; Höcker, Andreas; Hoffman, K; Homer, R James; Honma, A K; Horváth, D; Hossain, K R; Howard, R; Hüntemeyer, P; Igo-Kemenes, P; Imrie, D C; Ishii, K; Jacob, F R; Jawahery, A; Jeremie, H; Jimack, Martin Paul; Jones, C R; Jovanovic, P; Junk, T R; Kanaya, N; Kanzaki, J I; Karapetian, G V; Karlen, D A; Kartvelishvili, V G; Kawagoe, K; Kawamoto, T; Kayal, P I; Keeler, Richard K; Kellogg, R G; Kennedy, B W; Kim, D H; Klier, A; Kobayashi, T; Kobel, M; Kokott, T P; Kolrep, M; Komamiya, S; Kowalewski, R V; Kress, T; Krieger, P; Von Krogh, J; Kühl, T; Kupper, M; Kyberd, P; Lafferty, G D; Landsman, Hagar Yaël; Lanske, D; Lauber, J; Lawson, I; Layter, J G; Lellouch, Daniel; Letts, J; Levinson, L; Liebisch, R; Lillich, J; List, B; Littlewood, C; Lloyd, A W; Lloyd, S L; Loebinger, F K; Long, G D; Losty, Michael J; Lü, J; Ludwig, J; Macchiolo, A; MacPherson, A L; Mader, W F; Mannelli, M; Marcellini, S; Marchant, T E; Martin, A J; Martin, J P; Martínez, G; Mashimo, T; Mättig, P; McDonald, W J; McKenna, J A; McKigney, E A; McMahon, T J; McPherson, R A; Meijers, F; Méndez-Lorenzo, P; Merritt, F S; Mes, H; Meyer, I; Michelini, Aldo; Mihara, S; Mikenberg, G; Miller, D J; Mohr, W; Montanari, A; Mori, T; Nagai, K; Nakamura, I; Neal, H A; Nisius, R; O'Neale, S W; Oakham, F G; Odorici, F; Ögren, H O; Okpara, A N; Oreglia, M J; Orito, S; Pásztor, G; Pater, J R; Patrick, G N; Patt, J; Pérez-Ochoa, R; Petzold, S; Pfeifenschneider, P; Pilcher, J E; Pinfold, James L; Plane, D E; Poli, B; Polok, J; Przybycien, M B; Quadt, A; Rembser, C; Rick, Hartmut; Robins, S A; Rodning, N L; Roney, J M; Rosati, S; Roscoe, K; Rossi, A M; Rozen, Y; Runge, K; Runólfsson, O; Rust, D R; Sachs, K; Saeki, T; Sahr, O; Sang, W M; Sarkisyan-Grinbaum, E; Sbarra, C; Schaile, A D; Schaile, O; Scharff-Hansen, P; Schieck, J; Schmitt, S; Schöning, A; Schröder, M; Schumacher, M; Schwick, C; Scott, W G; Seuster, R; Shears, T G; Shen, B C; Shepherd-Themistocleous, C H; Sherwood, P; Siroli, G P; Skuja, A; Smith, A M; Snow, G A; Sobie, Randall J; Söldner-Rembold, S; Spagnolo, S; Sproston, M; Stahl, A; Stephens, K; Stoll, K; Strom, D; Ströhmer, R; Surrow, B; Talbot, S D; Taras, P; Tarem, S; Teuscher, R; Thiergen, M; Thomas, J; Thomson, M A; Torrence, E; Towers, S; Trefzger, T M; Trigger, I; Trócsányi, Z L; Tsur, E; Turner-Watson, M F; Ueda, I; Van Kooten, R; Vannerem, P; Verzocchi, M; Voss, H; Wäckerle, F; Waller, D; Ward, C P; Ward, D R; Watkins, P M; Watson, A T; Watson, N K; Wells, P S; Wengler, T; Wermes, N; Wetterling, D; White, J S; Wilson, G W; Wilson, J A; Wyatt, T R; Yamashita, S; Zacek, V; Zer-Zion, D

    2000-01-01T23:59:59.000Z

    The energy distribution and type of the particle with the highest momentum in quark jets are determined for each of the five quark flavours making only minimal model assumptions. The analysis is based on a large statistics sample of hadronic Z0 decays collected with the OPAL detector at the LEP e+e- collider. These results provide a basis for future studies of light flavour production at other centre-of-mass energies. We use our results to study the hadronisation mechanism in light flavour jets and compare the data to the QCD models JETSET and HERWIG. Within the JETSET model we also directly determine the suppression of strange quarks to be gamma_s=0.422+-0.049 (stat.)+-0.059 (syst.) by comparing the production of charged and neutral kaons in strange and non-strange light quark events. Finally we study the features of baryon production.

  15. Accelerating Cosmologies with Extended Product Spaces

    E-Print Network [OSTI]

    Han Siong Ch'ng

    2008-10-15T23:59:59.000Z

    Accelerating cosmologies in extra dimensional spaces have been studied. These extra dimensional spaces are products of many spaces. The physical behaviors of accelerating cosmologies are investigated from Einstein's field equation in higher dimensional Friedmann-Robertson-Walker (FRW) universe and superstring/M theory points of view. It is found that if some assumptions of flatness are made for sector of the FRW universe, the remaining sector needs to be hyperbolic. These properties are in parallel with those found in the model of superstring/M theory. The extended product made for the superstring model did not show any more new features other than those already found. A similar accelerating phase of this product space cosmology was found with difference in numerical values of the accelerating period.

  16. New Approach to Quantum Key Distribution Via Quantum Encryption

    E-Print Network [OSTI]

    A. Fahmi

    2006-04-25T23:59:59.000Z

    In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

  17. Hydrogen Production

    Fuel Cell Technologies Publication and Product Library (EERE)

    This 2-page fact sheet provides a brief introduction to hydrogen production technologies. Intended for a non-technical audience, it explains how different resources and processes can be used to produ

  18. E-Print Network 3.0 - access technologies key Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

  19. A Comparison of Key PV Backsheet and Module Properties from Fielded...

    Broader source: Energy.gov (indexed) [DOE]

    of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

  20. Financial Management: The Key to Farm-Firm Business Management

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17T23:59:59.000Z

    Those who succeed will manage their operations as farm/ranch businesses, with more emphasis on recordkeeping, planning, profitability analysis and repayment-based financing, and with better production and business monitoring and controls...

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the turnover of the enzyme (amount of substrate converted by the enzyme). (c) Wild-type SalL with co-purified products 5'-ClDA and L-methionine. SalL chlorinase was...

  2. Hadron production from quark coalescence and jet fragmentation

    E-Print Network [OSTI]

    Greco, V.; Ko, Che Ming; Vitev, I.

    2005-01-01T23:59:59.000Z

    studies were on particle yields and their ratios. Recent studies have been more concerned with observables that are related to collective dynamics and production of hadronswith relatively large trans- verse momenta. Furthermore, effects of minijet... of coalescence involves the emission of a third particle or, more generally, offshell effects to guarantee energy conservation and color neutrality. However, under the assumption of a fast process in which the binding interaction is turned on suddenly...

  3. PROMPT PHOTON PRODUCTION IN POLARIZED HADRON COLLISIONS.

    SciTech Connect (OSTI)

    VOGELSANG,W.

    2000-04-25T23:59:59.000Z

    We consider spin asymmetries for prompt photon production in collisions of longitudinally polarized hadrons. This reaction will be a key tool at the BNL-RHIC {rvec p}{rvec p} collider for determining the gluon spin density in a polarized proton. We study the effects of QCD corrections, such as all-order soft-gluon ''threshold'' resummations.

  4. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  5. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  6. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01T23:59:59.000Z

    , Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

  7. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

  8. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

  9. NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

  10. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

  11. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

  12. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA Key

  13. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyA

  14. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAA

  15. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAAA

  16. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

  17. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

  18. Key Activities in Energy Efficiency | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

  19. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

  20. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

  1. Key Activities of the Geothermal Technologies Office | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

  2. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY

  3. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (SmartHome Kyoung's pictureFlint ElectricKeys El

  4. US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns

    E-Print Network [OSTI]

    Watson, Craig A.

    Higgins, Sustainability Director - City of Key West Rainwater Harvesting from Roof Collection through

  5. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  6. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  7. Abstract--Wave energy will have a key role in meeting re-newable energy targets en route to a low carbon economy. How-

    E-Print Network [OSTI]

    Harrison, Gareth

    1 Abstract--Wave energy will have a key role in meeting re- newable energy targets en route will impact on wave energy conversion. Where the resource is restricted there may be reductions in energy the sensitivity of wave energy production and econom- ics to changes in climate. Index Terms--Wave energy

  8. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  9. Soil and Vegetation Management: Keys to Water Conservation on Rangeland

    E-Print Network [OSTI]

    Schuster, Joseph L.

    2001-01-11T23:59:59.000Z

    The amount of water that soaks into the soil largely determines plant productivity. We can manage and conserve water where and when it falls, and by controlling the kind of vegetation we can make the fullest use of rain water. This publication...

  10. Approaches for Identifying Consumer Preferences for the Design of Technology Products: A Case Study of Residential Solar Panels

    E-Print Network [OSTI]

    Chen, Heidi Q.

    This paper investigates ways to obtain consumer preferences for technology products to help designers identify the key attributes that contribute to a product's market success. A case study of residential photovoltaic ...

  11. Approaches for identifying consumer preferences for the design of technology products : a case study of residential solar panels

    E-Print Network [OSTI]

    Chen, Heidi Qianyi

    2012-01-01T23:59:59.000Z

    This thesis investigates ways to obtain consumer preferences for technology products to help designers identify the key attributes that contribute to a product's market success. A case study of residential solar PV panels ...

  12. Plasma Chemistry and Plasma Processing, Vol. 22, No. 4, December 2002 ( 2002) Ozone Production in the Positive DC Corona

    E-Print Network [OSTI]

    Chen, Junhong

    Plasma Chemistry and Plasma Processing, Vol. 22, No. 4, December 2002 ( 2002) Ozone Production the distribution of ozone, but does not affect the rate of production. KEY WORDS: Corona discharge; corona plasma

  13. Hydrogen Production Cost Estimate Using Biomass Gasification: Independent Review

    SciTech Connect (OSTI)

    Ruth, M.

    2011-10-01T23:59:59.000Z

    This independent review is the conclusion arrived at from data collection, document reviews, interviews and deliberation from December 2010 through April 2011 and the technical potential of Hydrogen Production Cost Estimate Using Biomass Gasification. The Panel reviewed the current H2A case (Version 2.12, Case 01D) for hydrogen production via biomass gasification and identified four principal components of hydrogen levelized cost: CapEx; feedstock costs; project financing structure; efficiency/hydrogen yield. The panel reexamined the assumptions around these components and arrived at new estimates and approaches that better reflect the current technology and business environments.

  14. RMOTC - Production

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNewsCenter forQuality AssuranceProduction RMOTC

  15. Energy use and carbon dioxide emissions in energy-intensive industries in key developing countries

    SciTech Connect (OSTI)

    Price, Lynn; Worrell, Ernst; Phylipsen, Dian

    1999-09-01T23:59:59.000Z

    The industrial sector is the most important end-use sector in developing countries in terms of energy use and was responsible for 50% of primary energy use and 53% of associated carbon dioxide emissions in 1995 (Price et al., 1999). The industrial sector is extremely diverse, encompassing the extraction of natural resources, conversion of these resources into raw materials, and manufacture of finished products. Five energy-intensive industrial subsectors account for the bulk of industrial energy use and related carbon dioxide emissions: iron and steel, chemicals, petroleum refining, pulp and paper, and cement. In this paper, we focus on the steel and cement sectors in Brazil, China, India, and Mexico.1 We review historical trends, noting that China became the world's largest producer of cement in 1985 and of steel in 1996. We discuss trends that influence energy consumption, such as the amount of additives in cement (illustrated through the clinker/cement ratio), the share of electric arc furnaces, and the level of adoption of continuous casting. To gauge the potential for improvement in production of steel and cement in these countries, we calculate a ''best practice'' intensity based on use of international best practice technology to produce the mix of products manufactured in each country in 1995. We show that Brazil has the lowest potential for improvement in both sectors. In contrast, there is significant potential for improvement in Mexico, India, and especially China, where adoption of best practice technologies could reduce energy use and carbon dioxide emissions from steel production by 50% and cement production by 37%. We conclude by comparing the identified potential for energy efficiency improvement and carbon dioxide emissions reduction in these key developing countries to that of the U.S. This comparison raises interesting questions related to efforts to improve energy efficiency in developing countries, such as: what is the appropriate role of industrialized countries in promoting the adoption of low carbon technologies, how do international steel and cement companies influence the situation, and how can such information be used in the context of Clean Development Mechanism in the Kyoto Protocol?

  16. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    SciTech Connect (OSTI)

    McClain, Lynn [Niagara Mohawk (United States); Smith, Art [Entergy Operations (United States); O'Regan, Patrick [Electric Power Research Institute - EPRI, 3420 Hillview Avenue, Palo Alto, California 94304 (United States)

    2002-07-01T23:59:59.000Z

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  17. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  18. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Broader source: Energy.gov (indexed) [DOE]

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  19. Nulljob product

    SciTech Connect (OSTI)

    Hughart, N.; Ritchie, D.

    1987-08-01T23:59:59.000Z

    The ever increasing demand for more CPU cycles for data analysis on the authors' Central VAX Cluster led them to investigate new ways to utilize more fully the resources that were available. A review of the experiment and software development VAX systems on site revealed many unused computing cycles. Furthermore, these systems were all connected by DECnet which would allow easy file transfer and remote batch job submission. A product was developed to allow jobs to be submitted on the Central VAX Cluster but actually to be run on one of the remote systems. The processing of the jobs was arranged, to the greatest extent possible, to be transparent to the user and to have minimal impact on both the Central VAX Cluster and remote systems.

  20. NULLJOB product

    SciTech Connect (OSTI)

    Hughart, N.; Ritchie, D.

    1987-05-01T23:59:59.000Z

    The ever increasing demand for more CPU cycles for data analysis on our Central VAX Cluster led us to investigate new ways to utilize more fully the resources that were available. A review of the experiment and software development VAX systems on site revealed many unused computing cycles. Furthermore, these systems were all connected by DECnet which would allow easy file transfer and remote batch job submission. A product was developed to allow jobs to be submitted on the Central VAX Cluster but actually to be run on one of the remote systems. The processing of the jobs was arranged, to the greatest extent possible, to be transparent to the user and to have minimal impact on both the Central VAX Cluster and remote systems.

  1. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  2. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  3. Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices

    E-Print Network [OSTI]

    to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

  4. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    , such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

  5. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  6. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  7. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  8. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale projects are hard, because the impact and relevance of key technologies go beyond their core technological

  9. Tulenovo field holds key to new drilling in Bulgaria

    SciTech Connect (OSTI)

    Bottomley, S.; Pritchard, G. [Balkan Explorers (Bulgaria) Ltd., London (United Kingdom)

    1998-03-02T23:59:59.000Z

    Tulenovo oil field is located on the Bulgarian Black Sea coast, 60 km northeast of the port of Varna and 25 km south of the Romanian border. The accumulation, second largest in Bulgaria, has several unusual technical features: shallow depth ({+-}350 m); cavernous porosity, giving excellent reservoir quality, oil recovery, and production flow rates; an effective chalk seal; controversial and unproven source rock; a secondary gas cap; and extensive well coverage yielding detailed reservoir data. The field`s gas cap is reported to contain 94% methane and > 5% nitrogen. The gas is not in equilibrium with the underlying oil and is interpreted to represent a secondary feature resulting from more recent thermal or biogenic gas generation. Carbon isotope analysis of the gas is not available to resolve this matter. The most likely source of the gas is the fore-deep to the Balkan mountains (the Kamchia depression), located south of the field. The paper describes the reservoir, its seal, oil and gas characteristics, structure, production performance, and development plans.

  10. A Systematic Review of Productivity Factors in Software Development Stefan Wagner

    E-Print Network [OSTI]

    . It is the key for a successful software company to control and improve its productivity. However, in contrast, Germany melanie.ruhe@siemens.com Abstract Analysing and improving productivity has been one of the main. Introduction Productivity in software development has been an im- portant research area for several decades

  11. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  12. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  13. Language Production General Points about Speech Production

    E-Print Network [OSTI]

    Coulson, Seana

    Language Production #12;General Points about Speech Production 15 speech sounds per second => 2, shall I say `t' or `d'' (Levelt) Production side has gotten less attention in Psycholinguistics than the comprehension side. Evidence for speech production behaviour has until recently relied heavily on speech errors

  14. Conduct of Operations, the first line supervisor: The key to implementation

    SciTech Connect (OSTI)

    Anglesey, S.C.

    1992-05-01T23:59:59.000Z

    Implementation of US Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities (DOE 1990) requires modification of personal behavior and group culture. Stranded in the middle, between vision and practical application, is the first line supervisor. Conduct of Operations is a mixture of philosophy and application requiring time, resources, and motivated personnel to achieve visible, long lasting, and meaningful improvement in safety, productivity, and accountability. Consistency in training and implementation strategies for all levels of the company is essential to build the team necessary to establish the ideal Conduct of Operations environment. The focus should be on producing change, strengthening supervisor interaction with their direct reports, and making Conduct of Operations implementation permanent. The first line supervisor is the key to successful implementation. To aid the supervisor in smoothing the implementation process the following questions are covered in this report: (1) what lessons have we learned from our experience so far (2) is there a best way to introduce and orchestrate an atmosphere for change using Conduct of Operations principles (3) what are the roles for each participant in this change (4) what are the tools to help in this process and, (5) what will it cost.

  15. Conduct of Operations, the first line supervisor: The key to implementation

    SciTech Connect (OSTI)

    Anglesey, S.C.

    1992-05-01T23:59:59.000Z

    Implementation of US Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities (DOE 1990) requires modification of personal behavior and group culture. Stranded in the middle, between vision and practical application, is the first line supervisor. Conduct of Operations is a mixture of philosophy and application requiring time, resources, and motivated personnel to achieve visible, long lasting, and meaningful improvement in safety, productivity, and accountability. Consistency in training and implementation strategies for all levels of the company is essential to build the team necessary to establish the ideal Conduct of Operations environment. The focus should be on producing change, strengthening supervisor interaction with their direct reports, and making Conduct of Operations implementation permanent. The first line supervisor is the key to successful implementation. To aid the supervisor in smoothing the implementation process the following questions are covered in this report: (1) what lessons have we learned from our experience so far? (2) is there a best way to introduce and orchestrate an atmosphere for change using Conduct of Operations principles? (3) what are the roles for each participant in this change? (4) what are the tools to help in this process? and, (5) what will it cost.

  16. Sea Urchin Gonad Index a Key to Understanding Secondary Production in the Restoration of Giant Kelp Forests off Palos Verdes

    E-Print Network [OSTI]

    Ford, Tom; Pondella, Dan

    2011-01-01T23:59:59.000Z

    project would be applicable in other areas with kelp forestsand kelp- dependent fisheries.NA KEYWORDS: sea urchin, kelp forest, urchin barren, gonad

  17. High yield production of inorganic graphene-like materials (MoS?, WS?, BN) through liquid exfoliation testing key parameters

    E-Print Network [OSTI]

    Pu, Fei, S.B. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Inorganic graphene-like materials such as molybdenum disulfide (MoS?), tungsten sulfide (WS?), and boron nitride (BN) are known to have electronic properties. When exfoliated into layers and casted onto carbon nanofilms, ...

  18. Quantitative Network Signal Combinations Downstream of TCR Activation Can Predict IL-2 Production Response1

    E-Print Network [OSTI]

    Quantitative Network Signal Combinations Downstream of TCR Activation Can Predict IL-2 Production of intense ongoing study, but understanding how the consequent downstream signaling networks integrate hypothesized that a quantitative combination of key downstream network signals across multiple pathways must

  19. Subsurface Flow Management and Real-Time Production Optimization using Model Predictive Control

    E-Print Network [OSTI]

    Lopez, Thomas Jai

    2012-02-14T23:59:59.000Z

    One of the key challenges in the Oil & Gas industry is to best manage reservoirs under different conditions, constrained by production rates based on various economic scenarios, in order to meet energy demands and maximize profit. To address...

  20. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  1. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  2. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  3. E-Print Network 3.0 - apoptosis key players Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: -publication: http:www.landesbioscience.comjournalsccabstract.php?id3262 KEY WORDS cyclin A, apoptosis, Xenopus... is Sufficient but not Required for the...

  4. E-Print Network 3.0 - address key issues Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    term schedule. Summary: to their rental fees, before they obtain their locker key. Lockout situations can only be addressed through... of the renter to clean out hisher locker...

  5. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  6. Your biodiversity in my backyard : key local stakeholders' perceptions of biodiversity conservation in Gorontalo, Indonesia.

    E-Print Network [OSTI]

    Kartikasari, Sri Nurani

    2008-01-01T23:59:59.000Z

    ??The establishment of protected areas (PAs) has been the key national strategy in biodiversity conservation, through preserving the unique wildlife and ecosystems in Indonesia. As… (more)

  7. Biological production of products from waste gases

    DOE Patents [OSTI]

    Gaddy, James L. (Fayetteville, AR)

    2002-01-22T23:59:59.000Z

    A method and apparatus are designed for converting waste gases from industrial processes such as oil refining, and carbon black, coke, ammonia, and methanol production, into useful products. The method includes introducing the waste gases into a bioreactor where they are fermented to various products, such as organic acids, alcohols, hydrogen, single cell protein, and salts of organic acids by anaerobic bacteria within the bioreactor. These valuable end products are then recovered, separated and purified.

  8. Covered Product Category: Cool Roof Products

    Broader source: Energy.gov [DOE]

    FEMP provides acquisition guidance across a variety of product categories, including cool roof products, which are an ENERGY STAR®-qualified product category. Federal laws and requirements mandate that agencies meet these efficiency requirements in all procurement and acquisition actions that are not specifically exempted by law.

  9. Aesculap, Inc. Air Products

    E-Print Network [OSTI]

    Napier, Terrence

    Aesculap, Inc. Air Products Air Products Foundation Alaric Compliance Services, LLC Alvin H. Butz & Herger, Inc. Sodexo Campus Services Sodexo Inc. and Affiliates Stupp Bros., Inc. Sugarbush Products, Inc

  10. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    in a variety of rubber and plastic products, thermal incineration of waste tires for production of electricity rubber in asphalt mixes, (ii) thermal incineration of worn-out tires for the production of electricity

  11. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  12. A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

  13. Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb

    E-Print Network [OSTI]

    Sheffield, University of

    Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

  14. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  15. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical in Density Functional Theory (II) Silvana Botti #12;Band structures Optical absorption Summary Outline 1 From

  16. An efficient certificateless two-party authenticated key agreement scheme from

    E-Print Network [OSTI]

    -based cryptography. Key agreement(KA) schemes are designed to provide secure communications between two or more proposed. However, these schemes need to compute at least one pairing on-line. In order to improve to finished the key agreement. Our scheme's overhead is lower than that of previous schemes [3

  17. Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    E-Print Network [OSTI]

    Kai Wen; Gui Lu Long

    2005-08-27T23:59:59.000Z

    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

  18. Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

    E-Print Network [OSTI]

    of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

  19. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  20. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  1. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  2. Direct quadrature phase shift keying modulator using six-port technology

    E-Print Network [OSTI]

    Frigon, Jean-François

    Direct quadrature phase shift keying modulator using six-port technology Y. Zhao, C. Viereck, J.F. Frigon, R.G. Bosisio and K. Wu A direct quadrature phase shift keying modulator based on six-port technology is presented. The modulator comprises a six-port circuit, a switch matrix and open and short

  3. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  4. from Isotope Production Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cancer-fighting treatment gets boost from Isotope Production Facility April 13, 2012 Isotope Production Facility produces cancer-fighting actinium 2:32 Isotope cancer treatment...

  5. PATTERNS OF PRIMARYAND HETEROTROPHIC PRODUCTIVITY IN AN ARID LOWLAND RIVER

    E-Print Network [OSTI]

    Canberra, University of

    production variability. This study also highlights the importance of the microbial loop and macrophytes in the ecology of the Murray R. Copyright # 2007 John Wiley & Sons, Ltd. key words: lowland rivers; carbon; River of organic carbon supplied to a riverine system will be one of the major determinants of biotic community

  6. Clean Energy Manufacturing Initiative Industrial Efficiency and Energy Productivity

    SciTech Connect (OSTI)

    Selldorff, John; Atwell, Monte

    2014-09-23T23:59:59.000Z

    Industrial efficiency and low-cost energy resources are key components to increasing U.S. energy productivity and makes the U.S. manufacturing sector more competitive. Companies find a competitive advantage in implementing efficiency technologies and practices, and technologies developed and manufactured in the U.S. enable greater competitiveness economy-wide.

  7. Clean Energy Manufacturing Initiative Industrial Efficiency and Energy Productivity

    ScienceCinema (OSTI)

    Selldorff, John; Atwell, Monte

    2014-12-03T23:59:59.000Z

    Industrial efficiency and low-cost energy resources are key components to increasing U.S. energy productivity and makes the U.S. manufacturing sector more competitive. Companies find a competitive advantage in implementing efficiency technologies and practices, and technologies developed and manufactured in the U.S. enable greater competitiveness economy-wide.

  8. Optimal Production Policy under the Carbon Emission Market

    E-Print Network [OSTI]

    Optimal Production Policy under the Carbon Emission Market Radoin Belaouar Arash Fahim Nizar Touzi than what she used to do before the existence of the emission market. Key words: EU ETS, Carbon ETS) which provides a way to control the emission of CO2 within carbon polluters through trading

  9. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE

    SciTech Connect (OSTI)

    Martin, D

    2007-09-04T23:59:59.000Z

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  10. Component Verification with Automatically Generated Assumptions

    E-Print Network [OSTI]

    Pasareanu, Corina

    satisfies its required property. Our approach has been implemented in the LTSA tool and has been applied

  11. Learning Assumptions for Compositional Veri cation

    E-Print Network [OSTI]

    Pasareanu, Corina

    that the property is either true or false in the system. We have imple- mented our approach in the LTSA tool

  12. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    for EIA (SENTECH Incorporated, 2010). Wind: The Cost and Performance of Distributed Wind Turbines, 2010-35 (ICF International, 2010). 31 U.S. Energy Information Administration |...

  13. Assumptions to the Annual Energy Outlook 2013

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    and U.S. Energy Information Administration, The Cost and Performance of Distributed Wind Turbines, 2010-35 Final Report, ICF International, August 2010. 43 U.S. Energy Information...

  14. CLIMATE ACTION PLANNING TOOL FORMULAS AND ASSUMPTIONS

    E-Print Network [OSTI]

    energy at the same rate (energy use intensity) as existing campus buildings. Fleet operations buildings will consume energy at the same rate (energy use intensity) as existing campus buildings New buildings will consume energy at the same rate (energy use intensity) as existing campus buildings

  15. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ") 179 MW lifecycle Site heat rate (Btu/kwh): 9,350 ("new and clean") 9,430 lifecycle (36% efficiency

  16. Phenomenology: history, its methodological assumptions and application .

    E-Print Network [OSTI]

    Mohamed-Patel, Rahima

    2008-01-01T23:59:59.000Z

    ??This study aims to provide a deeper understanding of phenomenology firstly by tracing its historical roots and locating it within its philosophical framework. This aim… (more)

  17. Assumptions to the Annual Energy Outlook 2013

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    Act of 2006 (AB32) AB32 established a comprehensive, multi-year program to reduce Green House Gas (GHG) emissions in California, including a cap-and-trade program. In...

  18. Assumptions to the Annual Energy Outlook 2013

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    Rule (CAIR), which was reinstated as binding legislation after the Cross- State Air Pollution Rule (CSAPR) 4 was vacated on August 21, 2012; updated handling of the...

  19. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    adjustments Brownfield vs. Greenfield Location and local air quality regulations 9 #12;Draft Seventh Plan

  20. Assumptions that imply quantum dynamics is linear

    E-Print Network [OSTI]

    Thomas F. Jordan

    2006-01-26T23:59:59.000Z

    A basic linearity of quantum dynamics, that density matrices are mapped linearly to density matrices, is proved very simply for a system that does not interact with anything else. It is assumed that at each time the physical quantities and states are described by the usual linear structures of quantum mechanics. Beyond that, the proof assumes only that the dynamics does not depend on anything outside the system but must allow the system to be described as part of a larger system. The basic linearity is linked with previously established results to complete a simple derivation of the linear Schrodinger equation. For this it is assumed that density matrices are mapped one-to-one onto density matrices. An alternative is to assume that pure states are mapped one-to-one onto pure states and that entropy does not decrease.

  1. Assumptions to the Annual Energy Outlook 2014

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"Click worksheet9,1,50022,3,,,,6,1,,781Title: Telephone:shortOil and Natural8U.S.NA NAOil

  2. Assumptions to the Annual Energy Outlook 2014

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"Click worksheet9,1,50022,3,,,,6,1,,781Title: Telephone:shortOil and Natural8U.S.NA NAOil

  3. Assumptions to the Annual Energy Outlook 2013

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    set using a discount rate of 10 percent. The model limits the annual builds to one two-train facility a year, with total annual export capacity of 400 billion cubic feet. The...

  4. Assumptions to the Annual Energy Outlook 2013

    Gasoline and Diesel Fuel Update (EIA)

    is set using a discount rate of 10 percent. The model limits the annual builds to one train a year. The region, showing the greatest positive economic potential is selected each...

  5. Appendix MASS: Performance Assessment Modeling Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes LaboratoryAntonyaAppeals4 STANDARD TERMSEIM

  6. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  7. Meats & Products Agricultural Inputs

    E-Print Network [OSTI]

    Collett Jr., Jeffrey L.

    Meats & Products Agricultural Inputs Processing Idaho B20 C C B Meats and Livestock Products Index to agriculture? Legend Overall weighted grade Weighted rank Northwest Midwest Southwest East Meats & ProductsProcessingessing Maine B11 B A A Meats & Products Agricultural Inputs Processing New York F49 F F F soductsoducts

  8. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Ryota Nakayama

    2013-11-19T23:59:59.000Z

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

  9. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  10. Key Collections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformationPostdocs & Graduates > TheFoxLeads DOE's E-gov

  11. Short-term Forecasting of Offshore Wind Farm Production Developments of the Anemos Project

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Short-term Forecasting of Offshore Wind Farm Production ­ Developments of the Anemos Project J.a.brownsword@rl.ac.uk 6 Overspeed GmBH & Co.KG, 26129 Oldenburg, Germany Email: h.p.waldl@overspeed.de Key words: Offshore to the large dimensions of offshore wind farms, their electricity production must be known well in advance

  12. Improving the Sustainability of Oak Woodland Forage and Productivity in San Diego County Through the

    E-Print Network [OSTI]

    Standiford, Richard B.

    -November 2, 1990, Davis, California. 2 Farm Advisor, University of California Cooperative Extension, San, a key element for obtaining high production on these range areas, requires high energy and fossil fuel inputs for its commercial production (Green 1978). Since the energy crisis of 1973, and the Middle East

  13. Study of the Enzymatic Hydrolysis of Cellulose for Production of Fuel Ethanol

    E-Print Network [OSTI]

    California at Riverside, University of

    Study of the Enzymatic Hydrolysis of Cellulose for Production of Fuel Ethanol by the Simultaneous to ethanol, a promising alternative fuel, can be carried out efficiently and economically using are presented in light of the impact of enzymatic hydrolysis on fuel ethanol production. Key words: enzymatic

  14. Experimental Study and Computational Simulations of Key Pebble Bed Thermo-mechanics Issues for Design and Safety

    SciTech Connect (OSTI)

    Tokuhiro, Akira; Potirniche, Gabriel; Cogliati, Joshua; Ougouag, Abderrafi

    2014-07-08T23:59:59.000Z

    An experimental and computational study, consisting of modeling and simulation (M&S), of key thermal-mechanical issues affecting the design and safety of pebble-bed (PB) reactors was conducted. The objective was to broaden understanding and experimentally validate thermal-mechanic phenomena of nuclear grade graphite, specifically, spheres in frictional contact as anticipated in the bed under reactor relevant pressures and temperatures. The contact generates graphite dust particulates that can subsequently be transported into the flowing gaseous coolent. Under postulated depressurization transients and with the potential for leaked fission products to be adsorbed onto graphite 'dust', there is the potential for fission products to escape from the primary volume. This is a design safety concern. Furthermore, earlier safety assessment identified the distinct possibility for the dispersed dust to combust in contact with air if sufficient conditions are met. Both of these phenomena were noted as important to design review and containing uncertainty to warrant study. The team designed and conducted two separate effects tests to study and benchmark the potential dust-generation rate, as well as study the conditions under which a dust explosion may occure in a standardized, instrumented explosion chamber.

  15. Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures

    E-Print Network [OSTI]

    Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

  16. Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management

    E-Print Network [OSTI]

    Foley, Simon

    Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

  17. Broadband marine MT exploration of the East Pacific Rise at 9500 Kerry Key and Steven Constable

    E-Print Network [OSTI]

    Key, Kerry

    Broadband marine MT exploration of the East Pacific Rise at 9°°500 N Kerry Key and Steven Constable., and S. Constable, Broadband marine MT exploration of the East Pacific Rise at 9°500 N, Geophys. Res

  18. Test Scanning Request Form Please complete one form for each test and key.

    E-Print Network [OSTI]

    Pantaleone, Jim

    Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

  19. Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,

    E-Print Network [OSTI]

    Lubell, Mark

    Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

  20. Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility

    Broader source: Energy.gov [DOE]

    WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

  1. HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped

    E-Print Network [OSTI]

    MacAdam, Keith

    HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

  2. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  3. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  4. Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Toyohiro Tsurumaru

    2012-05-17T23:59:59.000Z

    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

  5. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution

    E-Print Network [OSTI]

    Shapiro, Jeffrey H.

    The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

  6. A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey

    E-Print Network [OSTI]

    Utrecht, Universiteit

    A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

  7. A Comparison of Key PV Backsheet and Module Properties from Fielded...

    Broader source: Energy.gov (indexed) [DOE]

    of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions W. Gambogi 1 , O. Fu 2 , Y. Heta 3 , K. Hashimoto 3 , J. Kopchick 1...

  8. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  9. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  10. Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement

    E-Print Network [OSTI]

    Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

  11. Redox states of Desulfovibrio vulgaris DsrC, a key protein in...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Venceslau SS, JR Cort, ES Baker, RK Chu, EW Robinson, C Dahl, LM Saraiva, and IA Pereira.2013."Redox states of Desulfovibrio vulgaris DsrC, a key protein in dissimilatory...

  12. Tritium inventory control in ITER Charles Skinner with key contributions from

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

  13. Faculty & Information Centres Building Car Park Key Facilities Building Car Park

    E-Print Network [OSTI]

    10 ORANGE A PURPLE Navitas 2 ORANGE A ORANGE North Australian Centre for Oil and Gas 7 PINK B PURPLE7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car

  14. Demand Response in the U.S.- Key trends and federal facility participation

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

  15. Strangeness production in small and large collisions systems at RHIC

    E-Print Network [OSTI]

    Mark Heinz

    2006-04-13T23:59:59.000Z

    We present measurements of strange and multi-strange hadrons in p+p collisions at $\\sqrt{s}$= 200 GeV measured by STAR. We will compare these preliminary results to leading-order (LO) and next-to-leading order (NLO) perturbative QCD models widely believed to describe the production mechanisms. In particular we will point out recent changes of the model calculations which improve the agreement with our data significantly and will discuss the physics consequences. In larger collision systems, produced with heavy ions at RHIC, we observe the centrality dependence of strange and multi-strange particle production. The non-linear dependency between (anti)-hyperon yields and the system size \\Npart seems to indicate that the correlation volume does not scale exactly with \\Npart in contradiction to previous assumptions by thermal models.

  16. Heavy oil production from Alaska

    SciTech Connect (OSTI)

    Mahmood, S.M.; Olsen, D.K. [NIPER/BDM-Oklahoma, Inc., Bartlesville, OK (United States); Thomas, C.P. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1995-12-31T23:59:59.000Z

    North Slope of Alaska has an estimated 40 billion barrels of heavy oil and bitumen in the shallow formations of West Sak and Ugnu. Recovering this resource economically is a technical challenge for two reasons: (1) the geophysical environment is unique, and (2) the expected recovery is a low percentage of the oil in place. The optimum advanced recovery process is still undetermined. Thermal methods would be applicable if the risks of thawing the permafrost can be minimized and the enormous heat losses reduced. Use of enriched natural gas is a probable recovery process for West Sak. Nearby Prudhoe Bay field is using its huge natural gas resources for pressure maintenance and enriched gas improved oil recovery (IOR). Use of carbon dioxide is unlikely because of dynamic miscibility problems. Major concerns for any IOR include close well spacing and its impact on the environment, asphaltene precipitation, sand production, and fines migration, in addition to other more common production problems. Studies have indicated that recovering West Sak and Lower Ugnu heavy oil is technically feasible, but its development has not been economically viable so far. Remoteness from markets and harsh Arctic climate increase production costs relative to California heavy oil or Central/South American heavy crude delivered to the U.S. Gulf Coast. A positive change in any of the key economic factors could provide the impetus for future development. Cooperation between the federal government, state of Alaska, and industry on taxation, leasing, and permitting, and an aggressive support for development of technology to improve economics is needed for these heavy oil resources to be developed.

  17. Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production

    E-Print Network [OSTI]

    Narasayya, Vivek

    #12;Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward Zero Carbon Energy Production Toward

  18. Practical free-space quantum key distribution over 10 km in daylight and at night

    E-Print Network [OSTI]

    Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

    2002-06-14T23:59:59.000Z

    We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

  19. A study of an optimum filter for a random phase-shift keyed signal

    E-Print Network [OSTI]

    Barr, Frederick James

    1968-01-01T23:59:59.000Z

    59 62 77 BIBLIOGRAPHY 85 LIST OF FIGURES Figure Page 1. Phase-shift key modulation 2, The filter problem 3. Block diagram representation of a delay modulator 12 4. A conceptual delay modulator for a phase- shift keyed signal 5. Random... PSK signal from the corruption of white noise. The fact that the PSK signal is random necessitates the use of a statistical theory of linear systems which was originated by Norbert Wiener. 3 The statistical filter problem is illustrated in Figure...

  20. Robust design as a driver of engine cylinder heads evolution : a framework for identifying product improvement paths

    E-Print Network [OSTI]

    Gómez de la Mora, Luz de Lourdes

    2005-01-01T23:59:59.000Z

    The fundamental goal of Robust Design is to improve the quality of a product by minimizing the effects of variation. A key contributor to robustness over the long term is R&D. Therefore, a framework is desired to help ...

  1. PRODUCT REPRESENTATION IN LIGHTWEIGHT FORMATS FOR PRODUCT LIFECYCLE MANAGEMENT (PLM)

    E-Print Network [OSTI]

    Rzepa, Henry S.

    PRODUCT REPRESENTATION IN LIGHTWEIGHT FORMATS FOR PRODUCT LIFECYCLE MANAGEMENT (PLM) Lian Ding environments and the entire product lifecycle. There are new requirements for product representations, including: platform/application independence, support for the product lifecycle, rapidly sharing information

  2. Classifying forest productivity at different scales

    SciTech Connect (OSTI)

    Graham, R.L.

    1991-01-01T23:59:59.000Z

    Spatial scale is an important consideration when evaluating, using, or constructing forest productivity classifications. First, the factors which dominate spatial variability in forest productivity are scale dependent. For example, within a stand, spatial variability in productivity is dominated by microsite differences; within a national forest such as the Cherokee National Forest, spatial variability is dominated by topography and land-use history (e.g., years since harvest); within a large region such as the southeast, spatial variability is dominated by climatic patterns. Second, classifications developed at different spatial scales are often used for different purposes. For example, stand-level classifications are often keys or rules used in the field to judge the quality or potential of a site. National-forest classifications are often presented as maps or tables and may be used in forest land planning. Regional classifications may be maps or tables and may be used to quantify or predict resource availability. These scale-related differences in controlling factors and purposes will affect both the methods and the data used to develop classifications. In this paper, I will illustrate these points by describing and comparing three forest productivity classifications, each developed for a specific purpose at a specific scale. My objective is not to argue for or against any of these particular classifications but rather to heighten awareness of the critical role that spatial scale plays in the use and development of forest productivity classifications. 8 refs., 2 figs., 1 tab.

  3. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    Center for By-Products Utilization DRAFT REPORT CARBON DIOXIDE SEQUESTRATION IN CEMENTITIOUS-MILWAUKEE #12;CARBON DIOXIDE SEQUESTRATION IN CEMENTITIOUS PRODUCTS Progress Report by Tarun R. Naik, Rakesh of Carbon Dioxide Sequestration Technologies

  4. Productivity & Energy Flow

    E-Print Network [OSTI]

    Mitchell, Randall J.

    1 Productivity & Energy Flow Ecosystem approach, focuses: on flow of energy, water, and nutrients (capture) of energy by autotrophs Gross (total) Net (total ­ costs) Secondary productivity- capture of energy by herbivores http://sciencebitz.com/?page_id=204 What Controls the Primary Productivity

  5. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    combustion by-products #12;3 generated by using both conventional and clean-coal technologies. A clean-coal that obtained from clean-coal technology, are not utilized in cast-concrete masonry products (bricks, blocksCenter for By-Products Utilization RECENT ADVANCES IN RECYCLING CLEAN- COAL ASH By Tarun R. Naik

  6. Hydrogen Production CODES & STANDARDS

    E-Print Network [OSTI]

    Hydrogen Production DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES & STANDARDS for 2010 · Reduce the cost of distributed production of hydrogen from natural gas and/or liquid fuels to $1 SYSTEMS INTEGRATION / ANALYSES SAFETY EDUCATION RESEARCH & DEVELOPMENT Economy Pete Devlin #12;Hydrogen

  7. Strangeness Production at COSY

    E-Print Network [OSTI]

    Frank Hinterberger; Hartmut Machner; Regina Siudak

    2010-10-08T23:59:59.000Z

    The paper gives an overview of strangeness-production experiments at the Cooler Synchrotron COSY. Results on kaon-pair and phi meson production in pp, pd and dd collisions, hyperon-production experiments and Lambda p final-state interaction studies are presented.

  8. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    Center for By-Products Utilization USE OF CLEAN-COAL ASH FOR MANAGING ASR By Zichao Wu and Tarun R College of Engineering and Applied Science THE UNIVERSITY OF WISCONSIN­MILWAUKEE #12;USE OF CLEAN-COAL ASH combustion by-products (such as clean-coal ash) from power plants. Maximum recycling of such by- products

  9. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    Center for By-Products Utilization USE OF CLASS F FLY ASH AND CLEAN-COAL ASH BLENDS FOR CAST OF CLASS F FLYASHAND CLEAN-COAL ASHBLENDS FOR CAST CONCRETE PRODUCTS Authors: TarunR.Naik, Director, Center,Illinois Clean Coal Institute RudolphN.Kraus, Research Associate, UWM Center forBy-Products Utilization Shiw S

  10. Product Designation Process

    Broader source: Energy.gov [DOE]

    The process for designating products was developed to maximize energy savings within Federal agencies, which are required by law to purchase products designated by the Federal Energy Management Program (FEMP) or qualified by ENERGY STAR. Products that meet FEMP-designated efficiency requirements are in the upper 25% of their class in energy efficiency.

  11. Covered Product Categories

    Broader source: Energy.gov [DOE]

    Federal agencies are required by law to purchase products that are designated by the Federal Energy Management Program (FEMP-designated) or qualified by ENERGY STAR. Choose a product category for information about purchasing, installing, and using energy-efficient products.

  12. MECO Production Target Developments

    E-Print Network [OSTI]

    McDonald, Kirk

    be reoptimized Tungsten target Simulations of design parameters with GEANT3 indicate that both production targetMECO Production Target Developments James L. Popp University of California, Irvine NuFact'03 Columbia, June, 2003 #12;June, 2003J.L.Popp, UCI MECO Production Target 2 MECO Collaboration Institute

  13. GASCAP: Wellhead Gas Productive Capacity Model documentation, June 1993

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    The Wellhead Gas Productive Capacity Model (GASCAP) has been developed by EIA to provide a historical analysis of the monthly productive capacity of natural gas at the wellhead and a projection of monthly capacity for 2 years into the future. The impact of drilling, oil and gas price assumptions, and demand on gas productive capacity are examined. Both gas-well gas and oil-well gas are included. Oil-well gas productive capacity is estimated separately and then combined with the gas-well gas productive capacity. This documentation report provides a general overview of the GASCAP Model, describes the underlying data base, provides technical descriptions of the component models, diagrams the system and subsystem flow, describes the equations, and provides definitions and sources of all variables used in the system. This documentation report is provided to enable users of EIA projections generated by GASCAP to understand the underlying procedures used and to replicate the models and solutions. This report should be of particular interest to those in the Congress, Federal and State agencies, industry, and the academic community, who are concerned with the future availability of natural gas.

  14. Spent Nuclear Fuel (SNF) Project Product Specification

    SciTech Connect (OSTI)

    PAJUNEN, A.L.

    2000-12-07T23:59:59.000Z

    The process for removal of Spent Nuclear Fuel (SNF) from the K Basins has been divided into major sub-systems. The Fuel Retrieval System (FRS) removes fuel from the existing storage canisters, cleans it, and places it into baskets. The multi-canister overpack (MCO) loading system places the baskets into an MCO that has been pre-loaded in a cask. The cask, containing a loaded MCO, is then transferred to the Cold Vacuum Drying (CVD) Facility. After drying at the CVD Facility, the cask, and MCO, are transferred to the Canister Storage Building (CSB), where the MCO is removed from the cask, staged, inspected, sealed (by welding), and stored until a suitable permanent disposal option is implemented. The purpose of this document is to specify the process related characteristics of an MCO at the interface between major process systems. The characteristics are derived from the primary technical documents that form the basis for safety analysis and design calculations. This document translates the calculation assumptions into implementation requirements and describes the method of verifying that the requirement is achieved. These requirements are used to define validation test requirements and describe requirements that influence multiple sub-project safety analysis reports. This product specification establishes limits and controls for each significant process parameter at interfaces between major sub-systems that potentially affect the overall safety and/or quality of the SNF packaged for processing, transport, and interim dry storage. The product specifications in this document cover the SNF packaged in MCOs to be transported throughout the SNF Project. The description of the product specifications are organized in the document as follows: Section 2.0--Summary listing of product specifications at each major sub-system interface. Section 3.0--Summary description providing guidance as to how specifications are complied with by equipment design or processing within a major sub-system. Section 4.0--Specific technical basis description for each product specification. The scope of this product specification does not include data collection requirements to support accountability or environmental compliance activities.

  15. Weaknesses in the Key Scheduling Algorithm of Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2

    E-Print Network [OSTI]

    Sirer, Emin Gun

    Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2 1 and previous results about its security. In Section 3 we consider a slightly mod- i ed variant of the Key

  16. Building Chairs & Alternates by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact

    E-Print Network [OSTI]

    Saldin, Dilano

    by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact Hefter Conference Tom Bjornstad Hefter

  17. Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications

    E-Print Network [OSTI]

    Rambaut, Andrew

    : Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

  18. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  19. Thermodynamic limits to the quality of UCG product gas

    SciTech Connect (OSTI)

    Creighton, J.

    1982-08-03T23:59:59.000Z

    The goal of this work was to find the limits placed on the quality of UCG product gas by the energy and mass balances, including atom balances. If the outlet gas contains no O/sub 2/, there are only two independent variables. If these are chosen to be the mass fractions, X/sub CO/ and X/sub H/sub 2//, both the temperature of the outlet gas and the heat of combustion available by burning it are functions of these two variables only. The lines of constant temperature are parallel to the lines of constant heat of combustion, so it is clear that the available energy is partitioned between the sensible heat and the heat of combustion of the gas. The maximum heat available is set by the amount of oxygen in the inlet mixture; because the outlet temperature must exceed the minimum coal-surface temperature for burning, only heat losses within the system will generally reduce the heat of combustion. The maximum mass fractions of H/sub 2/ and CO in the product gas are limited by the impossibility of negative mass fractions of H/sub 2/O and CO/sub 2/. Additional limitations are imposed by the assumption of a minimum temperature. One of the two independent variables can be eliminated if the assumption of thermochemical equilibrium is valid. The product composition then lies on a single line in a phase plane of X/sub H/sub 2// vs X/sub CO/, and at a given outlet temperature the composition is fixed. Unfortunately, it appears that experimental values of X/sub H/sub 2// lie well above the equilibrium curve. Experimental data do indicate, however, that the system tends to operate near the minimum temperature to sustain the steam/char reaction on the coal surface, thus maximizing the heat of combustion of the outlet gas.

  20. The Microbase Value-Added Product: A Baseline Retrieval of Cloud Microphysical Properties

    SciTech Connect (OSTI)

    Dunn, M; Johnson, K; Jensen, M

    2011-05-31T23:59:59.000Z

    This report describes the Atmospheric Radiation Measurement (ARM) Climate Research Facility baseline cloud microphysical properties (MICROBASE) value-added product (VAP). MICROBASE uses a combination of millimeter-wavelength cloud radar, microwave radiometer, and radiosonde observations to estimate the vertical profiles of the primary microphysical parameters of clouds including the liquid/ice water content and liquid/ice cloud particle effective radius. MICROBASE is a baseline algorithm designed to apply to most conditions and locations using a single set of parameterizations and a simple determination of water phase based on temperature. This document provides the user of this product with guidelines to assist in determining the accuracy of the product under certain conditions. Quality control flags are designed to identify outliers and indicate instances where the retrieval assumptions may not be met. The overall methodology is described in this report through a detailed description of the input variables, algorithms, and output products.

  1. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  2. Optimum design for BB84 quantum key distribution in tree-type passive optical networks

    E-Print Network [OSTI]

    Jose Capmany; Carlos R. Fernandez-Pousa

    2011-03-24T23:59:59.000Z

    We show that there is a tradeoff between the useful key distribution bit rate and the total length of deployed fiber in tree-type passive optical networks for BB84 quantum key distribution applications. A two stage splitting architecture where one splitting is carried in the central office and a second in the outside plant and figure of merit to account for the tradeoff are proposed. We find that there is an optimum solution for the splitting ratios of both stages in the case of Photon Number Splitting (PNS) attacks and Decoy State transmission. We then analyze the effects of the different relevant physical parameters of the PON on the optimum solution.

  3. A 24 km fiber-based discretely signaled continuous variable quantum key distribution system

    E-Print Network [OSTI]

    Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

    2009-10-06T23:59:59.000Z

    We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

  4. Chromidio: an interface for color tracking with key frames in Max and Nato

    E-Print Network [OSTI]

    Tucker, Amy Rebecca

    2002-01-01T23:59:59.000Z

    11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

  5. Product development practices that matter

    E-Print Network [OSTI]

    Gupta, Nisheeth

    2010-01-01T23:59:59.000Z

    Product Development consists of activities to transforms a market opportunity and technological innovation into successful products. Several waves of improvements in technological innovation and product development have ...

  6. Wood Products 201213 Student Handbook

    E-Print Network [OSTI]

    Boyer, Elizabeth W.

    Wood Products 201213 Student Handbook Ecosystem Science and Management College ........................................................................................................................... 2 Wood Products Undergraduate Program ...................................................................................................................................................... 3 Careers for Wood Products Majors

  7. Advanced Multi-Product Coal Utilization By-Product Processing Plant

    SciTech Connect (OSTI)

    Andrew Jackura; John Groppo; Thomas Robl

    2006-12-31T23:59:59.000Z

    The objective of the project is to build a multi-product ash beneficiation plant at Kentucky Utilities 2,200-MW Ghent Generating Station, located in Carroll County, Kentucky. This part of the study includes an investigation of the secondary classification characteristics of the ash feedstock excavated from the lower ash pond at Ghent Station. The market study for the products of the processing plant (Subtask 1.6), conducted by Cemex, is reported herein. The study incorporated simplifying assumptions and focused only on pozzolan and ultra fine fly ash (UFFA). It found that the market for pozzolan in the Ghent area was oversupplied, with resultant poor pricing structure. Reachable export markets for the Ghent pozzolan market were mostly locally served with the exception of Florida. It was concluded that a beneficiated material for that market may be at a long term disadvantage. The market for the UFFA was more complex as this material would compete with other beneficiated ash and potential metakaolin and silica fume as well. The study concluded that this market represented about 100,000 tons of sales per year and, although lucrative, represented a widely dispersed niche market.

  8. Relaxations for Production Planning Problems with Increasing By-products

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Relaxations for Production Planning Problems with Increasing By-products Srikrishna Sridhar, Jeff, James Leudtke SILO Seminars: Feb 1, 2012 #12;One slide summary Problem Description Production process involves desirable & undesirable products. Srikrishna Sridhar, Jeff Linderoth, James Leudtke SILO Seminars

  9. Multi-Period Production Capacity Planning for Integrated Product and Production System Design*

    E-Print Network [OSTI]

    Saitou, Kazuhiro "Kazu"

    Multi-Period Production Capacity Planning for Integrated Product and Production System Design* Emre.ac.uk kazu@umich.edu .Abstract ­ This paper presents a simulation-based method to aid multi-period production capacity planning by quantifying the trade-off between product quality and production cost. The product

  10. Testing two nuclear physics approximations used in the standard leaky box model for the spallogenic production of LiBeB

    E-Print Network [OSTI]

    J. P. Kneller; J. R. Phillips; T. P. Walker

    2003-02-05T23:59:59.000Z

    The spallative production rates of Lithium, Beryllium and Boron (LiBeB) are a necessary component in any calculation of the evolution of these nuclei in the Galaxy. Previous calculations of these rates relied on two assumptions relating to the nuclear physics aspects: the straight-ahead approximation that describes the distribution of fragment energies and the assumption that the major contributor to the production rate arises from single-step reactions between primary cosmic ray projectiles and interstellar medium targets. We examine both assumptions by using a semi-empirical description for the spall's energy distribution and by including the reactions that proceed via intermediary fragments. After relaxing the straight-ahead approximation we find the changes in the production rates and emerging fluxes are small and do not warrant rejection of this approximation. In contrast we discover that two-step reactions can alter the production rate considerably leading to noticeable increases in the efficiency of producing the LiBeB nuclei. Motivated by this result we introduce a cascade technique to compute the production rates exactly and find that the results differ only slightly from those of our two-step calculations. We thus conclude that terminating the reaction network at the two-step order is sufficiently accurate for current studies of spallation.

  11. The DOS 1 neutron dosimetry experiment at the HB-4-A key 7 surveillance site on the HFIR pressure vessel

    SciTech Connect (OSTI)

    Farrell, K.; Kam, F.B.; Baldwin, C.A. [and others

    1994-01-01T23:59:59.000Z

    A comprehensive neutron dosimetry experiment was made at one of the prime surveillance sites at the High Flux Isotope Reactor (HFIR) pressure vessel to aid radiation embrittlement studies of the vessel and to benchmark neutron transport calculations. The thermal neutron flux at the key 7, position 5 site was found, from measurements of radioactivation of four cobalt wires and four silver wires, to be 2.4 {times} 10{sup 12} n{center_dot}m{sup {minus}2}{center_dot}s{sup {minus}1}. The thermal flux derived from two helium accumulation monitors was 2.3 {times} 10{sup 12} n{center_dot}m{sup {minus}2}{center_dot}{sup {minus}1}. The thermal flux estimated by neutron transport calculations was 3.7 {times} 10{sup 12} n{center_dot}m{sup {minus}2}s{sup {minus}1}. The fast flux, >1 MeV, determined from two nickel activation wires, was 1.5 {times} 10{sup 12} n{center_dot}m{sup {minus}2}{center_dot}s{sup {minus}1}, in keeping with values obtained earlier from stainless steel surveillance monitors and with a computed value of 1.2 {times} 10{sup 13} n{center_dot}m{sup {minus}2}{center_dot}{sup {minus}1}. The fast fluxes given by two reaction-product-type monitors, neptunium-237 and beryllium, were 2.6 {times} 10{sup 13} n{center_dot}m{sup {minus}2}{center_dot}s {sup {minus}1} and 2.2 {times} 10{sup 13} n{center_dot}m{sup {minus}2}s{sup {minus}1}, respectively. Follow-up experiments indicate that these latter high values of fast flux are reproducible but are false; they are due to the creation of greater levels of reaction products by photonuclear events induced by an exceptionally high ratio of gamma flux to fast neutron flux at the vessel.

  12. LENNOX HEARTH PRODUCTS

    Broader source: Energy.gov (indexed) [DOE]

    LENNOX HEARTH PRODUCTS April 1, 2011 Mr. Daniel Cohen U.S. Department of Energy Assistant General Council for Legislation, Regulation and Energy Efficiency Office of the General...

  13. Furfuryl alcohol cellular product

    DOE Patents [OSTI]

    Sugama, T.; Kukacka, L.E.

    1982-05-26T23:59:59.000Z

    Self-extinguishing rigid foam products are formed by polymerization of furfuryl alcohol in the presence of a lightweight, particulate, filler, zinc chloride and selected catalysts.

  14. Sustainable hydrogen production

    SciTech Connect (OSTI)

    Block, D.L.; Linkous, C.; Muradov, N.

    1996-01-01T23:59:59.000Z

    This report describes the Sustainable Hydrogen Production research conducted at the Florida Solar Energy Center (FSEC) for the past year. The report presents the work done on the following four tasks: Task 1--production of hydrogen by photovoltaic-powered electrolysis; Task 2--solar photocatalytic hydrogen production from water using a dual-bed photosystem; Task 3--development of solid electrolytes for water electrolysis at intermediate temperatures; and Task 4--production of hydrogen by thermocatalytic cracking of natural gas. For each task, this report presents a summary, introduction/description of project, and results.

  15. Microsystem product development.

    SciTech Connect (OSTI)

    Polosky, Marc A.; Garcia, Ernest J.

    2006-04-01T23:59:59.000Z

    Over the last decade the successful design and fabrication of complex MEMS (MicroElectroMechanical Systems), optical circuits and ASICs have been demonstrated. Packaging and integration processes have lagged behind MEMS research but are rapidly maturing. As packaging processes evolve, a new challenge presents itself, microsystem product development. Product development entails the maturation of the design and all the processes needed to successfully produce a product. Elements such as tooling design, fixtures, gages, testers, inspection, work instructions, process planning, etc., are often overlooked as MEMS engineers concentrate on design, fabrication and packaging processes. Thorough, up-front planning of product development efforts is crucial to the success of any project.

  16. Biogas Production Technologies

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biogas Production Technologies Ruihong Zhang, Professor Biological and Agricultural Engineering University of California, Davis Email: rhzhang@ucdavis.edu Biogas and Fuel Cell...

  17. Unit II-1 Inner products 1 Inner product and

    E-Print Network [OSTI]

    Birkett, Stephen

    Unit II-1 Inner products 1 Unit II-1 Inner product and orthogonality Unit II-1 Inner products 2 Real inner product · V is a real vector space · for u,vV define a scalar satisfying: linear: symmetric: positive definite: · is called an inner product of u and v · V with an inner product defined is called

  18. Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County

    E-Print Network [OSTI]

    Kaster, Elizabeth

    2012-02-14T23:59:59.000Z

    With the outbreak of the 2009 pandemic influenza A (H1N1) comes the need to evaluate the preparedness level of government entities that had preparedness plans. This study looks at the preparedness level for pandemic influenza among key leaders...

  19. Key to images: [1] Model system: fission yeast [2] Cryo-EM structure

    E-Print Network [OSTI]

    Brierley, Andrew

    Key to images: [1] Model system: fission yeast [2] Cryo-EM structure of the MCM helicase [3 combing [8] Model system: Xenopus [9] Extreme environments [10] Model system: C.elegans. Background image of the evolution of the replication machinery highlighted. BSRC B306 Email: sam31@st-and.ac.uk 1 2 3 4 5 6 7 8 9 10

  20. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2

    E-Print Network [OSTI]

    Liu, Yunhao

    Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

  1. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2

    E-Print Network [OSTI]

    Liu, Yunhao

    - sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

  2. Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  3. Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  4. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  5. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14

    E-Print Network [OSTI]

    Dixon, Peter

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

  6. STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13

    E-Print Network [OSTI]

    Oakley, Jeremy

    STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

  7. Key factors governing uncertainty in the response to sunshade geoengineering from a comparison

    E-Print Network [OSTI]

    Robock, Alan

    Key factors governing uncertainty in the response to sunshade geoengineering from a comparison of solar geoengineering are central to evaluating whether such approaches may help to reduce the harmful impacts of global warming. In this study we compare the sunshade solar geoengineering response

  8. Capacity Development, Education & Training Integrated and sustained action is the key

    E-Print Network [OSTI]

    Capacity Development, Education & Training Integrated and sustained action is the key Thematic Background Paper January 2004 Author: John Christensen Global Network on Energy for Sustainable Development to sustainable energy development. The rapid development of individual RE technologies along with basic changes

  9. BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT

    E-Print Network [OSTI]

    BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-clés : développement durable

  10. TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1

    E-Print Network [OSTI]

    Kirkland, Laurel

    TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1 , L produces a strong spectral band contrast. This also gives varnish its shiny appearance. On Earth rock varnish may have a microbial origin [3]. Clays are transported from an external source and deposited

  11. A new key recovery attack on the ANSI retail MAC Chris J. Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

  12. Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic

    E-Print Network [OSTI]

    Lane, Chris

    Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

  13. Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups

    E-Print Network [OSTI]

    Manulis, Mark

    Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

  14. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    policies and business models to create self-sustaining markets for financing energy efficiency, renewable on leveraging resources through partnerships with businesses, academia, and other countries. Therefore.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  15. New species of Anthostomella on fynbos, with a key to the genus in South Africa

    E-Print Network [OSTI]

    New species of Anthostomella on fynbos, with a key to the genus in South Africa Seonju LEE, South Africa. E-mail : slee@maties.sun.ac.za Received 3 April 2002; accepted 18 November 2002. A study of saprobic fungi occurring on the fynbos of the Western Cape Province of South Africa yielded four unknown

  16. Differential-phase-shift quantum key distribution with segmented pulse trains

    SciTech Connect (OSTI)

    Kawahara, Hiroki; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

    2011-06-15T23:59:59.000Z

    We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.

  17. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key

    E-Print Network [OSTI]

    Myasnikov, Aleksey

    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

  18. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol

    E-Print Network [OSTI]

    Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2014-03-04T23:59:59.000Z

    We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

  19. Attack on Private Signature Keys of the OpenPGP format, PGPTM

    E-Print Network [OSTI]

    - 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

  20. Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions

    E-Print Network [OSTI]

    1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we meeting biological and programmatic performance objectives established within the Columbia Basin Fish implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following