National Library of Energy BETA

Sample records for key assumptions product

  1. Key Assumptions Policy Issues

    E-Print Network [OSTI]

    Supply Limitations 8 Withi h B l i8. Within-hour Balancing 9. Capacity and Energy Values for Wind · Independent Power Producers C t ti· Current assumptions · Winter: full availability ~ 3,200 MW · Summer: 1 t b it d d li d· Thermal: must be sited and licensed · Wind/solar: must be sited and licensed · EE

  2. COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1

    E-Print Network [OSTI]

    Pantaleone, Jim

    1 COMPARING ALASKA'S OIL PRODUCTION TAXES: INCENTIVES AND ASSUMPTIONS1 Matthew Berman In a recent analysis comparing the current oil production tax, More Alaska Production Act (MAPA, also known as SB 21 oil prices, production rates, and costs. He noted that comparative revenues are highly sensitive

  3. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  4. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  5. Preliminary Review of Models, Assumptions, and Key Data used in Performance Assessments and Composite Analysis at the Idaho National Laboratory

    SciTech Connect (OSTI)

    Arthur S. Rood; Swen O. Magnuson

    2009-07-01

    This document is in response to a request by Ming Zhu, DOE-EM to provide a preliminary review of existing models and data used in completed or soon to be completed Performance Assessments and Composite Analyses (PA/CA) documents, to identify codes, methodologies, main assumptions, and key data sets used.

  6. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    's power plan to include a forecast of electricity demand for the next 20 years. Demand, to a large extent, is....................................................................................................................................... 16 Forecast of Retail Electricity Prices................................................................................................................... 17 SUMMARY OF KEY FINDINGS Pacific Northwest population and energy costs are expected to increase

  7. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  8. Technical assumption for Mo-99 production in the MARIA reactor. Feasibility study

    SciTech Connect (OSTI)

    Jaroszewicz, J.; Pytel, K.; Dabkowski, L.; Krzysztoszek, G. [Institute of Atomic Energy, 05-400 Otwock-Swierk (Poland)

    2008-07-15

    The main objective of U-235 irradiation is to obtain the Tc-99m isotope which is widely used in the domain of medical diagnostics. The decisive factor determining its availability, despite its short life time, is a reaction of radioactive decay of Mo-99 into Tc- 99m. One of the possible sources of molybdenum can be achieved in course of the U-235 fission reaction. The paper presents activities and the calculations results obtained upon the feasibility study on irradiation of U-235 targets for production of molybdenum in the MARIA reactor. The activities including technical assumption were focused on performing calculation for modelling of the target and irradiation device as well as adequate equipment and tools for processing in reactor. It has been assumed that the basic component of fuel charge is an aluminium cladded plate with dimensions of 40x230x1.45 containing 4.7 g U-235. The presumed mode of the heat removal generated in the fuel charge of the reactor primary cooling circuit influences the construction of installation to be used for irradiation and the technological instrumentation. The outer channel construction for irradiation has to be identical as the standard fuel channel construction of the MARIA reactor. It enables to use the existing slab and reactor mounting sockets for the fastening of the molybdenum channel as well as the cooling water delivery system. The measurement of water temperature cooling a fuel charge and control of water flow rate in the channel can also be carried out be means of the standard instrumentation of the reactor. (author)

  9. Keys to Canola Production in South Texas 

    E-Print Network [OSTI]

    Livingston, Stephen; Bremer, John E.; Parker, Roy D.; Miller, Travis

    1995-11-22

    Canola is a term patented by the Canadian government. It refers to rapeseed (Brassica napus), which has specific chemical properties that lend themselves to the production of a high-quality cooking oil and an edible meal ...

  10. declaration assumption,

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A 0 A 0 (x) = 8a: a for all x 2 V A 0 (c) = pre-de#12;ned type schema in haskell, for all c 2 C 0 A 0 (constr) = 8 (type 1 ! : : : ! type n ! (tyconstr a 1 : : : am )); A 0 (bot;) or the computation fails because of a failing uni#12;cation problem. Let c 2 C [ V. #15; W(A + fc :: 8a 1

  11. Ethanol Production, Distribution, and Use: Discussions on Key Issues (Presentation)

    SciTech Connect (OSTI)

    Harrow, G.

    2008-05-14

    From production to the environment, presentation discusses issues surrounding ethanol as a transportation fuel.

  12. Keys To Profitable Cotton Production in the Rolling Plains. 

    E-Print Network [OSTI]

    Alexander, U.U.; Gass, Willis B.; Borring, Emory P. III; Fuchs, Thomas W.

    1983-01-01

    can be found in Supplement to MP-I059, Sug gestions for Weed Control with Chemicals in Cotton. Always consult product labels before applying herbi cides. Harvesting, Handling and Ginning Harvesting seed cotton is accomplished by mechan ical...

  13. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  14. Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass

    E-Print Network [OSTI]

    California at Riverside, University of

    Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass crisis' of the 1970s. Although biological conversion of cellulosic biomass to fuels and chemicals through classical mutagenesis and strain Biofuels (2011) 2(4), 421­450 Enzymatic hydrolysis of cellulosic biomass

  15. Projected refined product balances in key Latin American countries: A preliminary examination

    SciTech Connect (OSTI)

    NONE

    1996-06-01

    Over the years, the East-West Center (EWC) has developed considerable expertise in refinery modeling, especially in the area of forecasting product balances for countries, given planned capacity changes, changes in product demand, changes in crude slates, and changes in product specifications. This expertise has been applied on an ongoing basis to the major refiners in the Middle East and the Asia-Pacific region, along with the US West Coast as region in its own right. Refinery modeling in these three areas has been ongoing for nearly 15 years at the Center, and the tools and information sources are now well developed. To date, the EWC has not applied these tools to Latin America. Although research on Latin America has been an ongoing area of concern at the Center in recent years, the information gathered to date is still not of the level of detail nor quality available for other areas. The modeling efforts undertaken in this report are of a ``baseline`` nature, designed to outline the major issues, attempt a first cut at emerging product balances, and, above all, to elicit commentary from those directly involved in the oil industry in the key countries modeled. Our experience in other regions has shown that it takes a few years dialogue with refiners and government planner in individual countries to develop a reliable database, as well as the insights into operational constraints and practices that make accurate modeling possible. This report is no more than a first step down the road.

  16. Analysis of the Effects of Compositional and Configurational Assumptions on Product Costs for the Thermochemical Conversion of Lignocellulosic Biomass to Mixed Alcohols – FY 2007 Progress Report

    SciTech Connect (OSTI)

    Zhu, Yunhua; Gerber, Mark A.; Jones, Susanne B.; Stevens, Don J.

    2009-02-01

    The purpose of this study was to examine alternative biomass-to-ethanol conversion process assumptions and configuration options to determine their relative effects on overall process economics. A process-flow-sheet computer model was used to determine the heat and material balance for each configuration that was studied. The heat and material balance was then fed to a costing spreadsheet to determine the impact on the ethanol selling price. By examining a number of operational and configuration alternatives and comparing the results to the base flow sheet, alternatives having the greatest impact the performance and cost of the overall system were identified and used to make decisions on research priorities. This report, which was originally published in December 2008, has been revised primarily to correct information presented in Appendix B -- Base Case Flow Sheets and Model Results. The corrections to Appendix B include replacement of several pages in Table B.1 that duplicated previous pages of the table. Other changes were made in Appendix B to correct inconsistencies between stream labels presented in the tables and the stream labels in the figures.

  17. DRAFT, 8/2/07 List of Key Assumptions

    E-Print Network [OSTI]

    of waste, 35 lb for empty 30 gallon drum and 4 lb for lift webbing inside the shielded container) v. pass all DOT-7A tests (4 foot drop and stacking test expected to govern design) vi. will be filtered b waste stack) and it is all contact handled b. The shielded containers will be placed with CH waste

  18. The Production Tax Credit is Key to a Strong U.S. Wind Industry

    Broader source: Energy.gov [DOE]

    New report finds the production tax credit has been critical to the growth of the U.S. wind industry.

  19. KEYed user interface: Tools for expressive music production Farhan Mohamed, Sidney Fels

    E-Print Network [OSTI]

    British Columbia, University of

    Communications Technology Laboratory, Department of Electrical and Computer Engineering, 2356, Main Mall software from a piano controller by adding a momentary foot switch. The piano keyboard mappings provide is mostly due to the modern trend of composing with complex production functions in mind. Further

  20. Potential Benefits from Improved Energy Efficiency of KeyElectrical Products: The Case of India

    SciTech Connect (OSTI)

    McNeil, Michael; Iyer, Maithili; Meyers, Stephen; Letschert,Virginie; McMahon, James E.

    2005-12-20

    The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These products--refrigerators, room air conditioners, electric motors, and distribution transformers--are important targets for efficiency improvement in India and in other developing countries. India is an interesting subject of study because of it's size and rapid economic growth. Implementation of efficient technologies in India would save billions in energy costs, and avoid hundreds of megatons of greenhouse gas emissions. India also serves as an example of the kinds of improvement opportunities that could be pursued in other developing countries.

  1. Heap Assumptions on Demand Andreas Podelski1

    E-Print Network [OSTI]

    Wies, Thomas

    Heap Assumptions on Demand Andreas Podelski1 , Andrey Rybalchenko2 , and Thomas Wies1 1 University checker and shape analysis. The shape analysis pro- duces heap assumptions on demand to eliminate.e., it applies shape analysis on demand. The shape analysis produces a heap assumption, which is an assertion

  2. Preliminary Assumptions for Wind Technologies

    E-Print Network [OSTI]

    and incentives for renewable resources Federal Production Tax Credit (PTC) 2.3 cents/kWh over first 10 years of operation Investment Tax Credit (ITC) alternative 30% towards developer's income tax for qualifying solar, fuel cell and small wind (geothermal, CHP BETC ­ just Oregon (now expired) 5 #12

  3. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  4. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Definitions and Assumptions, October 2012 Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012 footprintsassumptionsdefinitions2012.pdf More...

  5. Counterexamples to commonly held Assumptions on

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    Counterexamples to commonly held Assumptions on Unit Commitment and Market Power Assessment NAPS and Decentralized Unit Commitment (PoolCo vs. PX) · Determination of Market Power revisiting the fundamental Information 1: PoolCo vs PX · Unit Commitment: Technological constraints (minimum up-time, starting costs

  6. Preliminary Assumptions for Natural Gas Peaking

    E-Print Network [OSTI]

    ; adjusted to 2012$, state construction cost index, vintage of cost estimate, scope of estimate to extent's Discussion Aeroderivative Gas Turbine Technology Proposed reference plant and assumptions Preliminary cost Robbins 2 #12;Peaking Power Plant Characteristics 6th Power Plan ($2006) Unit Size (MW) Capital Cost ($/k

  7. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  8. A new scenario framework for climate change research: The concept of Shared Climate Policy Assumptions

    SciTech Connect (OSTI)

    Kriegler, Elmar; Edmonds, James A.; Hallegatte, Stephane; Ebi, Kristie L.; Kram, Tom; Riahi, Keywan; Winkler, Harald; Van Vuuren, Detlef

    2014-04-01

    The paper presents the concept of shared climate policy assumptions as an important element of the new scenario framework. Shared climate policy assumptions capture key climate policy dimensions such as the type and scale of mitigation and adaptation measures. They are not specified in the socio-economic reference pathways, and therefore introduce an important third dimension to the scenario matrix architecture. Climate policy assumptions will have to be made in any climate policy scenario, and can have a significant impact on the scenario description. We conclude that a meaningful set of shared climate policy assumptions is useful for grouping individual climate policy analyses and facilitating their comparison. Shared climate policy assumptions should be designed to be policy relevant, and as a set to be broad enough to allow a comprehensive exploration of the climate change scenario space.

  9. Mechanistic prediction of fission-product release under normal and accident conditions: key uncertainties that need better resolution. [PWR; BWR

    SciTech Connect (OSTI)

    Rest, J.

    1983-09-01

    A theoretical model has been used for predicting the behavior of fission gas and volatile fission products (VFPs) in UO/sub 2/-base fuels during steady-state and transient conditions. This model represents an attempt to develop an efficient predictive capability for the full range of possible reactor operating conditions. Fission products released from the fuel are assumed to reach the fuel surface by successively diffusing (via atomic and gas-bubble mobility) from the grains to grain faces and then to the grain edges, where the fission products are released through a network of interconnected tunnels of fission-gas induced and fabricated porosity. The model provides for a multi-region calculation and uses only one size class to characterize a distribution of fission gas bubbles.

  10. SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II

    SciTech Connect (OSTI)

    Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

    2011-10-31

    Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

  11. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions to

  12. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions to00

  13. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions

  14. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions33

  15. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions3302

  16. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  17. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  18. Assumptions to the Annual Energy Outlook 2015

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.101 (Million Short Tons)U.S.Assumptions330247

  19. Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012

    Broader source: Energy.gov [DOE]

    Definitions of parameters and table of assumptions for the Manufacturing Energy and Carbon Footprint

  20. Developing a commercial production process for 500,000 targets per day: A key challenge for inertial fusion energy

    SciTech Connect (OSTI)

    Goodin, D.T.; Alexander, N.B.; Besenbruch, G.E.; Bozek, A.S.; Brown, L.C.; Flint, G.W.; Kilkenny, J.D.; McQuillan, B.W.; Nikroo, A.; Paguio, R.R.; Petzoldt, R.W.; Schroen, D.G.; Sheliak, J.D.; Vermillion, B.A. [General Atomics, P.O. Box 85608, San Diego, California 92186-5608 (United States); Carlson, L.C.; Goodman, P.; Maksaereekul, W.; Raffray, R.; Spalding, J.; Tillack, M.S. [University of California at San Diego, 9500 Gilman Drive, La Jolla, California 92023 (United States)] (and others)

    2006-05-15

    As is true for current-day commercial power plants, a reliable and economic fuel supply is essential for the viability of future Inertial Fusion Energy (IFE) [Energy From Inertial Fusion, edited by W. J. Hogan (International Atomic Energy Agency, Vienna, 1995)] power plants. While IFE power plants will utilize deuterium-tritium (DT) bred in-house as the fusion fuel, the 'target' is the vehicle by which the fuel is delivered to the reaction chamber. Thus the cost of the target becomes a critical issue in regard to fuel cost. Typically six targets per second, or about 500 000/day are required for a nominal 1000 MW(e) power plant. The electricity value within a typical target is about $3, allocating 10% for fuel cost gives only 30 cents per target as-delivered to the chamber center. Complicating this economic goal, the target supply has many significant technical challenge - fabricating the precision fuel-containing capsule, filling it with DT, cooling it to cryogenic temperatures, layering the DT into a uniform layer, characterizing the finished product, accelerating it to high velocity for injection into the chamber, and tracking the target to steer the driver beams to meet it with micron-precision at the chamber center.

  1. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  2. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  3. Production and screening of carbon products precursors from coal. Quarterly technical progress report and key personnel staffing report No. 6, April 1, 1996--June 30, 1996

    SciTech Connect (OSTI)

    NONE

    1996-07-01

    The main goal of this program is to demonstrate the utility of coal extracts from the West Virginia University (WVU) extraction process as suitable base raw materials for the carbon products encompassed by the Carbon Products Consortium (CPC) team. This quarterly report covers activities during the period from April 1, 1996 through June 30, 1996. The first year of the project ended in February, 1996; however, the WVU research effort has continued on a no-cost extension of the original contract. Samples have been supplied to CPC participants so they could conduct their portions of the project as contracted through ORNL. Progress reports are presented for the following tasks: project planning and administration; consortium administration and reporting; coal extraction; technical/economic evaluation of WVU extraction process; and technology transfer. Previous work has shown that the WVU coal extraction process coupled with hydrotreatment, does have the potential for producing suitable base raw materials for carbon products. Current effort, therefore, involved the screening and evaluation of extracts produced by the WVU Group and recommending appropriate materials for scaleup for subsequent evaluation by Consortium Team members. As part of this program, the activation of the coal extraction residues was investigated for the purpose of producing a useful active carbon. A further task, which was started towards the end of the program, was to fabricate a small graphite artifact using Coke derived from coal extract as the filler and the coal extract itself as a binder. The results of these studies are summarized in this report.

  4. Modeling of Energy Production Decisions: An Alaska Oil Case Study

    E-Print Network [OSTI]

    Leighty, Wayne

    2008-01-01

    like oil production requires some knowledge or assumptionlike oil production requires some knowledge or assumptionAlaska Oil Production We use the standard assumption that

  5. Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison to yield a construction of pseudorandom functions under the decisional k-Linear Assumption, for each k 1 In this paper, we generalize Naor and Reingold's construction of pseudorandom functions under the DDH Assumption

  6. Assumption-Commitment Support for CSP Model Checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AVoCS 2006 Assumption-Commitment Support for CSP Model Checking Nick Moffat1 Systems Assurance using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form-Guarantee, CSP, Model Checking, Compositional Reasoning 1 Introduction The principle of compositional program

  7. STUDENT FORM GENERAL RELEASE FORM & ASSUMPTION OF RISK

    E-Print Network [OSTI]

    Schaefer, Marcus

    STUDENT FORM GENERAL RELEASE FORM & ASSUMPTION OF RISK DePaul University School of Cinematic Arts I that while enrolling in the Course may be a requirement for achieving my degree in Cinematic Arts at De

  8. Computational soundness for standard assumptions of formal cryptography

    E-Print Network [OSTI]

    Herzog, Jonathan, 1975-

    2004-01-01

    This implementation is conceptually simple, and relies only on general assumptions. Specifically, it can be thought of as a 'self-referential' variation on a well-known encryption scheme. 4. Lastly, we show how the ...

  9. U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff

    Broader source: Energy.gov [DOE]

    U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

  10. Unconscious Biases and Assumptions: The Origins of Discrimination?

    E-Print Network [OSTI]

    Sheridan, Jennifer

    #12;Unconscious Biases and Assumptions: The Origins of Discrimination? #12;Outline Examples of subtle discrimination What is "unconscious bias" and do I have it? What to do? #12;Applications is causing these phenomena? Discrimination? Or... Unconscious Bias? #12;Mind-blindness Count

  11. Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automatatheoretic

    E-Print Network [OSTI]

    Emerson, E. Allen

    ­ current Programming General Terms: Verification, Model Checking, Temporal Logic, Abstraction AdditionalUtilizing Symmetry when Model Checking under Fairness Assumptions: An Automata­theoretic Approach E temporal logic model checking. In previous work it is shown how, using some basic notions of group theory

  12. Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M for obfuscation, and using tamper-proof hardware tokens to achieve general code obfuscation. Following this last on the security of this CRS. Keywords: Obfuscation, Stateless Tamper-Proof hardware, Universal Composability

  13. QPE: Using assumption-based truth maintenance for qualitative simulation

    E-Print Network [OSTI]

    Forbus, Kenneth D.

    writin g such programs. This paper identifies several abstractions for organizing ATMS-based problem a mechanism for making closed-world assumptions . We sketch the design of the Qualitative Process Engine, QPE simulation as a module in a larger task . All of these research directions require substantially more

  14. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  15. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  16. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  17. Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy 

    E-Print Network [OSTI]

    Richards, Lance Jonathan

    2005-11-01

    As workplace demands change, a need has developed for alternatives to traditional education. With advancements in electronic telecommunication technologies, distance education has become a viable alternative to traditional ...

  18. Bases, Assumptions, and Results of the Flowsheet Calculations for the Decision Phase Salt Disposition Alternatives

    SciTech Connect (OSTI)

    Dimenna, R.A.; Jacobs, R.A.; Taylor, G.A.; Durate, O.E.; Paul, P.K.; Elder, H.H.; Pike, J.A.; Fowler, J.R.; Rutland, P.L.; Gregory, M.V.; Smith III, F.G.; Hang, T.; Subosits, S.G.; Campbell, S.G.

    2001-03-26

    The High Level Waste (HLW) Salt Disposition Systems Engineering Team was formed on March 13, 1998, and chartered to identify options, evaluate alternatives, and recommend a selected alternative(s) for processing HLW salt to a permitted wasteform. This requirement arises because the existing In-Tank Precipitation process at the Savannah River Site, as currently configured, cannot simultaneously meet the HLW production and Authorization Basis safety requirements. This engineering study was performed in four phases. This document provides the technical bases, assumptions, and results of this engineering study.

  19. Assumption Parish, Louisiana: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex A SOpenAshley, Ohio: Energy-Resource |CarbonAssumption Parish,

  20. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  1. Testing the assumptions of linear prediction analysis in normal vowels

    E-Print Network [OSTI]

    Max Little; Patrick E. McSharry; Irene M. Moroz; Stephen J. Roberts

    2006-01-04

    This paper develops an improved surrogate data test to show experimental evidence, for all the simple vowels of US English, for both male and female speakers, that Gaussian linear prediction analysis, a ubiquitous technique in current speech technologies, cannot be used to extract all the dynamical structure of real speech time series. The test provides robust evidence undermining the validity of these linear techniques, supporting the assumptions of either dynamical nonlinearity and/or non-Gaussianity common to more recent, complex, efforts at dynamical modelling speech time series. However, an additional finding is that the classical assumptions cannot be ruled out entirely, and plausible evidence is given to explain the success of the linear Gaussian theory as a weak approximation to the true, nonlinear/non-Gaussian dynamics. This supports the use of appropriate hybrid linear/nonlinear/non-Gaussian modelling. With a calibrated calculation of statistic and particular choice of experimental protocol, some of the known systematic problems of the method of surrogate data testing are circumvented to obtain results to support the conclusions to a high level of significance.

  2. The contour method cutting assumption: error minimization and correction

    SciTech Connect (OSTI)

    Prime, Michael B; Kastengren, Alan L

    2010-01-01

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  3. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  4. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  5. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    SciTech Connect (OSTI)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  6. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  7. Keys to Profitable Blackberry Production in Texas. 

    E-Print Network [OSTI]

    Lipe, John A.

    1986-01-01

    Brazos Valley Research Associates (BVRA) performed a cultural resources survey at the site of a proposed 12-acre wetlands treatment plant and 1000 feet of pipeline in central Angelina County, Texas in March of 2007 for the ...

  8. Keys to Profitable Onion Production in Texas. 

    E-Print Network [OSTI]

    Longbrake, Tom; Hartz, Tim; Cotner, Sam; Roberts, Roland; Parsons, Jerry; Stockton, Austin; Cartwright, Bob; Amador, Jose

    1987-01-01

    ~sses to onions in transit and storage. These diseases usually can be prevented by maintaining low humidity, low temp erature and good ventilation with air circulation. Field sanitation and proper handling during ha~vest and storage are very important...

  9. Notes 01. The fundamental assumptions and equations of lubrication theory 

    E-Print Network [OSTI]

    San Andres, Luis

    2009-01-01

    Safety Data Sheet for further information. Note: This product is not controlled under Canadian WHMIS legislation. The Mobil logotype and the Pegasus design are trademarks of Exxon Mobil Corporation, or one of its subsidiaries. ExxonMobil Lubricants... & Specialties All products may not be available locally. For more information, contact your local sales office or visit www.exxonmobil.com. ExxonMobil is comprised of numerous affiliates and subsidiaries, many with names that include Esso, Mobil, or ExxonMobil...

  10. The Power of a Few Large Blocks: A credible assumption with incredible efficiency

    E-Print Network [OSTI]

    Foster, Dean P.

    i.i.d. assumption about the error structure, the two-sample t-statistic for oil was significantThe Power of a Few Large Blocks: A credible assumption with incredible efficiency Dongyu Lin and Dean P. Foster Abstract The most powerful assumption in data analysis is that of independence. Unfortu

  11. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  13. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  14. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  15. Production

    Broader source: Energy.gov [DOE]

    Algae production R&D focuses on exploring resource use and availability, algal biomass development and improvements, characterizing algal biomass components, and the ecology and engineering of cultivation systems.

  16. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  17. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  18. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  19. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Others Total Oil Refining by Product (1985-2010) AAGRMtce Mt Fuel Oil Kerosene Petroleum Other Products RefineryProduction by Product Shares Fuel Oil Kerosene Petroleum

  20. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    the electricity produced by a hydro power plant. IndigenousIndigenous Production - Hydro Power Indigenous Production -Indigenous Production - Hydro Power Indigenous Production -

  1. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    the electricity produced by a hydro power plant. IndigenousIndigenous Production - Hydro Power Indigenous Production -Indigenous Production - Hydro Power Indigenous Production -

  2. BEHAVIORAL ASSUMPTION-BASED PREDICTION FOR HIGH-LATENCY HIDING IN MOBILE GAMES

    E-Print Network [OSTI]

    Bidarra, Rafael

    Carpentier and Rafael Bidarra Computer Graphics and CAD/CAM Group Faculty of Electrical Engineering assumptions, designed to be suitable for racing titles. Although these assumptions limit the accuracy it possible to create a real-time multi-player race game using today's GPRS network. INTRODUCTION The widely

  3. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Others Total Oil Refining by Product (1985-2009) AAGR MtceProduction by Product Shares Diesel Oil Fuel Oil GasolineProducts Mt Petroleum Products Mt Crude Oil Mt Gasoline Mt

  4. The initial microstructure of oxide fuel pellets can play a key role in their performance. At low burnups, the transport of fission products has a strong dependence on oxygen content, grain size distribution, porosity

    E-Print Network [OSTI]

    The initial microstructure of oxide fuel pellets can play a key role in their performance. At low of which, in turn, depend on processing conditions. These microstructural features also affect fuel that detailed studies of the initial microstructure of the fuel, could give insights on the in

  5. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Others Total Total Crude Oil Production by Region (1985-North West Chinese Crude Oil Production by Regional SharesEnergy Production (Mtce) AAGR Coal Raw Crude Oil Primary

  6. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Growth of China's Total Primary Energy Production (TPE)by Fuel (Mtce) Primary Energy Production (Mtce) AAGR CoalGrowth of China's Total Primary Energy Production (Mtce)

  7. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    of China's Total Primary Energy Production by Source (1950-2010) AAGR EJ Primary Energy Production (Mtce) Coal OilOther Renewables Total Primary Energy Production by Source

  8. Moldy Assumptions

    E-Print Network [OSTI]

    Heully, Gustave Paul

    2012-01-01

    historian of architecture and technology had waded out tillspores tie architecture’s tectonics and technologies to theon architecture’s connection to philosophy, technology and

  9. The role of geologic assumptions in solving complex contaminant transport problems 

    E-Print Network [OSTI]

    Bustamante, Louis Sorola

    1995-01-01

    Commonly used ground-water flow and con t transport computer models often assume a homogeneous, isotropic medium. Most hydrogeological systems are very complex and violate the basic assumptions underlying these models. However, even complex...

  10. Washington International Renewable Energy Conference (WIREC) 2008 Pledges. Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, Bill; Bilello, Daniel E.; Cowlin, Shannon C.; Mann, Margaret; Wise, Alison

    2008-08-01

    This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions resulting from more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy.

  11. Justification of the Modeling Assumptions in the Intermediate Fidelity Models for Portable Power Generation

    E-Print Network [OSTI]

    . For drastically different approaches, e.g., homogeneous combustion [7, 8] this assumption may not be appropriate. 2.1.2 3d-CFD Duct-Reactor Simulation Here we examine the effect of averaging the heat conductivity

  12. CBE UFAD cost analysis tool: Life cycle cost model, issues and assumptions

    E-Print Network [OSTI]

    Webster, Tom; Benedek, Corinne; Bauman, Fred

    2008-01-01

    Building Maintenance and Repair Cost Reference. ” WhitestoneJ. Wallis and H. Lin. 2008. “CBE UFAD Cost Analysis Tool:UFAD First Cost Model, Issues and Assumptions. ” Center for

  13. WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    WVU Regional Research Institute grad assistant wins national award for throwing assumptions out the window Silicon Valley conjures images of leading edge technology. Las Vegas makes one think of gambling

  14. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  15. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  16. On Security Models and Compilers for Group Key Exchange Protocols (Full version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security Models and Compilers for Group Key Exchange Protocols (Full version) Emmanuel Bresson1-known generic solutions (compilers) for AKE- and MA-security of GKE pro- tocols proposed based compiler which provides AKE- and MA-security for any GKE protocol, under standard cryptographic assumptions

  17. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    South Korea Other Crude Oil Production by Region (1985-2010)West Chinese Crude Oil Production by Regional Shares EastHenan Other Total Crude Oil Production: 209 Mt China's Crude

  18. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    South Korea Other Crude Oil Production by Region (1985-2010)North West Chinese Crude Oil Production by Regional SharesHenan Other Total Crude Oil Production: 209 Mt China's Crude

  19. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Australia South Korea Other Crude Oil Production by Region (Central North West Chinese Crude Oil Production by RegionalSouth Central North West Crude Oil Producing Provinces in

  20. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    electricity produced by a nuclear power plant. Hydro showsIndigenous Production - Nuclear Power Recovery of EnergyIndigenous Production - Nuclear Power Recovery of Energy

  1. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    electricity produced by a nuclear power plant. Hydro showsIndigenous Production - Nuclear Power Recovery of EnergyIndigenous Production - Nuclear Power Recovery of Energy

  2. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    sequestered carbon in non-energy use petroleum products suchTotal Primary Energy Supply Liquid Petroleum Gas RefineryPrimary Energy Supply Refinery Gas Petroleum Other Products

  3. The Assumption of Class-Conditional Independence in Category Learning Jana Jarecki (jarecki@mpib-berlin.mpg.de)

    E-Print Network [OSTI]

    Nelson, Jonathan D.

    The Assumption of Class-Conditional Independence in Category Learning Jana Jarecki (jarecki Berlin, Germany Abstract This paper investigates the role of the assumption of class- conditional. Treating features as class- conditionally independent can in many situations substantially facilitate

  4. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  5. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  6. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  7. Sensitivity of Rooftop PV Projections in the SunShot Vision Study to Market Assumptions

    SciTech Connect (OSTI)

    Drury, E.; Denholm, P.; Margolis, R.

    2013-01-01

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The SolarDS model was used to simulate rooftop PV demand for this study, based on several PV market assumptions--future electricity rates, customer access to financing, and others--in addition to the SunShot PV price projections. This paper finds that modeled PV demand is highly sensitive to several non-price market assumptions, particularly PV financing parameters.

  8. User cost in oil production

    E-Print Network [OSTI]

    Adelman, Morris Albert

    1990-01-01

    The assumption of an initial fixed mineral stock is superfluous and wrong. User cost (resource rent) in mineral production is the present value of expected increases in development cost. It can be measured as the difference ...

  9. Water transfer in soil at low water content. Is the local equilibrium assumption still appropriate?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Water transfer in soil at low water content. Is the local equilibrium assumption still appropriate Montpellier, France Abstract The dynamics of water content in the superficial layers of soils is critical a retardation time and a decrease in phase change rate as the water content gets lower. Therefore, the objective

  10. Human lightness perception is guided by simple assumptions about reflectance and lighting

    E-Print Network [OSTI]

    Murray, Richard

    Human lightness perception is guided by simple assumptions about reflectance and lighting Richard F 0009, Toronto, Ontario, Canada, M3J 1P3 ABSTRACT Lightness constancy is the remarkable ability of human successful approaches to understanding lightness perception that have developed along independent paths

  11. RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS

    E-Print Network [OSTI]

    RETI Phase 1B Final Report Update NET SHORT RECALCULATION AND NEW PV ASSUMPTIONS With Revisions distributed photovoltaic (PV) installations in the Report is unclear and perhaps misleading. At the direction-generation is required. The CEC forecast assumed that 1,082 GWh will be self-generated by consumers from new PV

  12. Biennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions

    E-Print Network [OSTI]

    from the heat recovery steam generator powers an additional steam turbine, providing extra electricBiennial Assessment of the Fifth Power Plan Gas Turbine Power Plant Planning Assumptions October 17, 2006 Simple- and combined-cycle gas turbine power plants fuelled by natural gas are among the bulk

  13. Complete Knowledge Assumption Often you want to assume that your knowledge is complete.

    E-Print Network [OSTI]

    Valtorta, Marco

    Complete Knowledge Assumption Often you want to assume that your knowledge is complete. Example: assume that a database of what students are enrolled in a course is complete. The definite clause language is monotonic: adding clauses can't invalidate a previous conclusion. Under the complete knowledge

  14. External review of the thermal energy storage (TES) cogeneration study assumptions. Final report

    SciTech Connect (OSTI)

    Lai, B.Y.; Poirier, R.N.

    1996-08-01

    This report is to provide a detailed review of the basic assumptions made in the design, sizing, performance, and economic models used in the thermal energy storage (TES)/cogeneration feasibility studies conducted by Pacific Northwest Laboratory (PNL) staff. This report is the deliverable required under the contract.

  15. 1 Relaxing the Multivariate Normality Assumption in the Simulation 2 of Transportation System Dependencies

    E-Print Network [OSTI]

    Kockelman, Kara M.

    1 1 Relaxing the Multivariate Normality Assumption in the Simulation 2 of Transportation System network analysis literature is the3 use of the multivariate normal (MVN) distribution. While in certain to sample from these case-specific multivariate distributions in simulation studies (see, e.g.,14 Ghosh

  16. Requirements Engineering for Cross-organizational ERP Implementation: Undocumented Assumptions and Potential Mismatches

    E-Print Network [OSTI]

    Wieringa, Roel

    Requirements Engineering for Cross-organizational ERP Implementation: Undocumented Assumptions) for Enterprise Resource Planning (ERP) in a cross- organizational context is how to find a match between the ERP for analyzing coordination requirements in inter-organizational ERP projects from a coordination theory

  17. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  18. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    includes crude oil, natural gas liquids, refinery feedstock,Liquid Petroleum Gas Refinery Gas Mt Mt Petroleum Other Products Natural GasLiquid Petroleum Gas Total Primary Energy Supply Refinery Gas Petroleum Other Products Natural Gas

  19. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    includes crude oil, natural gas liquids, refinery feedstock,Liquid Petroleum Gas Total Primary Energy Supply Refinery Gas Other Petroleum Products Natural GasLiquid Petroleum Gas Total Primary Energy Supply Refinery Gas Other Petroleum Products Natural Gas

  20. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    production of primary energy. International Marine Bunkersmarine bunkers and trade. Growth of China's Total Primary Energyenergy supply equals to the total of indigenous production and imports, and minus exports and international marine

  1. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    production of primary energy. International Marine Bunkersmarine bunkers and trade. Growth of China's Total Primary Energyenergy supply equals to the total of indigenous production and imports, and minus exports and international marine

  2. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  3. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  4. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  5. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  6. Renewable Motor Fuel Production Capacity Under H.R.4

    Reports and Publications (EIA)

    2002-01-01

    This paper analyzes renewable motor fuel production capacity with the assumption that ethanol will be used to meet the renewable fuels standard.

  7. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  8. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  9. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  10. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    sequestered carbon in non-energy use petroleum products suchd) Mtce Liquid Petroleum Gas Total Primary Energy SupplyQuantity Liquid Petroleum Gas Total Primary Energy Supply

  11. Initial Type Assumption A0 A0(x) = a. a for all x V

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A0 A0(x) = a. a for all x V A0(c) = pre-defined type schema in haskell, for all c C0 A0(constr) = (type1 . . . typen (tyconstr a1 . . . am)), A0(bot) = a. a A0(isa fails because of a failing unification problem. Let c C V. · W( A + {c :: a1, . . . , an. }, c

  12. Initial Type Assumption A0 A0(x) = a. a for all x V

    E-Print Network [OSTI]

    Ábrahám, Erika

    Initial Type Assumption A0 A0(x) = a. a for all x V A0(c) = pre-defined type schema in haskell, for all c C0 A0(constr) = (type1 . . . typen (tyconstr a1 . . . am)), A0(bot) = a. a A0(if) = a. Bool a pair (, ) or the computation fails because of a failing unification problem. Let c C V. · W( A + {c

  13. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  14. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  15. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  16. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  17. An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    high expan- sion rate generators based on assumptions related to factoring [GR00,HSS93], we note). In return, we get a simpler generator where no hashing is necessary to extract the output (in contrastAn Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant

  18. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    Mtce) AAGR Coal Raw Crude Oil Primary Electricity NaturalFuel Shares * Coal Raw Crude Oil Primary Electricity NaturalOthers Others Total Total Crude Oil Production by Region (

  19. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    billion m 3 Total China Natural Gas Consumption: 126 billionTotal China Oil Consumption: 445 Mt Natural Gas ProductionNatural Gas Consumption (2010) United States Russia Iran China

  20. Key China Energy Statistics 2011

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    and derived fuels (coke, coke oven gas, and other cokingMt Briquettes Mt Coke Mt Coke Oven Gas Billion m 3 Other GasCoal Gas not Coke Other Total Oven Gas Coke Source Products

  1. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    and derived fuels (coke, coke oven gas, and other cokingMt Briquettes Mt Coke Mt Coke Oven Gas Billion m 3 Other GasCoal Gas not Coke Other Total Oven Gas Coke Source Products

  2. Key China Energy Statistics 2012

    E-Print Network [OSTI]

    Levine, Mark

    2013-01-01

    239 Mt World's Oil Consumption (2010) US China Japan IndiaKorea Canada Other Total World Oil Consumption: 4,028 MtTotal China Oil Consumption: 445 Mt Natural Gas Production

  3. Sixth Northwest Conservation and Electric Power Plan Chapter 4: Conservation Supply Assumptions

    E-Print Network [OSTI]

    ........................................................................................................................ 3 New Sources of Potential Savings.............................................. 22 SUMMARY OF KEY FINDINGS The Council defines conservation as improved energy efficiency. This means that less electricity is used to provide the same level of services. Conservation resources are measures

  4. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  5. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  6. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  7. BOLD noise assumptions in fMRI Alle Meije Wink1 and Jos B. T. M. Roerdink2,3

    E-Print Network [OSTI]

    Roerdink, Jos B.T.M.

    1 BOLD noise assumptions in fMRI Alle Meije Wink1 and Jos B. T. M. Roerdink2,3 1 Brain Mapping Unit-- This paper discusses the assumption of Gaussian noise in the blood oxygenation dependent (BOLD) contrast by reviewing differences between Rician and Gaussian noise. An analytic expression is derived for the null

  8. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  9. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  10. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  11. Assumptions and Expectations for Annual Energy Outlook 2015: Oil and Gas Working Group

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal4 Arizona - NaturalYear Jan FebProved3)/1Assumptions

  12. Assumptions and Expectations for Annual Energy Outlook 2015: Oil and Gas Working Group

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming963 1.969 1.979Coal4 Arizona - NaturalYear Jan FebProved3)/1Assumptions5:

  13. Key canopy traits drive forest productivity Peter B. Reich*

    E-Print Network [OSTI]

    Thomas, David D.

    -to-ecosystem scaling and its potential application to assessing terrestrial ecosystem metabolism. Important advances. Herein, presenting data for 128 cold temperate and boreal forests across a regional gradient of 600 km the metabolism of terrestrial ecosystems [1,3,8,9,11,19,21]. Such tools are critically needed, as challenges

  14. Keys To Profitable Cotton Production in the Coastal Bend. 

    E-Print Network [OSTI]

    Ashlock, Lanny; Metzer, Robert B.

    1979-01-01

    . If a thorough stalk destruction program is not carried out, benefits of the pest management program can be nul lified. Disease Control Treat seed with one of the following protectant fungicides: Table 1. Protectant fungicides for treating...

  15. Keys to Profitable Texas Sweet Potato Production, Storage and Marketing. 

    E-Print Network [OSTI]

    Roberts, Roland E.; Longbrake, Thomas D.; Cotner, Sam; Menges, Terry; McCraw, B. Dean; Paterson, Donald R.

    1979-01-01

    until the benefits are demonstrated conclu sively. Field Transplanting Set plants in the field only after the soil tempera ture at planting depth is 65? F. or higher and danger of frost is long past. A starter solution of soluble fertilizer, high... to determine this stage 'of growth. Sweet potatoes continue to grow until the vines are killed by frost. Frost will not harm the sweet potatoes unless the soil temperature in the area of the potatoes falls below 55? F., whereby the sweet potatoes be come...

  16. Single, Key Gene Discovery Could Streamline Production of Biofuels |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|inWestMay 13,DiscussofDepartmentManagementOEinstallation

  17. Key Board Products and Special Reports - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris

  18. Washington International Renewable Energy Conference 2008 Pledges: Methodology and Assumptions Summary

    SciTech Connect (OSTI)

    Babiuch, B.; Bilello, D. E.; Cowlin, S. C.; Mann, M.; Wise, A.

    2008-08-01

    The 2008 Washington International Renewable Energy Conference (WIREC) was held in Washington, D.C., from March 4-6, 2008, and involved nearly 9,000 people from 125 countries. The event brought together worldwide leaders in renewable energy (RE) from governments, international organizations, nongovernmental organizations, and the private sector to discuss the role that renewables can play in alleviating poverty, growing economies, and passing on a healthy planet to future generations. The conference concluded with more than 140 governments, international organizations, and private-sector representatives pledging to advance the uptake of renewable energy. The U.S. government authorized the National Renewable Energy Laboratory (NREL) to estimate the carbon dioxide (CO2) savings that would result from the pledges made at the 2008 conference. This report describes the methodology and assumptions used by NREL in quantifying the potential CO2 reductions derived from those pledges.

  19. CRITICAL ASSUMPTIONS IN THE F-TANK FARM CLOSURE OPERATIONAL DOCUMENTATION REGARDING WASTE TANK INTERNAL CONFIGURATIONS

    SciTech Connect (OSTI)

    Hommel, S.; Fountain, D.

    2012-03-28

    The intent of this document is to provide clarification of critical assumptions regarding the internal configurations of liquid waste tanks at operational closure, with respect to F-Tank Farm (FTF) closure documentation. For the purposes of this document, FTF closure documentation includes: (1) Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the FTF PA) (SRS-REG-2007-00002), (2) Basis for Section 3116 Determination for Closure of F-Tank Farm at the Savannah River Site (DOE/SRS-WD-2012-001), (3) Tier 1 Closure Plan for the F-Area Waste Tank Systems at the Savannah River Site (SRR-CWDA-2010-00147), (4) F-Tank Farm Tanks 18 and 19 DOE Manual 435.1-1 Tier 2 Closure Plan Savannah River Site (SRR-CWDA-2011-00015), (5) Industrial Wastewater Closure Module for the Liquid Waste Tanks 18 and 19 (SRRCWDA-2010-00003), and (6) Tank 18/Tank 19 Special Analysis for the Performance Assessment for the F-Tank Farm at the Savannah River Site (hereafter referred to as the Tank 18/Tank 19 Special Analysis) (SRR-CWDA-2010-00124). Note that the first three FTF closure documents listed apply to the entire FTF, whereas the last three FTF closure documents listed are specific to Tanks 18 and 19. These two waste tanks are expected to be the first two tanks to be grouted and operationally closed under the current suite of FTF closure documents and many of the assumptions and approaches that apply to these two tanks are also applicable to the other FTF waste tanks and operational closure processes.

  20. Technical considerations related to interim source-term assumptions for emergency planning and equipment qualification. [PWR; BWR

    SciTech Connect (OSTI)

    Niemczyk, S.J.; McDowell-Boyer, L.M.

    1982-09-01

    The source terms recommended in the current regulatory guidance for many considerations of light water reactor (LWR) accidents were developed a number of years ago when understandings of many of the phenomena pertinent to source term estimation were relatively primitive. The purpose of the work presented here was to develop more realistic source term assumptions which could be used for interim regulatory purposes for two specific considerations, namely, equipment qualification and emergency planning. The overall approach taken was to adopt assumptions and models previously proposed for various aspects of source term estimation and to modify those assumptions and models to reflect recently gained insights into, and data describing, the release and transport of radionuclides during and after LWR accidents. To obtain illustrative estimates of the magnitudes of the source terms, the results of previous calculations employing the adopted assumptions and models were utilized and were modified to account for the effects of the recent insights and data.

  1. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  2. Special relativity as the limit of an Aristotelian universal friction theory under Reye's assumption

    E-Print Network [OSTI]

    E. Minguzzi

    2014-11-28

    This work explores a classical mechanical theory under two further assumptions: (a) there is a universal dry friction force (Aristotelian mechanics), and (b) the variation of the mass of a body due to wear is proportional to the work done by the friction force on the body (Reye's hypothesis). It is shown that mass depends on velocity as in Special Relativity, and that the velocity is constant for a particular characteristic value. In the limit of vanishing friction the theory satisfies a relativity principle as bodies do not decelerate and, therefore, the absolute frame becomes unobservable. However, the limit theory is not Newtonian mechanics, with its Galilei group symmetry, but rather Special Relativity. This result suggests to regard Special Relativity as the limit of a theory presenting universal friction and exchange of mass-energy with a reservoir (vacuum). Thus, quite surprisingly, Special Relativity follows from the absolute space (ether) concept and could have been discovered following studies of Aristotelian mechanics and friction. We end the work confronting the full theory with observations. It predicts the Hubble law through tired light, and hence it is incompatible with supernova light curves unless both mechanisms of tired light (locally) and universe expansion (non-locally) are at work. It also nicely accounts for some challenging numerical coincidences involving phenomena under low acceleration.

  3. Estimating Alarm Thresholds for Process Monitoring Data under Different Assumptions about the Data Generating Mechanism

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Burr, Tom; Hamada, Michael S.; Howell, John; Skurikhin, Misha; Ticknor, Larry; Weaver, Brian

    2013-01-01

    Process monitoring (PM) for nuclear safeguards sometimes requires estimation of thresholds corresponding to small false alarm rates. Threshold estimation dates to the 1920s with the Shewhart control chart; however, because possible new roles for PM are being evaluated in nuclear safeguards, it is timely to consider modern model selection options in the context of threshold estimation. One of the possible new PM roles involves PM residuals, where a residual is defined as residual = data ? prediction. This paper reviews alarm threshold estimation, introduces model selection options, and considers a range of assumptions regarding the data-generating mechanism for PM residuals.more »Two PM examples from nuclear safeguards are included to motivate the need for alarm threshold estimation. The first example involves mixtures of probability distributions that arise in solution monitoring, which is a common type of PM. The second example involves periodic partial cleanout of in-process inventory, leading to challenging structure in the time series of PM residuals.« less

  4. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  5. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  6. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  7. What are the Starting Points? Evaluating Base-Year Assumptions in the Asian Modeling Exercise

    SciTech Connect (OSTI)

    Chaturvedi, Vaibhav; Waldhoff, Stephanie; Clarke, Leon E.; Fujimori, Shinichiro

    2012-12-01

    A common feature of model inter-comparison efforts is that the base year numbers for important parameters such as population and GDP can differ substantially across models. This paper explores the sources and implications of this variation in Asian countries across the models participating in the Asian Modeling Exercise (AME). Because the models do not all have a common base year, each team was required to provide data for 2005 for comparison purposes. This paper compares the year 2005 information for different models, noting the degree of variation in important parameters, including population, GDP, primary energy, electricity, and CO2 emissions. It then explores the difference in these key parameters across different sources of base-year information. The analysis confirms that the sources provide different values for many key parameters. This variation across data sources and additional reasons why models might provide different base-year numbers, including differences in regional definitions, differences in model base year, and differences in GDP transformation methodologies, are then discussed in the context of the AME scenarios. Finally, the paper explores the implications of base-year variation on long-term model results.

  8. Gene-Mating Dynamic Evolution Theory: fundamental assumptions, exactly solvable models and analytic solutions

    E-Print Network [OSTI]

    Juven Wang; Jiunn-Wei Chen

    2015-01-08

    Fundamental properties of macroscopic gene-mating dynamic evolutionary systems are investigated. A model is proposed to describe a large class of systems within population genetics. We focus on a single locus, arbitrary number alleles in a two-gender dioecious population. Our governing equations are time-dependent continuous differential equations labeled by a set of genotype frequencies. The full parameter space consists of all allowed genotype frequencies. Our equations are uniquely derived from four fundamental assumptions within any population: (1) a closed system; (2) average-and-random mating process (mean-field behavior); (3) Mendelian inheritance; (4) exponential growth and exponential death. Even though our equations are non-linear with time evolutionary dynamics, we have an exactly solvable model. Our findings are summarized from phenomenological and mathematical viewpoints. From the phenomenological viewpoint, any initial genotype frequency of a closed system will eventually approach a stable fixed point. Under time evolution, we show (1) the monotonic behavior of genotype frequencies, (2) any genotype or allele that appears in the population will never become extinct, (3) the Hardy-Weinberg law, and (4) the global stability without chaos in the parameter space. To demonstrate the experimental evidence, as an example, we show a mapping from the blood type genotype frequencies of world ethnic groups to our stable fixed-point solutions. From the mathematical viewpoint, the equilibrium solutions consist of a base manifold as a global stable attractor, attracting any initial point in a Euclidean fiber bundle to the fixed point where the fiber is attached. We can define the genetic distance of two populations as their geodesic distance on the equilibrium manifold. In addition, the modification of our theory under the process of natural selection and mutation is addressed.

  9. A method making fewer assumptions was recommended for estimating exposure–outcome associations in stratified case–cohort studies.

    E-Print Network [OSTI]

    Jones, Edmund; Sweeting, Michael J.; Sharp, Stephen J.; Thompson, Simon G.; EPIC-InterAct Consortium

    2015-04-29

    /plain; charset=UTF-8 ORIGINAL A A method making fewer assumptions s hen Con ary ridge chool amb 15; P on the full cohort can be expensive, for example if bio- different sampling fraction for selecting participants to be in the subcohort. For data from... Act. The subcohort selection for InterAct was34 participants, recruited from 1993 to 1999; this maller than the full EPIC-Europe cohort becauseshown to be very similar between one-stage and two- stage models [15]. The assumptions each model makes about the exposure...

  10. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  11. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  12. Abstract--In the context of the ongoing deregulation of the electricity industry, we revisit the commonly held assumption that,

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    the commonly held assumption that, under the condition of perfect information, a decentralized unit commitment of consecutive hours. Index Terms-- Centralized unit commitment, Decentralized unit commitment, Market power, a centralized unit commitment can be economically more efficient than a decentralized unit commitment

  13. A Project Report on NP: an Assumption.based NL Plan Inference System that uses Feature Structures

    E-Print Network [OSTI]

    A Project Report on NP: an Assumption.based NL Plan Inference System that uses Feature Structures-cho,Soraku-gun, Kyoto 619-02, Japan myers@atr-la.atr.co.jp Abstract This paper presents a project report on NP

  14. Green Enterprise Computing Data: Assumptions and Realities Maria Kazandjieva, Brandon Heller, Omprakash Gnawali , Philip Levis, and Christos Kozyrakis

    E-Print Network [OSTI]

    Pratt, Vaughan

    the individual datapoint relates to the full building energy use. The green computing research community canGreen Enterprise Computing Data: Assumptions and Realities Maria Kazandjieva, Brandon Heller, brandonh, pal, christos@cs.stanford.edu, gnawali@cs.uh.edu ABSTRACT Until now, green computing research

  15. Quasi-Newton inversion of seismic first arrivals using source finite1 bandwidth assumption: application to landslides characterization2

    E-Print Network [OSTI]

    Boyer, Edmond

    , Samyn et al. (2011) used a 3D seismic refraction traveltime52 tomography to provide a valuable-00749309,version1-7Nov2012 #12;recommended for all case studies. Seismic refraction can be basicallyQuasi-Newton inversion of seismic first arrivals using source finite1 bandwidth assumption

  16. READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management

    E-Print Network [OSTI]

    Cina, Jeff

    READ AND SIGN THE PARTIAL ASSUMPTION OF RISK ON REVERSE Risk Management 12/2012 Risk Management Conditions of Volunteer Service Please send completed form to the Office of Risk Management: riskmanagement ___________________________________________ (name/title of department supervisor) and the Office of Risk Management, (541) 346-8316, within 24 hours

  17. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  18. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  19. Hydrogen Production Roadmap: Technology Pathways to the Future, January 2009

    Fuel Cell Technologies Publication and Product Library (EERE)

    Roadmap to identify key challenges and priority R&D needs associated with various hydrogen fuel production technologies.

  20. Hydrogen Production Roadmap. Technology Pathways to the Future, January 2009

    SciTech Connect (OSTI)

    Curry-Nkansah, Maria; Driscoll, Daniel; Farmer, Richard; Garland, Roxanne; Gruber, Jill; Gupta, Nikunj; Hershkowitz, Frank; Holladay, Jamelyn; Nguyen, Kevin; Schlasner, Steven; Steward, Darlene; Penev, Michael

    2009-01-01

    Roadmap to identify key challenges and priority R&D needs associated with various hydrogen fuel production technologies.

  1. Radiogenic Source Identification for the Helium Production-Diffusion ...

    E-Print Network [OSTI]

    2012-10-17

    Oct 18, 2012 ... Key words: Inverse source problem, production-diffusion equation, Tikhonov regularization. 1 Introduction. Helium isotopes are used ...

  2. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  3. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  4. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  5. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  6. Analyzing Natural Gas Based Hydrogen Infrastructure - Optimizing Transitions from Distributed to Centralized H2 Production

    E-Print Network [OSTI]

    Yang, Christopher; Ogden, Joan M

    2005-01-01

    focus is on modeling of hydrogen production and distributionto centralized hydrogen production. One key question thatCalifornia, Davis Hydrogen Production via Natural Gas Steam

  7. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  8. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  9. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  10. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  11. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  12. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  13. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  14. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  15. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  16. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  17. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  18. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  19. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  20. New developments in product-line optimization

    E-Print Network [OSTI]

    Hauser, John R.

    Product development is key to profitability. Without well-designed products that meet the needs of customers at a reasonable cost, the firm has no sales. And without sales, the firm has no profit. But designing profitable ...

  1. Large Engineering Systems Conference on Power Engineering, July 2004, Halifax Canada. IEEE 2004 1 Abstract--One important assumption in a model of an

    E-Print Network [OSTI]

    the impacts of bid format and profit calculation on market outcomes in different scenarios. Index Terms-- Power system economics, Pricing, Market design I. INTRODUCTION ne of the first assumptions in a model Abstract--One important assumption in a model of an electricity market is the format of bids and costs

  2. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  3. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  4. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  5. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  6. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  7. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  8. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  9. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  10. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  11. Reversibility of Soil Productivity Decline with Organic Matter

    E-Print Network [OSTI]

    Lehmann, Johannes

    of stable organic matter (biochar and sawdust) to improve productivity by enhancing SOC. Maize productivity, biochar), whereas productivity was 8, 15, and 39% greater (P both nutrient delivery (with green manure) and improvement of SOC (with biochar). Key words

  12. Business & Finance BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Operations Manager, Production Manager, Quality Control, Logistics Manager, Business Interpreter, Marketing, Operations Management, Commercial Law and Human Resource Management. Finance subjects include Finance Theory or public administration. Operating in international markets requires an understanding of international

  13. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  14. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  15. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  16. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  17. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  18. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  19. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  20. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  1. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  2. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  3. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  4. Keyed Side-Channel Based Hashing for IP Protection using Wavelets

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    signal feature extraction method, the wavelet transform, to form a keyed side-channel hash function industry, however, has virtually no opportunity to confirm a suspected plagiarism. Products on the market devices emit physically observ- able quantities, for instance the power consumption, electromagnetic

  5. NREL builds community and industry support by addressing concerns voiced by key standards organizations.

    E-Print Network [OSTI]

    NREL builds community and industry support by addressing concerns voiced by key standards standards developed through consensus processes. Because U.S. PV module safety stan- dards are not aligned with international standards, manufacturers must test their modules twice--and sometimes maintain separate product

  6. Sensitivity of Utility-Scale Solar Deployment Projections in the SunShot Vision Study to Market and Performance Assumptions

    SciTech Connect (OSTI)

    Eurek, K.; Denholm, P.; Margolis, R.; Mowers, M.

    2013-04-01

    The SunShot Vision Study explored the potential growth of solar markets if solar prices decreased by about 75% from 2010 to 2020. The ReEDS model was used to simulate utility PV and CSP deployment for this present study, based on several market and performance assumptions - electricity demand, natural gas prices, coal retirements, cost and performance of non-solar renewable technologies, PV resource variability, distributed PV deployment, and solar market supply growth - in addition to the SunShot solar price projections. This study finds that utility-scale solar deployment is highly sensitive to solar prices. Other factors can have significant impacts, particularly electricity demand and natural gas prices.

  7. Distributed Key Generation for Secure Encrypted Deduplication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , China duan@rd.netease.com Abstract. Large-scale storage systems often attempt to achieve two seemingly Deduplication is a very important technique that many storage systems use to reduce cost. It exploits- plication has seen wide-spread use and been built into many production cloud storage systems such as Dropbox

  8. Sierra Geothermal's Key Find in Southern Nevada

    Office of Energy Efficiency and Renewable Energy (EERE)

    In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147 degrees Celsius (297 degrees Fahrenheit). A promising discovery by a geothermal energy company that could boost use of the renewable source in southwest Nevada, power thousands of homes and create jobs.

  9. Recent developments in heavy flavour production

    E-Print Network [OSTI]

    G. Kramer

    2007-07-12

    We review one-particle inclusive production of heavy-flavoured hadrons in a framework which resums the large collinear logarithms through the evolution of the FFs and PDFs and retains the full dependence on the heavy-quark mass without additional theoretical assumptions. We focus on presenting results for the inclusive cross section for the production of charmed mesons in p anti-p collisions and the comparison with CDF data from the Tevatron as well as on inclusive B-meson production and comparison with recent CDF data. The third topic is the production of D^* mesons in photoproduction and comparison with recent H1 data from HERA.

  10. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  11. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  12. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  13. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  14. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  15. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  16. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  17. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  18. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  19. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  20. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  1. Outcome 4. The graduates will have the ability to use techniques, skills and modern petroleum & natural gas engineering tools. The assessment is performed with respect to the key abilities that the students are expected to acquire in specific courses that

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    & natural gas engineering tools. The assessment is performed with respect to the key abilities. Utilize various software for solving production engineering problems PNGE 332 Gas-liquid equilibrium

  2. The Utility Relationship to its Key Industries 

    E-Print Network [OSTI]

    Gilbert, J. S.

    1986-01-01

    then thpy promised never, ever to build another powerplant. Wi th that as a backdrop, let's takt' a closer look at the industrial-util ity relatiunship, 1 t is no di fffll'(,nt from any athel' relationship. Both parties must be honeR t and open... resistance heat against gas where it doesn't belong. Now let's get on the positive side of the picture. Utilities should indicate it pro-industrial posture. Start with your own employees. no they patronize their business. Do they buy their products...

  3. Residential applliance data, assumptions and methodology for end-use forecasting with EPRI-REEPS 2.1

    SciTech Connect (OSTI)

    Hwang, R.J,; Johnson, F.X.; Brown, R.E.; Hanford, J.W.; Kommey, J.G.

    1994-05-01

    This report details the data, assumptions and methodology for end-use forecasting of appliance energy use in the US residential sector. Our analysis uses the modeling framework provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which was developed by the Electric Power Research Institute. In this modeling framework, appliances include essentially all residential end-uses other than space conditioning end-uses. We have defined a distinct appliance model for each end-use based on a common modeling framework provided in the REEPS software. This report details our development of the following appliance models: refrigerator, freezer, dryer, water heater, clothes washer, dishwasher, lighting, cooking and miscellaneous. Taken together, appliances account for approximately 70% of electricity consumption and 30% of natural gas consumption in the US residential sector. Appliances are thus important to those residential sector policies or programs aimed at improving the efficiency of electricity and natural gas consumption. This report is primarily methodological in nature, taking the reader through the entire process of developing the baseline for residential appliance end-uses. Analysis steps documented in this report include: gathering technology and market data for each appliance end-use and specific technologies within those end-uses, developing cost data for the various technologies, and specifying decision models to forecast future purchase decisions by households. Our implementation of the REEPS 2.1 modeling framework draws on the extensive technology, cost and market data assembled by LBL for the purpose of analyzing federal energy conservation standards. The resulting residential appliance forecasting model offers a flexible and accurate tool for analyzing the effect of policies at the national level.

  4. Optimal Model-Based Production Planning for

    E-Print Network [OSTI]

    Grossmann, Ignacio E.

    Motivation Refining Operation and crude cost variable cost of production Largest product price components Key to refinery profit and economics Refinery production planning models Operation optimization Crude selection Statement Cat Ref Hydrotreatment Gasoline blending Distillate blending Gas oil blending Cat Crack CDU crude1

  5. Pottery Production

    E-Print Network [OSTI]

    Nicholson, Paul T.

    2009-01-01

    Paul T. Nicholson. ) Pottery Production, Nicholson, UEE 2009Short Citation: Nicholson 2009, Pottery Production. UEE.Paul T. , 2009, Pottery Production. In Willeke Wendrich (

  6. Cordage Production

    E-Print Network [OSTI]

    Veldmeijer, André J.

    2009-01-01

    294: fig. 15-3). Cordage Production, Veldmeijer, UEE 2009Short Citation: Veldmeijer, 2009, Cordage Production. UEE.André J. , 2009, Cordage Production. In Willeke Wendrich (

  7. Glass Production

    E-Print Network [OSTI]

    Shortland, Andrew

    2009-01-01

    40, pp. 162 - 186. Glass Production, Shortland, UEE 2009AINES Short Citation: Shortland 2009, Glass Production. UEE.Andrew, 2009, Glass Production. In Willeke Wendrich (ed. ),

  8. Strategies for planning and long-term scheduling for PPG glass production

    E-Print Network [OSTI]

    Grossmann, Ignacio E.

    is produced x waste product produced during changeovers is recycled #12;EWO meeting - p. 4 Project complexity - Detailed model 2 - Include cullet storage, recycling, and sales on the scheduling and planning Optimize Model assumptions x Rigorous aggregation of the products Inventory: all products are considered

  9. Plant and microbial research seeks biofuel production from lignocellulose

    E-Print Network [OSTI]

    Bartley, Laura E; Ronald, Pamela C

    2009-01-01

    sugar yields for biofuel production. Nat Biotechnol 25(7):Plant and microbial research seeks biofuel production fromA key strategy for biofuel produc- tion is making use of the

  10. Women: the key to successful development policies for subsistence agriculture in sub-Saharan Africa 

    E-Print Network [OSTI]

    Ryan, Kathie Elaine

    1971-01-01

    fulfillment of the requirement for the deSree of IIASTER OF SCIERCE December 1971 Major Subject: Economics NOMEN: THE KEY TO SUCCESSFUL DEVELOPMENT POLICIES FOR SUBSISTENCE AGRICULTURE IN SUB-SAHARAN AFRICA A Thesis KATHIE ELAINE RYAN Approved... Africa 10 Western. Afric- Southern Africa 12 Need for Fzpanded Stu. dy Overall Economic Efficiency 13 18 II. THE SITUAT ON IN AGRICULTURE 21 Nature of Subsistence Agriculture Traditional Production Practices 21 23 Traditional Roles 26...

  11. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  12. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  13. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  14. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  15. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  16. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  17. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  18. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  19. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  20. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. The cosmic production of Helium

    E-Print Network [OSTI]

    Raul Jimenez; Chris Flynn; James MacDonald; Brad K. Gibson

    2003-03-07

    We estimate the cosmic production rate of helium relative to metals ($\\Delta Y/\\Delta Z$) using K dwarf stars in the Hipparcos catalog with accurate spectroscopic metallicities. The best fitting value is $\\Delta Y/\\Delta Z=2.1 \\pm 0.4$ at the 68% confidence level. Our derived value agrees with determinations from HII regions and with theoretical predictions from stellar yields with standard assumptions for the initial mass function. The amount of helium in stars determines how long they live and therefore how fast they will enrich the insterstellar medium with fresh material.

  2. Hydrogen Production Technical Team Roadmap

    SciTech Connect (OSTI)

    2013-06-01

    The Hydrogen Production Technical Team Roadmap identifies research pathways leading to hydrogen production technologies that produce near-zero net greenhouse gas (GHG) emissions from highly efficient and diverse renewable energy sources. This roadmap focuses on initial development of the technologies, identifies their gaps and barriers, and describes activities by various U.S. Department of Energy (DOE) offices to address the key issues and challenges.

  3. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  4. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  5. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  6. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  7. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  8. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  9. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  10. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  11. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  12. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  13. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  14. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  15. PUBLISHED ONLINE: 6 APRIL 2014 | DOI: 10.1038/NCLIMATE2177 Nutrient availability as the key regulator of global

    E-Print Network [OSTI]

    LETTERS PUBLISHED ONLINE: 6 APRIL 2014 | DOI: 10.1038/NCLIMATE2177 Nutrient availability as the key availability increases the production of biomass per unit of photosynthesis2 and reduces heterotrophic3 study of 92 forests in di erent climate zones revealed that nutrient availability indeed plays a crucial

  16. 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily.

    E-Print Network [OSTI]

    Bahrami, Majid

    7-47 7-117 The claim of a heat pump designer regarding the COP of the heat pump is to be evaluated. Assumptions The heat pump operates steadily. HP Wnet,in QH QL TL TH Analysis The maximum heat pump coefficient of performance would occur if the heat pump were completely reversible, 5.7 K026K300 K300 COP maxHP, LH H TT

  17. Because fisheries often target older, larger fish, population productivity

    E-Print Network [OSTI]

    .g., Houde, 1987; reviewed in Heath, 1992; Bergenius et al., 2002). The assumption that the reproduc- tive storage, size, and survival are relat- ed to maternal age or size. The size of the oil globule is used of progeny can have direct impacts on population productivity. Rockfish are viviparous and the oil globule

  18. PRODUCTION OF CARBON PRODUCTS USING A COAL EXTRACTION PROCESS

    SciTech Connect (OSTI)

    Dady Dadyburjor; Chong Chen; Elliot B. Kennel; Liviu Magean; Peter G. Stansberry; Alfred H. Stiller; John W. Zondlo

    2006-02-23

    The purpose of this DOE-funded effort is to develop technologies for carbon products from coal-derived feedstocks. Carbon products can include precursor materials such as solvent extracted carbon ore (SECO) and synthetic pitch (Synpitch). In addition, derived products include carbon composites, fibers, foams and others. Key milestones included producing hydrogenated coal in the Hydrotreating Facility for the first time. The facility is now operational, although digital controls have not yet been completely wired. In addition, ultrasound is being used to investigate enhanced dissolution of coal. Experiments have been carried out.

  19. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  20. Relating horsepower to drilling productivity

    SciTech Connect (OSTI)

    Givens, R.; Williams, G.; Wingfield, B.

    1996-12-31

    Many technological advancements have been made in explosive products and applications over the last 15 years resulting in productivity and cost gains. However, the application of total energy (engine horsepower) in the majority of rotary drilling technology, has remained virtually unchanged over that period. While advancements have been made in components, efficiency, and types of hydraulic systems used on drills, the application of current hydraulic technology to improve drilling productivity has not been interactive with end users. This paper will investigate how traditional design assumptions, regarding typical application of horsepower in current rotary drill systems, can actually limit productivity. It will be demonstrated by numeric analysis how changing the partitioning of available hydraulic energy can optimize rotary drill productivity in certain conditions. Through cooperative design ventures with drill manufacturers, increased penetration rates ranging from 20% to 100% have been achieved. Productivity was increased initially on some rigs by careful selection of optional hydraulic equipment. Additional gains were made in drilling rates by designing the rotary hydraulic circuit to meet the drilling energies predicted by computer modeling.

  1. Lpcat3-dependent production of arachidonoyl phospholipids is a key determinant of triglyceride secretion.

    E-Print Network [OSTI]

    2015-01-01

    was en block stained in aqueous uranyl acetate, dehydrated,diet were stained with 2.0% uranyl acetate and visualized bygrids and stained with 2.0% uranyl acetate for 15 min. Grids

  2. The Production Tax Credit is Key to a Strong U.S. Wind Industry...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    that wind energy is a proven technology that is growing -- totaling 43 percent of the new electricity generation capacity in 2012. The success of the U.S. wind industry...

  3. Keys to Profitable Small Grain Production In the Rolling Plains and Edwards Plateau. 

    E-Print Network [OSTI]

    Alexander, U.U.; Gass, Willis B.; Boring, Emory P. III; Fuchs, Thomas W.

    1985-01-01

    penetration and conservation, (2) good sur face drainage for normal plant growth and to avoid severe damage during grazing, (3) weed control, (4) wind and water erosion control and (5) avoidance of an accumulation of excessive undecomposed organ ic..., use minimum tillage techniques such as sweep tillage for weed control, adequate water penetration and maintenance of crop residues to help avoid erOSIon. Several drills on the market recently will drill through both standing and downed wheat...

  4. ?-Lactones as Key Building Blocks: Synthetic Applications to Diverse Natural Products 

    E-Print Network [OSTI]

    Shirley, Morgan

    2014-06-06

    - substituted carboxylic acid (Eq. 13).49 Whereas nucleophilic attack at the C2 carbon O HO Nuc O Nuc OHO O 34 21 5 hard site soft site (13) follows an addition/elimination pathway to ?-hydroxy ketones, esters, or amides with retention of configuration... attack 2) Lewis acid catalyzed rearrangements 3) decarboxylation and 4) addition to an electrophile through an enolate intermediate. O O • R HO2C O R O CO2H Nuc O R OH R1 R1 R R1 OH O R Nuc R1 O O RR1 E H Nuc R1 R2N O R1 R O O R1O O RR1 R RN O R R1 a...

  5. Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India

    E-Print Network [OSTI]

    McNeil, Michael; Iyer, Maithili; Meyers, Stephen; Letschert, Virginie; McMahon, James E.

    2005-01-01

    Karnataka State, India, Energy for Sustainable Development,Synergy for Energy, Ahmedabad, India, October 2004. TERI (Labelling and Energy Efficiency Standards in India, Indian

  6. Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India

    E-Print Network [OSTI]

    McNeil, Michael; Iyer, Maithili; Meyers, Stephen; Letschert, Virginie; McMahon, James E.

    2005-01-01

    renewable energy projects under clean development mechanism. New Delhi, Government of Indiarenewable energy projects under clean development mechanism. New Delhi, Government of India

  7. Potential for Hydrogen Production from Key Renewable Resources in the United States

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeedingProgram Guidelines This document outlines thePotential for Hydrogen

  8. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  9. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  10. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  11. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  12. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  13. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  14. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  15. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  16. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  17. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  18. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  19. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  20. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  1. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  2. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  3. Extracting the transversity distributions from single-hadron and dihadron production

    E-Print Network [OSTI]

    Anna Martin; Franco Bradamante; Vincenzo Barone

    2015-02-14

    We present a point-by-point determination of the valence transversity distributions from two different types of processes: single-hadron production and dihadron production, both in semi-inclusive deep inelastic scattering and e+e- annihilation. The extraction is based on some simple assumptions and does not require any parametrization. The transversity distributions obtained from Collins effect in single-hadron production and from interference effects in dihadron production are found to be compatible with each other.

  4. Compiled 11/ 14/ 2011 by OPBA. These assumptions are for modeling purposes only. They are subject to change. Page 1 of 2

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    .1 Electricity 2% 2% 231.7 3.7 Fuel Oil 9% 8% 240.8 3.9 Natural Gas -25% 0% 253.1 5.1 Lab Gas 0% 0% 260.3 2.8 Water 3% 3% 273.2 5.0 Sewer 6% 5% 279.3 2.2 Garbage 4% 4% 281.8 0.9 *FY13 based on projections dated 6.03% 18.46% 3.33% 5.54% Higher Education Price Index (HEPI)* Utility Assumptions Fiscal Year 2002 3,679 3

  5. Dieselzymes: development of a stable and methanol tolerant lipase for biodiesel production by directed evolution

    E-Print Network [OSTI]

    Korman, Tyler P; Sahachartsiri, Bobby; Charbonneau, David M; Huang, Grace L; Beauregard, Marc; Bowie, James U

    2013-01-01

    J, Campelo JM, Romero AA: Biodiesel as feasible petrol fueltowards ever greener biodiesel production. Biotechnol Adv 3.T, Bielecki S: Enzymatic biodiesel synthesis - key factors

  6. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  7. A process economic assessment of hydrocarbon biofuels production using chemoautotrophic organisms

    SciTech Connect (OSTI)

    Khan, NE; Myers, JA; Tuerk, AL; Curtis, WR

    2014-11-01

    Economic analysis of an ARPA-e Electrofuels (http://arpa-e.energy.gov/?q=arpa-e-programs/electrofuels) process is presented, utilizing metabolically engineered Rhodobacter capsulatus or Ralstonia eutropha to produce the C30+ hydrocarbon fuel, botryococcene, from hydrogen, carbon dioxide, and oxygen. The analysis is based on an Aspen plus (R) bioreactor model taking into account experimentally determined Rba. capsulatus and Rls. eutropha growth and maintenance requirements, reactor residence time, correlations for gas-liquid mass-transfer coefficient, gas composition, and specific cellular fuel productivity. Based on reactor simulation results encompassing technically relevant parameter ranges, the capital and operating costs of the process were estimated for 5000 bbl-fuel/day plant and used to predict fuel cost. Under the assumptions used in this analysis and crude oil prices, the Levelized Cost of Electricity (LCOE) required for economic feasibility must be less than 2(sic)/kWh. While not feasible under current market prices and costs, this work identifies key variables impacting process cost and discusses potential alternative paths toward economic feasibility. (C) 2014 Elsevier Ltd. All rights reserved.

  8. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  9. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  10. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  11. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  12. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  13. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  14. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  15. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  16. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  17. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  18. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  19. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  20. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  1. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  2. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  3. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  4. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  5. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  6. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  7. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  8. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  9. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  10. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  11. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  12. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  13. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  14. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  15. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  16. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  17. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  18. Section 25: Future State Assumptions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r e D m .8)&JD(N,8)Future

  19. A Comprehensive Energy Audit of a Large Production Unit in Six Weeks 

    E-Print Network [OSTI]

    Korich, R. D.

    1980-01-01

    Past energy audits of petrochemical plant production units at Union Carbide have demonstrated that the key to an effective, comprehensive audit of a large production unit is to minimize the time period requirement for the team activity. This paper...

  20. Assumptions and Criteria for Performing a Feasability Study of the Conversion of the High Flux Isotope Reactor Core to Use Low-Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, R.T., III; Ellis, R.J.; Gehin, J.C.; Moses, D.L.; Binder, J.L.; Xoubi, N. (U. of Cincinnati)

    2006-02-01

    A computational study will be initiated during fiscal year 2006 to examine the feasibility of converting the High Flux Isotope Reactor from highly enriched uranium fuel to low-enriched uranium. The study will be limited to steady-state, nominal operation, reactor physics and thermal-hydraulic analyses of a uranium-molybdenum alloy that would be substituted for the current fuel powder--U{sub 3}O{sub 8} mixed with aluminum. The purposes of this document are to (1) define the scope of studies to be conducted, (2) define the methodologies to be used to conduct the studies, (3) define the assumptions that serve as input to the methodologies, (4) provide an efficient means for communication with the Department of Energy and American research reactor operators, and (5) expedite review and commentary by those parties.

  1. Consumer Online Search and New-Product Marketing

    E-Print Network [OSTI]

    Kim, Ho

    2013-01-01

    willingness-to-search (WTS) that may change over the courseschedule and consumers’ WTS are the two key elements thatconsumers have different levels of WTS for the new-product’s

  2. Hydrogen Production

    SciTech Connect (OSTI)

    2014-09-01

    This 2-page fact sheet provides a brief introduction to hydrogen production technologies. Intended for a non-technical audience, it explains how different resources and processes can be used to produce hydrogen. It includes an overview of research goals as well as “quick facts” about hydrogen energy resources and production technologies.

  3. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  4. Charm particle production in hadronic collisions

    E-Print Network [OSTI]

    C. Avila; J. Magnin; L. M. Mendoza-Navas

    2006-12-21

    We study charm particle production in hadron-hadron collisions. After calculating perturbatively the charm quark differential cross section, we study the hadronization mechanisms. It is shown that recombination is the key to understand the so called Leading Particle Effect in charm meson production. For charm baryon production, however, leading particle effects are due to a combination of contributions coming from both, the recombination and the fragmentation mechanisms. We compare our calculations to experimental data on charm hadron production in $\\pi^- N$ and $p N$ interactions from several experiments and show that a consistent description of them can be reached without the aid of other mechanims than recombination and fragmentation.

  5. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  6. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  7. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  8. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  9. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  10. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  11. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  12. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  13. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  14. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  15. Entanglement Production in Non-Equilibrium Thermodynamics

    E-Print Network [OSTI]

    V. Vedral

    2007-06-21

    We define and analyse the concept of entanglement production during the evolution of a general quantum mechanical dissipative system. While it is important to minimise entropy production in order to achieve thermodynamical efficiency, maximising the rate of change of entanglement is important in quantum information processing. Quantitative relations are obtained between entropy and entanglement productions, under specific assumptions detailed in the text. We apply these to the processes of dephasing and decay of correlations between two initially entangled qubits. Both the Master equation treatment as well as the higher Hilbert space analysis are presented. Our formalism is very general and contains as special cases many reported individual instance of entanglement dynamics, such as, for example, the recently discovered notion of the sudden death of entanglement.

  16. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  17. Hydrogen Production

    Fuel Cell Technologies Publication and Product Library (EERE)

    This 2-page fact sheet provides a brief introduction to hydrogen production technologies. Intended for a non-technical audience, it explains how different resources and processes can be used to produ

  18. Soil and Vegetation Management: Keys to Water Conservation on Rangeland 

    E-Print Network [OSTI]

    Schuster, Joseph L.

    2001-01-11

    The amount of water that soaks into the soil largely determines plant productivity. We can manage and conserve water where and when it falls, and by controlling the kind of vegetation we can make the fullest use of rain ...

  19. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  20. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  1. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  2. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  3. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  4. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  5. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  6. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  7. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  8. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  9. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  10. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  11. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  12. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  13. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  14. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  15. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  16. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  17. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  18. Optimal control of a hybrid production/remanufacturing system using one shared resource

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Optimal control of a hybrid production/remanufacturing system using one shared resource Lâm Laurent products into the materials planning is a key issue in reverse logistics. 1.2 Hybrid production-birth-death processes 1 Introduction 1.1 Reusing product returns There are several reasons why companies consider

  19. Abstract--Wave energy will have a key role in meeting re-newable energy targets en route to a low carbon economy. How-

    E-Print Network [OSTI]

    Harrison, Gareth

    1 Abstract--Wave energy will have a key role in meeting re- newable energy targets en route will impact on wave energy conversion. Where the resource is restricted there may be reductions in energy the sensitivity of wave energy production and econom- ics to changes in climate. Index Terms--Wave energy

  20. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  1. On Non-singlets in Kaon Production in Semi-inclusive DIS reactions

    SciTech Connect (OSTI)

    Christova, Ekaterina [Institute for Nuclear Research and Nuclear Energy, Sofia (Bulgaria); Leader, Elliot [Imperial College, London (United Kingdom)

    2007-06-13

    We consider semi-inclusive unpolarized DIS for the production of charged kaons and the different possibilities, both in LO and NLO, to test the conventionally used assumptions s - s-bar = 0 and D{sub d}{sup K{sup +}-K{sup -}} = 0. The considered tests have the advantage that they do not require any knowledge of the fragmentation functions.

  2. Modeling Fischer-Tropsch Product Distribution of a Cobalt Based Catalyst in Different Reaction Media 

    E-Print Network [OSTI]

    Afzal, Shaik

    2015-05-27

    absolute relative residual (MARR) of 48.44%. This is higher than that obtained by Todic et al. The higher error is attributed to the fewer number of experimental runs carried out and due to some assumptions made in product characterization. This work lays...

  3. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  4. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  5. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  6. Traceability, Product Recalls, Industry Reputation and Food Safety

    E-Print Network [OSTI]

    Ferrara, Katherine W.

    and for an industry using collective action to set rules and standards. Key words: Food safety, product recallTraceability, Product Recalls, Industry Reputation and Food Safety Sebastien Pouliot, Daniel A recalls, industry reputation and food safety S´ebastien Pouliot and Daniel A. Sumner November 17, 2010

  7. Inclusive Production of the X(3872)

    E-Print Network [OSTI]

    Eric Braaten

    2006-06-13

    If the X(3872) is a loosely-bound D^{*0} Dbar^0 / D^0 Dbar^{*0} molecule, its inclusive production rate can be described by the NRQCD factorization formalism that applies to inclusive quarkonium production. We argue that if the molecule has quantum numbers J^{PC} = 1^{++}, the most important term in the factorization formula should be the color-octet ^3S_1 term. This is also one of the two most important terms in the factorization formulas for chi_{cJ}. Since the color-octet ^3S_1 term dominates chi_{cJ} production for many processes, the ratio of the inclusive direct production rates for X and chi_{cJ} should be roughly the same for these processes. The assumption that the ratio of the production rates for X and chi_{cJ} is the same for all processes is used to estimate the inclusive production rate of X in B meson decays, Z^0 decays, and in p pbar collisions.

  8. Approaches for identifying consumer preferences for the design of technology products : a case study of residential solar panels

    E-Print Network [OSTI]

    Chen, Heidi Qianyi

    2012-01-01

    This thesis investigates ways to obtain consumer preferences for technology products to help designers identify the key attributes that contribute to a product's market success. A case study of residential solar PV panels ...

  9. Approaches for Identifying Consumer Preferences for the Design of Technology Products: A Case Study of Residential Solar Panels

    E-Print Network [OSTI]

    Chen, Heidi Qianyi

    This paper investigates ways to obtain consumer preferences for technology products to help designers identify the key attributes that contribute to a product's market success. A case study of residential photovoltaic ...

  10. The economics of biomass production in the United States

    SciTech Connect (OSTI)

    Graham, R.L.; Walsh, M.E.; Lichtenberg, E.; Roningen, V.O.; Shapouri, H.

    1995-12-31

    Biomass crops (e.g. poplar, willow, switchgrass) could become important feedstocks for power, liquid fuel, and chemical production. This paper presents estimates of the potential production of biomass in the US under a range of assumptions. Estimates of potential biomass crop yields and production costs from the Department of Energy`s (DOE) Oak Ridge National Laboratories (ORNL) are combined with measures of land rents from USDA`s Conservation Reserve Program (CRP), to estimate a competitive supply of biomass wood and grass crops. Estimates are made for one potential biomass use--electric power production--where future costs of electricity production from competing fossil fuels set the demand price. The paper outlines the methodology used and limitations of the analysis.

  11. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  12. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  13. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  14. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  15. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  16. Hydrogen Production Cost Estimate Using Biomass Gasification: Independent Review

    SciTech Connect (OSTI)

    2011-10-01

    This independent review is the conclusion arrived at from data collection, document reviews, interviews and deliberation from December 2010 through April 2011 and the technical potential of Hydrogen Production Cost Estimate Using Biomass Gasification. The Panel reviewed the current H2A case (Version 2.12, Case 01D) for hydrogen production via biomass gasification and identified four principal components of hydrogen levelized cost: CapEx; feedstock costs; project financing structure; efficiency/hydrogen yield. The panel reexamined the assumptions around these components and arrived at new estimates and approaches that better reflect the current technology and business environments.

  17. begell house, inc. Journal Production

    E-Print Network [OSTI]

    Hossain, M. Enamul

    oil recovery (EOR) techniques are regaining interest as high oil prices have rendered such techniques transfer coefficient with the assumption that the rock achieves the fluid temperature instantaneously

  18. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  19. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  20. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  1. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  2. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  3. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  4. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  5. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  6. Hydrogen Production

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancingR Walls -Hydro-Pac Inc.,1 DOE HydrogenProduction Hydrogen is

  7. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  8. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  9. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  10. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  11. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  12. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  13. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  14. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  15. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  16. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  17. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  18. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  19. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  20. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  1. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  2. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  3. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  4. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  5. The same key to different doors - temperature puzzles

    E-Print Network [OSTI]

    Ludwik Turko

    2014-12-27

    The notion of temperature in many body elementary particle processes is in a common use for decades. Thermal models have become simple and universal effective tools to describe particle production -- not only in high energy heavy ion collisions but also in high energy elementary particle collisions. We perform a critical analysis of the temperature concepts in such processes. Although the temperature concept is a very useful tool, nevertheless it should be used with the care, taking into account that usually it is just model dependent fitted parameter.

  6. Researchers find potential key for unlocking biomass energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultiday Production of SOAResearchers Borrow From FirUnlocking biomass

  7. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  8. Modeling the Potential Effects of New Tobacco Products and Policies: A Dynamic Population Model for Multiple Product Use and Harm

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vugrin, Eric D.; Rostron, Brian L.; Verzi, Stephen J.; Brodsky, Nancy S.; Brown, Theresa J.; Choiniere, Conrad J.; Coleman, Blair N.; Paredes, Antonio; Apelberg, Benjamin J.

    2015-03-27

    Background Recent declines in US cigarette smoking prevalence have coincided with increases in use of other tobacco products. Multiple product tobacco models can help assess the population health impacts associated with use of a wide range of tobacco products. Methods and Findings We present a multi-state, dynamical systems population structure model that can be used to assess the effects of tobacco product use behaviors on population health. The model incorporates transition behaviors, such as initiation, cessation, switching, and dual use, related to the use of multiple products. The model tracks product use prevalence and mortality attributable to tobacco use formore »the overall population and by sex and age group. The model can also be used to estimate differences in these outcomes between scenarios by varying input parameter values. We demonstrate model capabilities by projecting future cigarette smoking prevalence and smoking-attributable mortality and then simulating the effects of introduction of a hypothetical new lower-risk tobacco product under a variety of assumptions about product use. Sensitivity analyses were conducted to examine the range of population impacts that could occur due to differences in input values for product use and risk. We demonstrate that potential benefits from cigarette smokers switching to the lower-risk product can be offset over time through increased initiation of this product. Model results show that population health benefits are particularly sensitive to product risks and initiation, switching, and dual use behaviors. Conclusion Our model incorporates the variety of tobacco use behaviors and risks that occur with multiple products. As such, it can evaluate the population health impacts associated with the introduction of new tobacco products or policies that may result in product switching or dual use. Further model development will include refinement of data inputs for non-cigarette tobacco products and inclusion of health outcomes such as morbidity and disability.« less

  9. WorkPlan: Database for Work Package Production Scheduling Proceedings IGLC '98

    E-Print Network [OSTI]

    Tommelein, Iris D.

    and expressiveness when it comes to supporting production planning and control, that is, supporting those whoWorkPlan: Database for Work Package Production Scheduling Proceedings IGLC '98 WORKPLAN: DATABASE specifically to implement lean production philosophy in construction. KEY WORDS WorkPlan, weekly work plan

  10. Demand key factor in worldwide crude prices and drilling

    SciTech Connect (OSTI)

    Beck, R.J.

    1995-01-30

    The global demand surge that rescued world crude oil prices in 1994 will continue through 1995 and at least sustain, if not increase, worldwide drilling activity. Although average world crude oil prices at the end of 1994 were somewhat higher than a year earlier, the average price for all of last year was down from that of 1993. Production capacity remained sufficient to meet the growing need for crude, and the potential for return of Iraqi exports, embargoed by the United Nations since August 1990, lingered over the market. For several years the average world export crude oil price fluctuated seasonally within the range of $16--20/bbl. This band appears to have dropped to $13--17/bbl. The paper discusses economic growth rates; worldwide demand; worldwide supply; worldwide supply outlook; prices; and international drilling activity.

  11. Zinc subsea production system: An overview

    SciTech Connect (OSTI)

    Bednar, J.M. )

    1994-04-01

    Exxon Co. U.S.A.'s Zinc development, in 1,460 ft of water in the Gulf of Mexico, uses a subsea production system to produce gas to a host platform 6 miles away. The 10-slot subsea template, designed specifically to accommodate the soft soil conditions at the Zinc site, supports the non-through-flowline (non-TFL) wells, which are controlled by means of an electrohydraulic control system. This paper describes key features of the development.

  12. Language Production General Points about Speech Production

    E-Print Network [OSTI]

    Coulson, Seana

    Language Production #12;General Points about Speech Production 15 speech sounds per second => 2, shall I say `t' or `d'' (Levelt) Production side has gotten less attention in Psycholinguistics than the comprehension side. Evidence for speech production behaviour has until recently relied heavily on speech errors

  13. High yield production of inorganic graphene-like materials (MoS?, WS?, BN) through liquid exfoliation testing key parameters

    E-Print Network [OSTI]

    Pu, Fei, S.B. Massachusetts Institute of Technology

    2012-01-01

    Inorganic graphene-like materials such as molybdenum disulfide (MoS?), tungsten sulfide (WS?), and boron nitride (BN) are known to have electronic properties. When exfoliated into layers and casted onto carbon nanofilms, ...

  14. Despite the growth of agriculture and the consumption of forestry resources, these activities represent a continually decreasing percentage of production in Latin

    E-Print Network [OSTI]

    Key messages · Despite the growth of agriculture and the consumption of forestry resources, these activities represent a continually decreasing percentage of production in Latin American countries. · Forest products account for a larger proportion of Latin America's material extraction than would

  15. Subsurface Flow Management and Real-Time Production Optimization using Model Predictive Control 

    E-Print Network [OSTI]

    Lopez, Thomas Jai

    2012-02-14

    One of the key challenges in the Oil & Gas industry is to best manage reservoirs under different conditions, constrained by production rates based on various economic scenarios, in order to meet energy demands and maximize profit. To address...

  16. The impact of size distribution assumptions in a bulk one-moment microphysics scheme on simulated surface precipitation and storm dynamics during a low-topped supercell case in Belgium

    SciTech Connect (OSTI)

    Van Weverberg, K.; Van Lipzig, N. P. M.; Delobbe, L.

    2011-04-01

    In this research the impact of modifying the size distribution assumptions of the precipitating hydrometeors in a bulk one-moment microphysics scheme on simulated surface precipitation and storm dynamics has been explored for long-lived low-topped supercells in Belgium. It was shown that weighting the largest precipitating ice species of the microphysics scheme to small graupel results in an increase of surface precipitation because of counteracting effects. On the one hand, the precipitation formation process slowed down, resulting in lower precipitation efficiency. On the other hand, latent heat release associated with freezing favored more intense storms. In contrast to previous studies finding decreased surface precipitation when graupel was present in the microphysics parameterization, storms were rather shallow in the authors simulations. This left little time for graupel sublimation. The impact of size distribution assumptions of snow was found to be small, but more realistic size distribution assumptions of rain led to the strongest effect on surface precipitation. Cold pools shrunk because of weaker rain evaporation at the cold pool boundaries, leading to a decreased surface rain area.

  17. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  18. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  19. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  20. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  1. Productive Energy of Feeds Calculated from Feeding Experiments with Sheep. 

    E-Print Network [OSTI]

    Fraps, G. S. (George Stronach)

    1931-01-01

    beet pulp, clover hay, corn fodder, corn stover, emmer or spelt, molasses, oat straw, rye, soy bean straw, sun- flower silage, whole wheat, ground wheat, and wheat bran. The productive values of corn fodder and of oat straw were greater in balanced..., 69 per cent correct for clover hay, and 77 per cent correct for wheat bran. To put it another way, the assumption of equal value for digestible nutrients would be five times the actual value found by experiment with the wheat straw, nearly 50 per...

  2. A CRITICAL EXAMINATION OF THE X-WIND MODEL FOR CHONDRULE AND CALCIUM-RICH, ALUMINUM-RICH INCLUSION FORMATION AND RADIONUCLIDE PRODUCTION

    SciTech Connect (OSTI)

    Desch, S. J.; Morris, M. A.; Connolly, H. C.; Boss, Alan P.

    2010-12-10

    Meteoritic data, especially regarding chondrules and calcium-rich, aluminum-rich inclusions (CAIs), and isotopic evidence for short-lived radionuclides (SLRs) in the solar nebula, potentially can constrain how planetary systems form. Interpretation of these data demands an astrophysical model, and the 'X-wind' model of Shu et al. and collaborators has been advanced to explain the origin of chondrules, CAIs, and SLRs. It posits that chondrules and CAIs were thermally processed <0.1 AU from the protostar, then flung by a magnetocentrifugal outflow to the 2-3 AU region to be incorporated into chondrites. Here we critically examine key assumptions and predictions of the X-wind model. We find a number of internal inconsistencies: theory and observation show no solid material exists at 0.1 AU; particles at 0.1 AU cannot escape being accreted into the star; particles at 0.1 AU will collide at speeds high enough to destroy them; thermal sputtering will prevent growth of particles; and launching of particles in magnetocentrifugal outflows is not modeled, and may not be possible. We also identify a number of incorrect predictions of the X-wind model: the oxygen fugacity where CAIs form is orders of magnitude too oxidizing, chondrule cooling rates are orders of magnitude lower than those experienced by barred olivine chondrules, chondrule-matrix complementarity is not predicted, and the SLRs are not produced in their observed proportions. We conclude that the X-wind model is not relevant to chondrule and CAI formation and SLR production. We discuss more plausible models for chondrule and CAI formation and SLR production.

  3. National setting for productive conservation in urban transportation

    SciTech Connect (OSTI)

    Johnson, L.R.; LaBelle, S.J.

    1981-04-01

    The need for productive conservation strategies in urban transportation is discussed. Key trends in urban transportation are discussed as a basis for identifying target areas for productive conservation strategies. The need for and expected impacts of such candidate strategies as improvements in conventional automobiles, increases in automobile load factors, changes in highway and transit system operation, price-driven reductions in travel, and shifts to more-efficient modes are briefly outlined.

  4. Biological production of products from waste gases

    DOE Patents [OSTI]

    Gaddy, James L. (Fayetteville, AR)

    2002-01-22

    A method and apparatus are designed for converting waste gases from industrial processes such as oil refining, and carbon black, coke, ammonia, and methanol production, into useful products. The method includes introducing the waste gases into a bioreactor where they are fermented to various products, such as organic acids, alcohols, hydrogen, single cell protein, and salts of organic acids by anaerobic bacteria within the bioreactor. These valuable end products are then recovered, separated and purified.

  5. Covered Product Category: Cool Roof Products

    Broader source: Energy.gov [DOE]

    FEMP provides acquisition guidance across a variety of product categories, including cool roof products, which are an ENERGY STAR®-qualified product category. Federal laws and requirements mandate that agencies meet these efficiency requirements in all procurement and acquisition actions that are not specifically exempted by law.

  6. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  7. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  8. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  9. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  10. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  11. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  12. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  13. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  14. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    is a multilateral effort to develop the next generation of economical and safe nuclear reactors, and the ITERBetter Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  15. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  16. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing- able, server-passive and user-anonymous timed release public-key encryption scheme which allows precise in our scheme is completely passive -- no interaction between it and the sender or receiver is needed

  17. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  18. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  19. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  20. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  1. On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    E-Print Network [OSTI]

    Kashyap, Navin

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model Manuj Mukherjee Navin Kashyap Abstract--Communication complexity refers to the minimum rate of public communication required for generating a maximal- rate secret key (SK) in the multiterminal source model of Csisz

  2. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  3. DEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs

    E-Print Network [OSTI]

    passionate for sustainability. Performance Goals & Key Indicators for the University The following are ourDEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs GEOGRAPHY 446 and implementing social sustainability at the University of British Columbia University of British Columbia

  4. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  5. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  6. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  7. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  8. Evaluation of the effects of a highway improvement project on Key deer 

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30

    Deer-vehicle collisions (DVCs) along a 5.6-km segment of United States Highway 1 (US 1) on Big Pine Key (BPK), Florida responsible for approximately 26% of endangered Florida Key deer (Odocoileus virginianus clavium) annual mortalities. The Florida...

  9. Ntru-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ntr¯u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian) as well as non-associative Octonions (a power-associative and alternative algebra of dimension eight over: Public Key Cryptography, Ntr¯u, Alternative algebra, lattice based cryptogra- phy, non

  10. Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    - 1 - Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao School. China machunbo@guet.edu.cn Abstract. Many practical applications use hybrid encryption mechanism to deal scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows

  11. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  12. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  13. A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying

    E-Print Network [OSTI]

    Ayazi, Farrokh

    A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying Logan Sorenson and Farrokh of a MEMS resonator to form the basic component of a switchless quadrature phase shift keying (QPSK) scheme. INTRODUCTION In recent years, microelectromechanical systems (MEMS)- based solutions have gained acceptance

  14. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  15. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  16. Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    E-Print Network [OSTI]

    Chee, Yeow Meng

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications Yeow Meng Chee, Han Technological University, Singapore Abstract--Single-tone frequency shift keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance

  17. Temperature fluctuations in HII regions: ionization by Cosmic Rays as a key mechanism

    E-Print Network [OSTI]

    C. Giammanco; J. E. Beckman

    2005-05-18

    We present a detailed model capable of explaining quantitatively the temperature fluctuations observed in luminous, large HII regions. The model is based on two assumptions which we justify on the basis of observations: that the major fraction of the hydrogen in the clouds that form the HII regions is not photoionized and is essentially HI, this HII is lightly ionized by fluxes of low energy cosmic rays (CR) produced by processes originating in the hot stars which illuminate the regions.

  18. Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution

    E-Print Network [OSTI]

    Jian-Yu Guan; Zhu Cao; Yang Liu; Guo-Liang Shen-Tu; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Xiongfeng Ma; Qiang Zhang; Jian-Wei Pan

    2015-05-29

    In quantum key distribution (QKD), the bit error rate is used to estimate the information leakage and hence determines the amount of privacy amplification --- making the final key private by shortening the key. In general, there exists a threshold of the error rate for each scheme, above which no secure key can be generated. This threshold puts a restriction on the environment noises. For example, a widely used QKD protocol --- BB84 --- cannot tolerate error rates beyond 25%. A new protocol, round-robin differential phase shifted (RRDPS) QKD, essentially removes this restriction and can in principle tolerate more environment disturbance. Here, we propose and experimentally demonstrate a passive RRDPS QKD scheme. In particular, our 500 MHz passive RRDPS QKD system is able to generate a secure key over 50 km with a bit error rate as high as 29%. This scheme should find its applications in noisy environment conditions.

  19. Remote Key Establishment by Mode Mixing in Multimode Fibres and Optical Reciprocity

    E-Print Network [OSTI]

    Bromberg, Yaron; Popoff, Sebastien M; Cao, Hui

    2015-01-01

    Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing and spectroscopy. The chaotic dynamics and extreme sensitivity to external perturbations make random media particularly well-suited for optical cryptography. However, using random media for distribution of secret keys between remote users still remains challenging, since it requires the users have access to the same scattering system. Here we utilize random mode mixing in multimode fibres to generate and distribute keys simultaneously. Fast fluctuations in the fibre mode mixing provide the source of randomness for the key generation, and optical reciprocity guarantees that the keys at the two ends of the fibre are identical. We experimentally demonstrate the scheme using classical light and off-the-shelf components, opening the door for cost effective key establishment at the physical-layer o...

  20. When is the product of two planar harmonic mappings harmonic?

    E-Print Network [OSTI]

    Mortini, Raymond

    When is the product of two planar harmonic mappings harmonic? Raymond Mortini Lecturas Matem´aticas Volumen 23 (2002), p´aginas 5­10 Abstract. We determine all complex-valued harmonic functions u and v defined on a planar domain for which uv, respectively u2 - v2 is harmonic Key words and phrases. Harmonic

  1. Stochastic methods for improving secondary production decisions under compositional uncertainty

    E-Print Network [OSTI]

    de Weck, Olivier L.

    the usage of secondary or recycled materials. This thesis aims to improve materials decision making in two of these key areas: 1) blending decisions in manufacturing, and 2) alloy design decisions in product development. The usage of recycled aluminum in alloy blends is greatly hindered by variation in the raw

  2. Clean Energy Manufacturing Initiative Industrial Efficiency and Energy Productivity

    SciTech Connect (OSTI)

    Selldorff, John; Atwell, Monte

    2014-09-23

    Industrial efficiency and low-cost energy resources are key components to increasing U.S. energy productivity and makes the U.S. manufacturing sector more competitive. Companies find a competitive advantage in implementing efficiency technologies and practices, and technologies developed and manufactured in the U.S. enable greater competitiveness economy-wide.

  3. Influence of Biocontrol Insects on Canada Thistle: Seed Production,

    E-Print Network [OSTI]

    Ceurtorhynchus litura, (Coleoptera: Curculionidae)], introduced at LNWR as a biocontrol agent, plus two seed head85 Influence of Biocontrol Insects on Canada Thistle: Seed Production, Germinability, and Viability appeared to be negligible. Key Words: biocontrol insects, Canada thistle, Cirsium arvense, germination

  4. Impact of Biomass Harvesting on Forest Soil Productivity in the

    E-Print Network [OSTI]

    Impact of Biomass Harvesting on Forest Soil Productivity in the Northern Rocky Mountains Woongsoon; Keyes, Christopher R.; Page-Dumroese, Deborah. 2015. Impact of biomass harvesting on forest soil of Agriculture, Forest Service, Rocky Mountain Research Station. 35 p. Abstract Biomass harvesting extracts

  5. Clean Energy Manufacturing Initiative Industrial Efficiency and Energy Productivity

    ScienceCinema (OSTI)

    Selldorff, John; Atwell, Monte

    2014-12-03

    Industrial efficiency and low-cost energy resources are key components to increasing U.S. energy productivity and makes the U.S. manufacturing sector more competitive. Companies find a competitive advantage in implementing efficiency technologies and practices, and technologies developed and manufactured in the U.S. enable greater competitiveness economy-wide.

  6. Radioactive Materials Product Stewardship

    E-Print Network [OSTI]

    Radioactive Materials Product Stewardship ABackground Report for the National Dialogue...................................................................................................26 Low Level Waste (LLW) Disposal Regulations on Radioactive Materials Product Stewardship Prepared by the: Product Stewardship Institute University

  7. Characterizing scientific production and consumption in Physics

    E-Print Network [OSTI]

    Zhang, Qian; Goncalves, Bruno; Ciulla, Fabio; Vespignani, Alessandro

    2013-01-01

    We analyze the entire publication database of the American Physical Society generating longitudinal (50 years) citation networks geolocalized at the level of single urban areas. We define the knowledge diffusion proxy, and scientific production ranking algorithms to capture the spatio-temporal dynamics of Physics knowledge worldwide. By using the knowledge diffusion proxy we identify the key cities in the production and consumption of knowledge in Physics as a function of time. The results from the scientific production ranking algorithm allow us to characterize the top cities for scholarly research in Physics. Although we focus on a single dataset concerning a specific field, the methodology presented here opens the path to comparative studies of the dynamics of knowledge across disciplines and research areas

  8. Systematic Discrimination of Advanced Hydrogen Production Technologies

    SciTech Connect (OSTI)

    Charles V. Park; Michael W. Patterson

    2010-07-01

    The U.S. Department of Energy, in concert with industry, is developing a high-temperature gas-cooled reactor at the Idaho National Laboratory (INL) to demonstrate high temperature heat applications to produce hydrogen and electricity or to support other industrial applications. A key part of this program is the production of hydrogen from water that would significantly reduce carbon emissions compared to current production using natural gas. In 2009 the INL led the methodical evaluation of promising advanced hydrogen production technologies in order to focus future resources on the most viable processes. This paper describes how the evaluation process was systematically planned and executed. As a result, High-Temperature Steam Electrolysis was selected as the most viable near-term technology to deploy as a part of the Next Generation Nuclear Plant Project.

  9. 28 April 2015 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    database houses key information on existing community-scale modern wood heating and combined heat and power power plants, sawmills, and pellet mills. Not only will the BERC database provide wood heating systems / FORESTY PRODUCTS INTEREST GROUP BERC launches updated community-scale wood heating database By Biomass

  10. eBusiness in the United States Forest Products Industry in the Year 2000 Richard P. Vlosky1

    E-Print Network [OSTI]

    Wu, Qinglin

    of the forest products industry in the United States. One thousand solid wood products and 300 pulp and paper in 2001. KEYWORDS: INTERNET, EBUSINESS, FOREST PRODUCTS, SOLID WOOD, PULP AND PAPER, UNITED STATES industry in the United States (Vlosky 1999). This paper discusses key findings from the most recent study

  11. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  12. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    SciTech Connect (OSTI)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L. Shields, A. J.; Penty, R. V.

    2014-02-03

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70?km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25?km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment.

  13. By-Products Utilization

    E-Print Network [OSTI]

    Wisconsin-Milwaukee, University of

    dioxide control technologies. Figure 1 shows clean coal technology benefits(2) . In 1977, the conceptCenter for By-Products Utilization CLEAN COAL BY-PRODUCTS UTILIZATION IN ROADWAY, EMBANKMENTS electricity production is from the use of coal-based technologies(1) . This production is estimated

  14. White Paper on Energy Efficiency Status of Energy-Using Products in China (2012)

    E-Print Network [OSTI]

    Zhou, Nan

    2013-01-01

    industrial equipment such as motors is the product category with the largest energyindustrial equipment sector, the energy efficiency levels for one key product, motors,Industrial equipment: small and medium three phase asynchronous motors, power transformers, ventilation fans, AC contactors. 2.9 Energy

  15. Evaluation of catalysts and membranes for high yield biohydrogen production via electrohydrogenesis in

    E-Print Network [OSTI]

    Evaluation of catalysts and membranes for high yield biohydrogen production via electrohydrogenesis Park, PA 16802, USA E-mail: blogan@psu.edu Hydrogen gas can be produced from fermentation end products is improved for producing H2 gas in MECs using AEMs. Key words | BEAMR, biohydrogen, bioreactors, catalysts

  16. Support of benthic invertebrates by detrital resources and current autochthonous primary production: results

    E-Print Network [OSTI]

    Pace, Michael L.

    of terrestrial inputs and old autochthonous production from prior seasons. We quantified the importance of allochthonous terrestrial detritus contribute substantially to the total organic carbon (C) budget (Kajak more rare. Given that benthic pathways often play a key role in lake production and food web dynamics

  17. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I 14/%2A en DOE/NNSAby

  18. Experimental Study and Computational Simulations of Key Pebble Bed Thermo-mechanics Issues for Design and Safety

    SciTech Connect (OSTI)

    Tokuhiro, Akira; Potirniche, Gabriel; Cogliati, Joshua; Ougouag, Abderrafi

    2014-07-08

    An experimental and computational study, consisting of modeling and simulation (M&S), of key thermal-mechanical issues affecting the design and safety of pebble-bed (PB) reactors was conducted. The objective was to broaden understanding and experimentally validate thermal-mechanic phenomena of nuclear grade graphite, specifically, spheres in frictional contact as anticipated in the bed under reactor relevant pressures and temperatures. The contact generates graphite dust particulates that can subsequently be transported into the flowing gaseous coolent. Under postulated depressurization transients and with the potential for leaked fission products to be adsorbed onto graphite 'dust', there is the potential for fission products to escape from the primary volume. This is a design safety concern. Furthermore, earlier safety assessment identified the distinct possibility for the dispersed dust to combust in contact with air if sufficient conditions are met. Both of these phenomena were noted as important to design review and containing uncertainty to warrant study. The team designed and conducted two separate effects tests to study and benchmark the potential dust-generation rate, as well as study the conditions under which a dust explosion may occure in a standardized, instrumented explosion chamber.

  19. Robust design as a driver of engine cylinder heads evolution : a framework for identifying product improvement paths

    E-Print Network [OSTI]

    Gómez de la Mora, Luz de Lourdes

    2005-01-01

    The fundamental goal of Robust Design is to improve the quality of a product by minimizing the effects of variation. A key contributor to robustness over the long term is R&D. Therefore, a framework is desired to help ...

  20. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must