Powered by Deep Web Technologies
Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Extracting Key Factors to Design Applications in Ambient Intelligence Environment  

Science Conference Proceedings (OSTI)

In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary in developing those applications. We developed four applications applied ... Keywords: ambient feedback, persuasive technology, behavior modification, emotional engagement

Hiroaki Kimura; Tatsuo Nakajima

2008-12-01T23:59:59.000Z

2

EIA highlights key factors in new energy and financial markets ...  

U.S. Energy Information Administration (EIA)

Yesterday, EIA launched a new web-based assessment highlighting key factors that can affect crude oil prices called "Energy and Financial Markets: What Drives Crude ...

3

DVD Production Process & Key Factors for Quality Discs  

Science Conference Proceedings (OSTI)

... wide market share for DVD +/- RW; #2 World-wide market share for CD ... Key factor - deep knowledge of forming thin metal film - optimization of ...

2006-01-20T23:59:59.000Z

4

Design Factors That Influence Corrosion  

Science Conference Proceedings (OSTI)

Table 3   Corrosion factors that can influence design considerations...Inhibitors Inspection Planned maintenance Source: Ref 25...

5

Key parameters influencing the performance of photocatalytic oxidation  

NLE Websites -- All DOE Office Websites (Extended Search)

Key parameters influencing the performance of photocatalytic oxidation Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Title Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Publication Type Journal Article Year of Publication 2012 Authors Destaillats, Hugo, Mohamad Sleiman, Douglas P. Sullivan, Catherine Jacquiod, Jean Sablayrolles, and Laurent Molins Journal Applied Catalysis B: Environmental Volume 128 Pagination 159-170 Date Published 11/30/2012 Abstract Photocatalytic oxidation (PCO) air cleaning is a promising technology suitable for the elimination of a broad range of volatile organic compounds (VOCs). However, performance of poorly designed PCO systems may be affected by the formation of volatile aldehydes and other partially oxidized byproducts. This study explored the role of key design and dimensioning parameters that influence the effective removal of primary pollutants and can help reduce or eliminate the formation of secondary byproducts. A model pollutant mixture containing benzene, toluene, o-xylene, undecane, 1-butanol, formaldehyde and acetaldehyde was introduced at a constant rate in a 20-m3 environmental chamber operating at an air exchange rate of 1 h-1. Individual pollutant concentrations were kept at realistically low levels, between 2 and 40 μg m-3. A prototype air cleaner provided with flat or pleated PCO filtering media was operated in an external ductwork loop that recirculated chamber air at flow rates in the range 178-878 m3 h-1, corresponding to recycle ratios between 8.5 and 38. Air samples were collected upstream and downstream of the air cleaner and analyzed off-line to determine single-pass removal efficiency. The final-to-initial chamber concentration ratio was used to determine the global chamber removal efficiency for each pollutant. In the flat filter configuration, longer dwelling times of compounds on the TiO2 surface were attained by reducing the recirculation airflow by a factor of ∼5, leading to increasing total pollutant removal efficiency from 5% to 44%. Net acetaldehyde and formaldehyde removal was achieved, the later at airflow rates below 300 m3 h-1, illustrating the critical importance of controlling the contact time of primary and secondary pollutants with the TiO2 surface. The use of pleated media was shown to increase significantly the system performance by extending the dwelling time of pollutants on the irradiated surface of the PCO media, with a 70% degradation of target pollutants. With the pleated media, formaldehyde removal efficiency increased to 60%. Irradiation using either a UVC or a UVA lamp under identical flow conditions produced similar pollutant elimination. A simple correlation between the steady-state single pass removal efficiency and the global chamber removal efficiency was used to rationalize these experimental results and identify optimal operating conditions.

6

Factors influencing German private equity investment in US real estate  

E-Print Network (OSTI)

This thesis identifies and ranks in order of importance the key factors influencing high net-worth German investors' decisions about US real estate private equity investments. Through research and in-depth interviews with ...

Paelmo, Kay L. (Kay Lee), 1977-

2003-01-01T23:59:59.000Z

7

Key website factors in e-business strategy  

Science Conference Proceedings (OSTI)

The design of a quality website, as part of e-business strategy, has become a key element for success in the online market. This article analyzes the main factors that must be taken into account when designing a commercial website, concentrating on the ... Keywords: Accessibility, Content, Navigability, Speed, Web Assessment Index (WAI), Website

Blanca HernNdez; Julio JimNez; M. Jos MartN

2009-10-01T23:59:59.000Z

8

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network (OSTI)

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect air-quality in rooms of multi-polluting heat sources. Results show that it is very important to determine the suitable air-intemperature , air-inflow, and heat source quantity and dispersion, to obtain better displacement ventilation results.

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

9

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

Science Conference Proceedings (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

10

Critical factors influencing employment of disabled persons in Malaysia.  

E-Print Network (OSTI)

??This study examines key factors that affect opportunities for employment of disabled people in Malaysia. Four factors are covered by the study; these are namely, (more)

Ramakrishnan, Prabha.

2007-01-01T23:59:59.000Z

11

Factors influencing coke gasification with carbon dioxide.  

E-Print Network (OSTI)

??Of all coke properties the influence of the catalytic mineral matter on reactivity of metallurgical cokes is least understood. There is limited information about the (more)

Grigore, Mihaela

2007-01-01T23:59:59.000Z

12

Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift  

E-Print Network (OSTI)

1 Abstract-- Distribution factors play a key role in many system security analysis and market of the other distribution factors. The line outage distribution factors (LODFs) may be computed using the ISFs distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION

13

Agronomic and environmental factors influence weed composition and canola competitiveness  

E-Print Network (OSTI)

Agronomic and environmental factors influence weed composition and canola competitiveness. C. 2006. Agronomic and environmental factors influence weed composition and canola competitiveness in southern Manitoba. Can. J. Plant Sci. 86: 591­599. Canola yield in Manitoba has reached a plateau in recent

Kenkel, Norm

14

Factors influencing county level household fuelwood use  

Science Conference Proceedings (OSTI)

This study explains household fuelwood consumption behavior at the county level by linking it to economic and demographic conditions in counties. Using this link, counties are identified where potential fuelwood use problems and benefits are greatest. A probit equation estimates household probability of wood use (percent woodburners in a county heating degree days, household income, nonwood fuel price, fuelwood price, percent forest land, population density, and fraction of households using various types of heating equipment. A linear-in-parameters equation estimates average wood consumed by a woodburner based on county heating degree days, household income, percent forest land, and price of nonwood fuel divided by fuelwood price. Parameters are estimated using fuelwood use data for individual households from a 1908-81 nationwide survey. The probit equation predicts percentage of wood burns well over a wide range of county conditions. The wood consumption equation overpredicts for counties with high income and high population density (over 6000 persons per square mile). The model shows average woodburning per household over all households decreases with increasing population density, and the influence of county economic characteristics varies with density.

Skog, K.E.

1986-01-01T23:59:59.000Z

15

Human Factors Engineering Program Review Model (NUREG-0711)Revision 3: Update Methodology and Key Revisions  

SciTech Connect

The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. NUREG-0711 is the first document to be addressed. We present the methodology used to update NUREG-0711 and summarize the main changes made. Finally, we discuss the current status of the update program and the future plans.

OHara J. M.; Higgins, J.; Fleger, S.

2012-07-22T23:59:59.000Z

16

New England Wind Forum: Determining Factors Influencing Wind Economics in  

Wind Powering America (EERE)

Determining Factors Influencing Wind Economics in New England Determining Factors Influencing Wind Economics in New England Figure 1: Installed Wind Project Costs by Region: 2003 through 2006 Projects Only New England's high land values, smaller land parcels, varied terrain, and more moderate wind speeds make for projects of smaller scale and higher unit cost than those likely to be built in Texas or the Great Plains states. Click on the graph to view a larger version. New England's high land values, smaller land parcels, varied terrain, and more moderate wind speeds make for projects of smaller scale and higher unit cost than those likely to be built in Texas or the Great Plains states. View a larger version of the graph. Figure 2: 2006 Project Capacity Factors by Region: 2002 through 2005 Projects Only The chart depicts project capacity factor by region. Click on the graph to view a larger version.

17

Geological and Anthropogenic Factors Influencing Mercury Speciation in Mine  

NLE Websites -- All DOE Office Websites (Extended Search)

Geological and Anthropogenic Factors Influencing Mercury Speciation Geological and Anthropogenic Factors Influencing Mercury Speciation in Mine Wastes Christopher S. Kim,1 James J. Rytuba,2 Gordon E. Brown, Jr.3 1Department of Physical Sciences, Chapman University, Orange, CA 92866 2U.S. Geological Survey, Menlo Park, CA 94025 3Department of Geological and Environmental Sciences, Stanford University, Stanford, CA 94305 Introduction Figure 1. Dr. Christopher Kim collects a mine waste sample from the Oat Hill mercury mine in Northern California. The majority of mercury mine wastes at these sites are present as loose, unconsolidated piles, facilitating the transport of mercury-bearing material downstream into local watersheds. Mercury (Hg) is a naturally occurring element that poses considerable health risks to humans, primarily through the consumption of fish which

18

Factors influencing trace element composition in human teeth  

SciTech Connect

The authors recently compiled and reviewed the literature published in or after 1978 for 45 major, minor, and trace elements in human teeth as a part of an International Atomic Energy Agency (IAEA) study. The purpose of this paper is to discuss the various factors that influence the concentration levels of certain trace elements in human teeth. The sampling practices and analytical techniques that are applicable for trace element analysis are also discussed. It is also our intention to identify reference range of values, where data permit such conclusions. The scrutiny was designed to identify only the healthy permanent teeth, and values from teeth with fillings, caries, or periodontal diseases were eliminated.

Tandon, L. [Los Alamos National Lab., NM (United States); Iyengar, G.V. [Biomineral Sciences International, Inc., Bethesda, MD (United States)

1997-12-01T23:59:59.000Z

19

An Instrument for Measuring the Key Factors of Successin Software Process Improvement  

Science Conference Proceedings (OSTI)

Understanding how to implement SPI successfully is arguably the most challenging issue facing the SPI field today. The SPI literature contains many case studies of successful companies and descriptions of their SPI programs. However, there has ... Keywords: Software process improvement, measurement instrument, success factors

Tore Dyba

2000-12-01T23:59:59.000Z

20

A multi-project model of key factors affecting organizational benefits from enterprise systems  

Science Conference Proceedings (OSTI)

This paper develops a long-term, multi-project model of factors affecting organizational benefits from enterprise systems (ES), then reports a preliminary test of the model. In the shorter-term half of the model, it is hypothesized that once a system ... Keywords: IS implementation, IS project management, change management, enterprise system success, functional fit, improved access to information, integration, overcoming organizational inertia, packaged software, process optimization

Peter B. Seddon; Cheryl Calvert; Song Yang

2010-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Documentation of key factors for successful reconstruction of high volume roadways: two case study projects in Michigan  

E-Print Network (OSTI)

The highway system is reaching the end of its design life and requires rehabilitation due to excessive wear and age. Concrete pavement rehabilitation and reconstruction are two of the methods used to extend the service life of roadways. This study identified factors and practices that contributed to the success of highway concrete rehabilitation and reconstruction projects. The research was conducted on four specific topics related to highway projects: constructibility, contracting, scheduling and planning, and construction methods and practices. A comprehensive literature search was conducted to identify key elements that affect the success of highway rehabilitation projects on the above-mentioned areas. The search assisted in the preparation of an interview tool that included a questionnaire designed to gather information related to reconstruction projects aiming to identify and evaluate key success factors. Two highway reconstruction projects were selected for study. The evaluation of the projects was conducted through a series of personal interviews with personnel from the key parties involved in the projects, as well as visits to the construction sites to video and analyze construction operations. The information gathered was evaluated through descriptive analysis.

De Las Casas Moncloa, Rodrigo

2001-01-01T23:59:59.000Z

22

Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.  

Science Conference Proceedings (OSTI)

The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

2008-03-28T23:59:59.000Z

23

Do internal factors of cooperation influence computer-mediated distance activity?  

Science Conference Proceedings (OSTI)

On the one hand, researchers have studied factors that influence collaboration and on the other, researchers have proposed models of collaborative problem solving. However, we have not found research on the relation between these factors and the dimensions ...

Kristine Lund; Cline Rossetti; Stphanie Metz

2007-07-01T23:59:59.000Z

24

Factors Influencing Skill Improvements in the ECMWF Forecasting System  

Science Conference Proceedings (OSTI)

During the past 30 years the skill in ECMWF numerical forecasts has steadily improved. There are three major contributing factors: 1) improvements in the forecast model, 2) improvements in the data assimilation, and 3) the increased number of ...

Linus Magnusson; Erland Klln

2013-09-01T23:59:59.000Z

25

Factors influencing biological treatment of MTBE contaminated ground water  

DOE Green Energy (OSTI)

Methyl tert-butyl ether (MTBE) contamination has complicated the remediation of gasoline contaminated sites. Many sites are using biological processes for ground water treatment and would like to apply the same technology to MTBE. However, the efficiency and reliability of MTBE biological treatment is not well documented. The objective of this study was to examine the operational and environmental variables influencing MTBE biotreatment. A fluidized bed reactor was installed at a fuel transfer station and used to treat ground water contaminated with MTBE and gasoline hydrocarbons. A complete set of chemical and operational data was collected during this study and a statistical approach was used to determine what variables were influencing MTBE treatment efficiency. It was found that MTBE treatment was more sensitive to up-set than gasoline hydrocarbon treatment. Events, such as excess iron accumulation, inhibited MTBE treatment, but not hydrocarbon treatment. Multiple regression analysis identified biomass accumulation and temperature as the most important variables controlling the efficiency of MTBE treatment. The influent concentration and loading of hydrocarbons, but not MTBE, also impacted MTBE treatment efficiency. The results of this study suggest guidelines for improving MTBE treatment. Long cell retention times in the reactor are necessary for maintaining MTBE treatment. The onset of nitrification only occurs when long cell retention times have been reached and can be used as an indicator in fixed film reactors that conditions favorable to MTBE treatment exist. Conversely, if the reactor can not nitrify, it is unlikely to have stable MTBE treatment.

Stringfellow, William T.; Hines Jr., Robert D.; Cockrum, Dirk K.; Kilkenny, Scott T.

2001-09-14T23:59:59.000Z

26

Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer  

Science Conference Proceedings (OSTI)

Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.

Phillips, J.S.; Clauss, D.B. [Sandia National Labs., Albuquerque, NM (United States); Blower, D.F. [Univ. of Michigan Transportation Research Institute, Ann Arbor, MI (United States). Center for National Truck Statistics

1994-04-01T23:59:59.000Z

27

Factors influencing e-government maturity in transition economies and developing countries: a longitudinal perspective  

Science Conference Proceedings (OSTI)

This study examines the influences of relevant environmental factors on E-government (E-gov) maturity in transition economies and developing countries (TEDC). Countries from Eastern Europe, Sub-Saharan Africa, Latin American and South Asia were selected ... Keywords: developing countries, e-government growth, neoclassical economic theories, transition economies

Princely Ifinedo

2012-01-01T23:59:59.000Z

28

Worldwide digital divide: influences of education, workforce, economic, and policy factors on information technology  

Science Conference Proceedings (OSTI)

The research goal is to analyze the influence of education, workforce, economic, and policy factors on ICT usage, expenditure, and infrastructure in 67 countries. Findings indicate importance of R&D capacity, foreign direct investment, government prioritization ... Keywords: IT workforce, R&D, digital divide, education, global, information technology, policy, socioeconomic

James B. Pick; Rasool Azari

2007-04-01T23:59:59.000Z

29

SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II  

Science Conference Proceedings (OSTI)

Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

2011-10-31T23:59:59.000Z

30

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INDIAN COUNTRY ENERGY AND INFRASTRUCTURE WORKING GROUP ICEIWG Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado...

31

KEY PERSONNEL  

National Nuclear Security Administration (NNSA)

APPENDIX J KEY PERSONNEL 07032013 TITLE NAME President Christopher C. Gentile Vice President, Operations Robin Stubenhofer Director, Sr. Program Management Rick Lavelock...

32

Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea  

E-Print Network (OSTI)

The core competency of the most effective organizations will be their capacity to learn in an increasingly complex and unpredictable business environment and HRD should expand its role to become a partner in the transformation of the entire organization. Organizational learning style, therefore, is an important research topic for the field of HRD (human resource development). This study had four primary purposes, which were germane to the corporations in the Republic of Korea: 1) to identify what organizational learning styles exist; 2) to identify the factors that differentiate the organizations with different organizational learning styles; 3) to identify the roles of HRD to facilitate organizational learning within the organizations in each organizational learning style; and 4) to identify the differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles. The population for this study was the key informants at the corporations in the three industry areas: wholesale and retail trade; manufacturing; and hotels and restaurants. The survey instrument was delivered to 353 key informants, i.e. HR persons, at 240 corporations and 237 key informants at 166 corporations returned the survey instrument for a return rate of 67.1%. The findings of this study revealed the followings: 1) there are four types of organizational learning styles and the characteristics of each type of organizational learning style is determined by the combination of the organizations?? learning orientations, i.e. Knowledge Source, Learning Content, Dissemination Mode, and Learning Scope; 2) types of organizational culture, industry classification, and the size of an organization are the factors that differentiate the organizations with different organizational learning styles; 3) all roles of HRD are necessary for facilitating organizational learning; and 4) there are not differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles.

Jeong, Jinchul

2003-05-01T23:59:59.000Z

33

Factors influencing helium measurements for detection of control rod failures in BWR  

SciTech Connect

Much effort has been made to minimize the number and consequences of fuel failures at nuclear power plants. The consequences of control rod failures have also gained an increased attention. In this paper we introduce a system for on-line surveillance of control rod integrity which has several advantages comparing to the surveillance methods available today in boiling water reactors (BWRs). This system measures the helium released from failed control rods containing boron carbide (B4C). However, there are a number of factors that might influence measurements, which have to be taken into consideration when evaluating the measured data. These factors can be separated into two groups: 1) local adjustments, made on the sampling line connecting the detector to the off-gas system, and 2) plant operational parameters. The adjustments of the sample line conditions include variation of gas flow rate and gas pressure in the line. Plant operational factors that may influence helium measurements can vary from plant to plant. The factors studied at Leibstadt nuclear power plant (KKL) were helium impurities in injected hydrogen gas, variation of the total off-gas flow and regular water refill. In this paper we discuss these factors and their significance and present experimental results of measurements at KKL. (authors)

Larsson, I.; Sihver, L. [Div. of Nuclear Engineering, Dept. of Applied Physics, Chalmers Univ. of Technology, SE-412 96 Gothenburg (Sweden); Loner, H.; Ledergerber, G. [Kernkraftwerk Leibstadt, CH-5325 Leibstadt (Switzerland); Schnurr, B. [E.ON Kernkraft GmbH, D-84049 Essenbach (Germany)

2012-07-01T23:59:59.000Z

34

Performance of Anidolic Daylighting Systems in tropical climates - Parametric studies for identification of main influencing factors  

Science Conference Proceedings (OSTI)

Making daylight more available in buildings is highly desirable, not only for reasons of energy-efficiency, but also for improvement of occupants' health and well-being. Core-daylighting, that is daylight provision in areas situated at considerable distances from facades and windows, is currently one of the main challenges in sustainable building design. Anidolic Daylighting Systems (ADSs) are one very promising technology in the field of core-daylighting, but commercial solutions that are not only well-performing but also financially competitive are not yet widely available. This article presents results of parametric studies on Anidolic Integrated Ceilings (AICs), a special type of ADS, for identification of main influencing factors. The article describes a reliable method for simulating ADS and AIC performance under given sky conditions. Various simulation results for the example location Singapore are discussed in detail, it is concluded that the main influencing factors are coating material, system dimensions and external obstruction, and those influencing factors' potential impacts are quantified. It is shown that AIC overall efficiencies can reach up to almost 50% in Singapore. The essentially new results presented in this article can be of great help to architects, engineers and scientists in the future, when it comes to precisely dimensioning ADS for various buildings and daylight conditions. (author)

Linhart, Friedrich; Scartezzini, Jean-Louis [Solar Energy and Building Physics Laboratory (LESO-PB), Swiss Federal Institute of Technology in Lausanne (EPFL), 1015 Lausanne (Switzerland); Wittkopf, Stephen K. [School of Design and Environment, Department of Architecture, National University of Singapore, 4 Architecture Drive, Singapore 117566 (Singapore)

2010-07-15T23:59:59.000Z

35

Key Documents  

Science Conference Proceedings (OSTI)

AOCS by-laws, code of ethics and anti trust policy established during our 100+ legacy. Key Documents AOCS History and Governance about us aocs committees contact us division council fats governing board history oils professionals science value cen

36

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Points & Action Items Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado Participants Tracey LeBeau, Director, Pilar Thomas, Deputy Director, and Brandt Petrasek, Special Assistant, Department of Energy, Office of Indian Energy Policy and Programs; Vice Chairman Ronald Suppah and Jim Manion, Confederated Tribes of the Warm Springs Reservation of Oregon; William Micklin, Ewiiaapaayp Band of Kumeyaay Indians; Councilman Barney Enos, Jr., Jason Hauter, Gila River Indian Community; Mato Standing High, Rosebud Sioux Tribe; R. Allen Urban, Yocha Dehe Wintun Nation; Glen Andersen, Scott Hendrick, Brooke Oleen, Jacquelyn Pless, Jim Reed and Julia Verdi, National Conference of State Legislatures-staff

37

Key condenser failure mechanisms  

Science Conference Proceedings (OSTI)

Eight practical lessons highlight many of the factors that can influence condenser tube corrosion at coal-fired utilities and the effects contaminant in-leakage can have on steam generating units. 1 ref., 4 figs.

Buecker, B.

2009-04-15T23:59:59.000Z

38

Statistical Analysis of Precipitation Chemistry Measurements over the Eastern United States. Part IV: The Influences of Meteorological Factors  

Science Conference Proceedings (OSTI)

The influences of meteorological factors on precipitation acidity and constituent concentrations were investigated statistically using selected portions of a new archive of daily precipitation chemistry measurements for the eastern United States. ...

C. Maxwell; B. P. Eynon; R. M. Endlich

1988-12-01T23:59:59.000Z

39

Effects of No-Till on Yields as Influenced by Crop and Environmental Factors  

Science Conference Proceedings (OSTI)

Th is research evaluated diff erences in yields and associated downside risk from using no-till and tillage practices. Yields from 442 paired tillage experiments across the United States were evaluated with respect to six crops and environmental factors including geographic location, annual precipitation, soil texture, and time since conversion from tillage to no-till. Results indicated that mean yields for sorghum [Sorghum bicolor (L.) Moench] and wheat (Triticum aestivum L.) with no-till were greater than with tillage. In addition, no-till tended to produce similar or greater mean yields than tillage for crops grown on loamy soils in the Southern Seaboard and Mississippi Portal regions. A warmer and more humid climate and warmer soils in these regions relative to the Heartland, Basin and Range, and Fruitful Rim regions appear to favor no-till on loamy soils. With the exception of corn (Zea mays L.) and cotton (Gossypium hirsutum L.) in the Southern Seaboard region, no-till performed poorly on sandy soils. Crops grown in the Southern Seaboard were less likely to have lower no-till yields than tillage yields on loamy soils and thus had lower downside yield risk than other farm resource regions. Consistent with mean yield results, soybean [Glycine max (L.) Merr.] and wheat grown on sandy soils in the Southern Seaboard region using no-till had larger downside yield risks than when produced with no-till on loamy soils. Th e key fi ndings of this study support the hypothesis that soil and climate factors impact no-till yields relative to tillage yields and may be an important factor infl uencing risk and expected return and the adoption of the practice by farmers.

Toliver, Dustin K.; Larson, James A.; Roberts, Roland K.; English, B.C.; De La Torre Ugarte, D. G.; West, Tristram O.

2012-02-07T23:59:59.000Z

40

An analysis of factors that influence community college students' attitudes toward technology  

E-Print Network (OSTI)

This study investigated the factors that influence community college students' attitudes toward technology, particularly in teaching and learning experiences. Studies on post-secondary students' attitudes reported in the literature are limited. Factors cited previously as having an effect on attitudes towards technology and toward computers included: gender; age; presence of a computer in the home; completion of a formal technology course; and comfort with technology. The subjects in this study were 372 students in freshman level credit English classes in the five colleges of the North Harris Montgomery Community College District located in the greater metropolitan Houston area. Previous research instruments and studies to measure students' attitudes toward technology were reviewed. A modified version of the Secondary Students Attitudes' Toward Technology (SSATT) was developed for this study because of the content, reliability, and applicability to the postsecondary population. The instrument was administered in the spring of 2005. The fact that 95.4% of the participants reported having a computer at home and that 70.2% reported having had a formal technology class provided insight into the integration of technology in the lives of this community college sample. A correlation matrix of all variables and analysis of variance were performed. Factor analyses were performed to identify subcomponents of the instrument. Eight factors were identified: (1) need for technology competence, (2) technology benefits, (3) negative aspects of technology, (4) technology and the workplace, (5) impact of increased use of technology, (6) video games, (7) technology and job creation, and (8) technology and safety. A conclusion of the study was that neither age nor gender had a significant effect on the post-secondary students' attitudes toward technology, which differs from the findings in some of the previous studies. Females reported being as comfortable, if not more so, with technology in teaching and learning experiences as the males in the study. Exposure to technology, completion of a formal technology class, and the use of computers appeared to positively affect community college students' attitudes toward technology.

Fleming, Kathleen Literski

2005-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Factors influencing Kemp's ridley sea turtle (Lepidochelys kempii) distribution in nearshore waters and implications for management  

E-Print Network (OSTI)

Post-pelagic juvenile and subadult Kemp's ridley sea turtles (Lepidochelys kempii) (20-40 cm straight carapace length) utilize nearshore waters of the northwestern Gulf of Mexico as nursery or developmental feeding grounds. This study utilizes 10 years of entanglement netting data to characterize long-term abundance and distribution of Kemp's ridley sea turtles at index habitats in this region. Netting surveys were conducted during April-October 1993-2002, primarily at Sabine Pass, Texas and Calcasieu Pass, Louisiana. Additionally, this study takes an ecosystem-based approach to understanding factors influencing Kemp's ridley in-water abundance and distribution via the development of a conceptual model incorporating data on nesting dynamics, environmental conditions, prey availability, and predation pressure. Overall monthly mean ridley catch-per-unit-effort (CPUE) peaked in the beginning of summer (April-June), probably in response to rising water temperatures and seasonal occurrence of blue crab prey. Annual mean ridley CPUE across all study areas peaked in 1994, 1997, 1999 and 2002, suggesting a 2-3 year cycle in abundance that may be related to patterns in clutch size or hatch success at the Rancho Nuevo, Mexico nesting beach. However, ridley CPUE in nearshore waters remained relatively constant or decreased slightly even as number of hatchlings released from Rancho Nuevo increased exponentially. Annual declines in Texas strandings since 1994 and subsequent increases in Florida counterparts since 1995 suggest a shift in ridley distribution from the western to eastern Gulf in recent years. Significant declines in ridley CPUE at Sabine Pass since 1997 coincided with a concurrent reduction in blue crab size, but a similar trend was not detected at Calcasieu Pass. Kemp's ridley occurrence at study sites was not significantly related to shrimping activity/by-catch. There also were no biologically significant relationships between Kemp's ridley CPUE and abiotic factors, nor were ridleys deterred from utilizing areas frequented by bull sharks. Overall, nesting dynamics and prey availability were conceptual model components appearing to have the greatest influence on nearshore ridley occurrence.

Metz, Tasha Lynn

2004-08-01T23:59:59.000Z

42

A Study on the Contribution of 12 Key-Factors to the Growth Rates of the Region of the East Macedonia-Thrace EMTH by Using a Neural Network Model  

Science Conference Proceedings (OSTI)

This study gives a new methodological framework regarding the measuring of the contribution of some key-factors on the regional growth rate and forecasting the future development rates, based on Neural Network Models NN Models. It's a serious attempt ... Keywords: East Macedonia, Future Forecasting, Neural Networks NN, Regional Gross Domestic Product, Regional Growth Rate, Time Series

E. Stathakis; M. Hanias; P. Antoniades; L. Magafas; D. Bandekas

2012-01-01T23:59:59.000Z

43

AOCS/SFA Edible Oils Manual, 2nd EditionChapter 1 Factors Influencing Edible Oil Selection  

Science Conference Proceedings (OSTI)

AOCS/SFA Edible Oils Manual, 2nd Edition Chapter 1 Factors Influencing Edible Oil Selection Food Science eChapters Food Science & Technology AOCS 24539A003AE0A27C83030CB077DF5C09 Press Downloadable pdf of

44

Forward osmosis for desalination and water treatment : a study of the factors influencing process performance.  

E-Print Network (OSTI)

??This thesis explores various factors that have significant impacts on FO process performance in desalination and water treatment. These factors mainly include working temperatures, solution (more)

Zhao, Shuaifei

2012-01-01T23:59:59.000Z

45

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

46

A Study of Circadian Rhythm and Meteorological Factors Influencing Acute Myocardial Infarction  

E-Print Network (OSTI)

The circadian rhythm in the occurrence of acute myocardial infarction (AMI) was assessed in three hundred and twenty three patients admitted with AMI during the two-year period June 1992 to May 1994. The influence of the following meteorological, solar-geophysical and cosmic parameters in the causation of an infarct was also considered : (1) surface pressure (2) maximum temperature (3) minimum temperature (4) relative humidity (5) cosmic ray index (6) geomagnetic aa index (7) solar flares and (8) sunspot number. A well pronounced diurnal variability in AMI with a peak in the morning hours (6-12 a.m.) was seen. Further analysis of the data by considering one-hour periods revealed the presence of a smaller evening (10 p.m.) increase in incidence, i.e., the existence of a bimodal circadian rhythm. The simultaneous occurrence of the well documented semi-diurnal rhythm in surface pressure and incidence of acute myocardial infarction were evident. This may be one of the factors involved in the causation of the smaller evening peak-the reasons for which were unclear till now. Month-to-month variation in surface pressure was also found to be significantly correlated with incidence of acute myocardial infarction. Recognition of a circadian rhythm in the onset of AMI suggests the need for enhanced pharmacological protection during the vulnerable periods. Significant correlations were also found between monthly incidence of AMI and month-to-month variation of cosmic ray index and solar flare counts. The pattern of incidence of AMI was seen to be modified by full moon and new moon. There was no association between maximum temperature, minimum temperature or relative humidity and incidence of AMI.

A. M. Selvam; D. Sen; S. M. S. Mody

1998-12-08T23:59:59.000Z

47

Catalogue of OSD and HID Offshore Research by Key Human Factor Elements 2002 Revision. Prepared by AEA Technology Environment for the Health and Safety Executive  

E-Print Network (OSTI)

The catalogue of OSD and HID Offshore human factors research was conceived by HSE OSD OD6 as an aid to OSD Inspectors and the offshore Industry. It was originally published in 1999 under Project 3696. This catalogue has now been updated by AEA Technology Environment. OSD Offshore has been renamed HID Offshore and hence the catalogue contains both OSD and HID Offshore human factors research, although the majority of the projects included date from the HSE Offshore Safety Division era. The catalogue provides: description of the human factor elements as derived by AEA Technology from the Revision

Angela Crosbie; Fiona Davies

2002-01-01T23:59:59.000Z

48

BUDGET KEY DATES  

Science Conference Proceedings (OSTI)

BUDGET KEY DATES. For Immediate Release: December 15, 2009. Contact: Diane Belford 301-975-8400. Budget Key Dates.

2013-06-16T23:59:59.000Z

49

Trust factors influencing the adoption of internet-based interorganizational systems  

Science Conference Proceedings (OSTI)

This study aims to empirically examine the trust factors that affect the adoption of Internet-based interorganizational systems (IIOS). A trust model with five trust factors is constructed. The model is tested using data gathered from 295 practitioners. ... Keywords: Electronic supply chain management, Information systems, Internet-based interorganizational systems, Trust

Ivan K. W. Lai; Viny W. L. Tong; Donny C. F. Lai

2011-01-01T23:59:59.000Z

50

Socio-economic and communication factors influencing the diffusion of solar-energy equipment among California homeowners  

Science Conference Proceedings (OSTI)

This dissertation explores the influence of socio-economic, communication, and social-psychological factors on the diffusion of solar-energy equipment among California homeowners. There were four specific objectives: (1) to critique previous studies on the diffusion of solar technology; (2) to critique fundamental aspects of current diffusion models and to formulate an alternative diffusion perspective; (3) to use the proposed theoretical perspective to predict solar diffusion; and (4) to test certain of the proposed predictions about solar diffusion. Data used to test some of the predictions were based on a state-wide random survey of 812 California homeowners. The dissertation presents two major findings. First, some of the best predictors of the solar-diffusion process were found to be age, socio-economic status, knowing solar owners, ownership of a swimming pool, utility costs, efficacy towards the energy situation, voluntary simplicity, energy consciousness, community size, and perceived community interest in solar. Second, these predictors were found to be strongly related to socio-economic status. The present study argues that these predictors are in fact post indicators of socio-economic status. Thus, whereas many of the previous studies tended to underestimate the influence of socio-economic factors, this study was able to demonstrate the crucial influence of socio-economic factors in determining the rate and pattern of solar diffusion. The data show that household solar-energy equipment is basically an innovation for high and medium socio-economic groups. The implications of these findings with regard to previous studies, policy, and future research are also discussed.

Mbindyo, J.M.

1981-01-01T23:59:59.000Z

51

A Study of the Dynamic Factors Influencing the Rainfall Variability in the West African Sahel  

Science Conference Proceedings (OSTI)

This study examines selected dynamical factors associated with wet and dry years in the West African Sahel. The approach is to evaluate the temperature, wind, and moisture fields and the dynamic instabilities for a 4-yrwet composite (195861) ...

Jeremy P. Grist; Sharon E. Nicholson

2001-04-01T23:59:59.000Z

52

Factors Influencing Community Health Centers' Efficiency: A Latent Growth Curve Modeling Approach  

Science Conference Proceedings (OSTI)

The objective of study is to examine factors affecting the variation in technical and cost efficiency of community health centers (CHCs). A panel study design was formulated to examine the relationships among the contextual, organizational structural, ... Keywords: Community health centers, Cost efficiency, Growth curve modeling, Technical efficiency

Shriram Marathe; Thomas T. Wan; Jackie Zhang; Kevin Sherin

2007-10-01T23:59:59.000Z

53

Identification of factors that influence the stiffness of high-damping elastomer seismic isolation bearings  

Science Conference Proceedings (OSTI)

During the past decade, high-damping elastomer, steel-laminated seismic isolation bearings have gained acceptance as a device for isolating large buildings and structures from earthquake damage. In the United States, architectural engineering firms custom design isolators for each project and ten have the isolators manufactured by one of less than a hand-full of manufactures. The stiffness of the bearing is the single most important design parameter that the molded bearing must meet because it determines the fundamental frequency of the isolation system. This paper reports on recent research that examined several factors that cause real and potential variations to the stiffness of the bearing. The resulting changes to the fundamental frequency of the isolated structure are quantified for each factor. The following were examined: (1) dimensional tolerances, (2) frequency effects, (3) temperature effects, (4) cyclical effects, and (5) aging effects. It was found that geometric variations barely affect the stiffness whereas temperature variations greatly affect the stiffness.

Kulak, R.F.; Hughes, T.H.

1994-06-01T23:59:59.000Z

54

QUANTITY OF RADIATION REACHING GONADAL AREAS DURING THERAPY. IV. FACTORS INFLUENCING OVARY DOSE  

SciTech Connect

Attempts were made to evaluate the circumstances influencing the quantity of radiation reaching the ovaries during dermatologic radiation therapy, and to devise effective methods for reducing the amount to well within acceptable limits. Measurements were made in a specially constructed, life-size, pressed- wood (masonite) phantom which could be used in almost any position that might be assumed by man during routine x-ray therapy, and with provisions for insertion of an ionization chamber at the anatomic site representing an ovary. The various parameters which might influence ovary dose during conventional dermatologic x- ray procedures that were studied included: x-ray quality (kvp), tube current (ma), beam collimation and field size, shielding, angle of the beam in relation to the ovaries, and proximity of treatment site to the ovaries. Ovarian dose was measured during irradiation of the face, upper chest, and back, using each of the parameters alone and then in various combinations. The results, presented in tables and graphs, show that in order to minimize ovary dose during dermatologic x-ray therapy, one should utilize lower tube kilovoltage, softer radiation, appropriate collimation, effective shielding (minimizing area of field irraiated) with no added filtration, increased distance between the x-ray beam axis and the ovaries, and angling on the x-ray tube away from the ovaries. The gonad dose can best be reduced by exerting all of these simple and inexpensive means every time dermatologic radiation is administered. However, from these measurements it was evident that of the body areas studied, some may be irradiated without fear of exceeding even the max permissible dose to the ovaries, whereas other areas cannot be treated with x-rays without overdosing the ovaries regardless of the pre cautions taken. (BBB)

Witten, V.H.; Lee, H.

1963-05-01T23:59:59.000Z

55

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

56

A review of the factors influencing the physicochemical characteristics of underground coal gasification  

Science Conference Proceedings (OSTI)

In this article, the physicochemical characteristics of the oxidation zone, the reduction zone, and the destructive distillation and dry zone in the process of underground coal gasification (UCG) were explained. The effect of such major factors as temperature, coal type, water-inrush or -intake rate, the quantity and quality of wind blasting, the thickness of coal seams, operational pressure, the length, and the section of gasification gallery on the quality of the underground gas and their interrelationship were discussed. Research showed that the temperature conditions determined the underground gas compositions; the appropriate water-inrush or -intake rate was conducive to the improvement in gas heat value; the properties of the gasification agent had an obvious effect on the compositions and heat value of the product gas. Under the cyclically changing pressure, heat losses decreased by 60%, with the heat efficiency and gasification efficiency being 1.4 times and 2 times those of constant pressure, respectively. The test research further proved that the underground gasifier with a long channel and a big cross-section, to a large extent, improved the combustion-gasification conditions.

Yang, L.H. [China University of Mining and Technology, Jiangsu (China)

2008-07-01T23:59:59.000Z

57

Fuzzy Comprehensive Evaluation Model and Influence Factors Analysis on Comprehensive Performance of Green Buildings  

E-Print Network (OSTI)

A green building involves complex system engineering including energy efficiency and energy utilization, water-saving and water utilization, material-saving and material utilization, and land-saving and indoor environment quality and operation management. In order to solve problems of subjectivity, uncertainty and impossibility of quantitative analysis when evaluating green building, this study establishes a multi-level fuzzy evaluation model by means of fuzzy mathematics method to analyze the comprehensive performance of green building according to the index system of Evaluation Standard for Green Building. Combined with the technique scheme of the first China green building demonstration project, the result proves to be in accordance with the pre-evaluation of experts. It shows that the fuzzy comprehensive evaluation method is reasonable and feasible to evaluate the comprehensive performance of green building. The evaluation result is the same as the pre-evaluation result. Factors with high weights have larger effects on the results. This proves that the guideline should be the first reference mode in the future engineering practice so as to realize optimization of green building performance.

Sun, J.; Wu, Y.; Dai, Z.; Hao, Y.

2006-01-01T23:59:59.000Z

58

Factors influencing the microwave pulse duration in a klystron-like relativistic backward wave oscillator  

SciTech Connect

In this paper, we analyze the factors that affect the microwave pulse duration in a klystron-like relativistic backward wave oscillator (RBWO), including the diode voltage, the guiding magnetic field, the electron beam collector, the extraction cavity, and the gap between the electron beam and the slow wave structure (SWS). The results show that the microwave pulse duration increases with the diode voltage until breakdown occurs on the surface of the extraction cavity. The pulse duration at low guiding magnetic field is generally 5-10 ns smaller than that at high magnetic field due to the asymmetric electron emission and the larger energy spread of the electron beam. The electron beam collector can affect the microwave pulse duration significantly because of the anode plasma generated by bombardment of the electron beam on the collector surface. The introduction of the extraction cavity only slightly changes the pulse duration. The decrease of the gap between the electron beam and the SWS can increase the microwave pulse duration greatly.

Xiao Renzhen; Zhang Xiaowei; Zhang Ligang; Li Xiaoze; Zhang Lijun [National Key Laboratory of Science and Technology on High Power Microwave, Northwest Institute of Nuclear Technology, Xi'an 710024 (China)

2012-07-15T23:59:59.000Z

59

Factors Influencing Time Resolution of Scintillators and Ways to Improve Them  

E-Print Network (OSTI)

The renewal of interest in Time of Flight Positron Emission Tomography (TOF-PET), as well as the necessity to precisely tag events in high energy physics (HEP) experiments at future colliders are pushing for an optimization of all factors affecting the time resolution of the whole acquisition chain comprising the crystal, the photo detector, and the electronics. The time resolution of a scintillator-based detection system is determined by the rate of photo electrons at the detection threshold, which depends on the time distribution of photons being converted in the photo detector. The possibility to achieve time resolution of about 100 ps Full Width at Half Maximum (FWHM) requires an optimization of the light production in the scintillator, the light transport and its transfer from the scintillator to the photo detector. In order to maximize the light yield, and in particular the density of photons in the first nanosecond, while minimizing the rise time and decay time, particular attention must be paid to the...

Lecoq, P; Brunner, S; Meyer, T; Auffray, E; Knapitsch, A; Jarron, P

2010-01-01T23:59:59.000Z

60

Investigating Indoor Radon Levels and Influencing Factors in Primary Schools of Zulfi City, Saudi Arabia  

SciTech Connect

Measurement of indoor Concentrations were performed in Zulfi city of Saudi Arabia, using CR-39 track etch detectors. This investigation focused on the influence of different parameters, namely different locations, school categories, school building types, and room type as well as on the existence of differences in radon concentration at floor levels. We divided the Zulfi city into five regions, keeping in mind their geographical locations between Tuwaiq Mountains and Al-Thuwayrat sands. The measured average radon concentrations for regions 1-5 respectively are: 87.0{+-}14.2 Bq/m{sup 3}, 83.4{+-}6.0 Bq/m{sup 3}, 61.6{+-}6.4 Bq/m{sup 3}, 63.7{+-}5.4 Bq/m{sup 3} and 87.5{+-}6.Bq/m{sup 3} and the minimum concentrations are 28.0 Bq/m{sup 3}, 5.5 Bq/m{sup 3}, 1.1 Bq/m{sup 3}, 1.0 Bq/m{sup 3} and 24 Bq/m{sup 3} respectively. These results are still within normal limits and below the action level of 148 Bqm{sup -3} set by the U.S. Environmental Protection Agency (EPA). A test of significance using Minitab program was applied to investigate if radon levels in regions are significantly different from each other. We tried all combinations, and found the following results. The ''within regions''(different location) test yielded, region 2 is not significant versus region ''1''(p = 0.783) and versus region ''5''(P = 0.646), whereas it is significant versus region ''3''(P = 0.0160) and also versus region ''4''(p = 0.018). We investigated government and rented school's building also and none was found significantly different (p = 0.052). Floors of the same building were tested in order to examine the radon concentration as a function of storey level. No significant difference was observed at floor levels (p = 0.009). When girl's schools versus Boys and kindergartens schools were tested they were found significantly different. It is believed that this significant difference is due to geographical nature of the area, since most of the girl's schools were selected from regions 2 and 3, these regions are relatively close to the Tuwaiq mountains whereas other regions are near to the Al-Thuwayrat sands.

Al-Ghamdi, S. S.; Al-Garawi, M. S.; Al-Mosa, Tahani M.; Baig, M. R. [Department of Physics and Astronomy, College of Science, King Saud University, P. O. Box 2455, Riyadh 11451 (Saudi Arabia)

2011-10-27T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The gender gap on concept inventories in physics: what is consistent, what is inconsistent, and what factors influence the gap?  

E-Print Network (OSTI)

We review the literature on the gender gap on concept inventories in physics. Across studies, men consistently score higher on pre-tests of the Force Concept Inventory (FCI) and Force and Motion Conceptual Evaluation (FMCE) by about 10%, and in most cases score higher on post-tests as well, also by about 10%. The average difference in normalized gain is about 6%. This difference is much smaller than the average difference in normalized gain between traditional lecture and interactive engagement (25%), but is large enough that it could impact the results of studies comparing the effectiveness of different teaching methods. Based on our analysis of 24 published articles comparing the impact of 34 factors that could potentially influence the gender gap, no single factor is sufficient to explain the gap. Several high-profile studies that have claimed to account for or reduce the gender gap have failed to be replicated, suggesting that isolated claims of explanations of the gender gap should be interpreted with ca...

Madsen, Adrian; Sayre, Eleanor C

2013-01-01T23:59:59.000Z

62

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

63

The Key Agreement Schemes  

Science Conference Proceedings (OSTI)

... The three key derivation functions include KDF in Counter Mode, KDF in Feedback Mode, and KDF in Double-Pipeline Iteration Mode. ...

2013-04-23T23:59:59.000Z

64

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

65

The wear of metal carbide stuck circular saw blades used in the spruce longitudinal sawing processing: a factor influencing power consumption  

Science Conference Proceedings (OSTI)

The power consumption for spruce wood processing is of about 70%., as in the case of the other resinous species. The wear of the circular saw blades is one of the factors which influences both the power consumption and the processing quality significantly. ... Keywords: cost, lastingness, power consumption, sawing, spruce, wear

Cosmin Spirchez; Anne-Marie Loredana Badescu; Valentin Ditu; Nicolae Taran; Pirnuta Oana-Andreea

2011-02-01T23:59:59.000Z

66

Using the DEMATEL based network process and structural equation modeling methods for deriving factors influencing the acceptance of smart phone operation systems  

Science Conference Proceedings (OSTI)

Smartphones have emerged as one of the most important consumer-electronic products during the past years. Therefore, researches on factors influencing consumers' behavior and thus, repurchase intention toward smartphones become the most critical issue ... Keywords: decision making trial and evaluation laboratory (DEMATEL), lead user theory, structural equation modeling (SEM), technology acceptance model (TAM)

Chi-Yo Huang; Ming-Jenn Wu; Yu-Wei Liu; Gwo-Hshiung Tzeng

2012-06-01T23:59:59.000Z

67

Optical key system  

Science Conference Proceedings (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, K.G.; Clough, R.E.

2000-04-25T23:59:59.000Z

68

Optical key system  

DOE Patents (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

69

SR Key Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Facts Savannah River Site Budget FY 2011 Budget Summary FY 2011 SRS EM Program Budget Summary FY 2012 Presidential Budget Request for SRS FY 2014 SRS EM Budget Presentation...

70

Key masking using biometry  

Science Conference Proceedings (OSTI)

We construct an abstract model based on a fundamental similarity property, which takes into account parametric dependencies and reflects a specific collection of requirements. We consider a method for masking a cryptographic key using biometry, which ...

A. L. Chmora

2011-06-01T23:59:59.000Z

71

Key Emergency Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Emergency Information What to Do if an Emergency Arises DOE is committed to public safety in the event an emergency arises. You will likely be made aware that an emergency is...

72

ARM - Key Science Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

govScienceKey Science Questions govScienceKey Science Questions Science Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) ARM Science Team Meetings User Meetings Annual Meetings of the Atmospheric System Research (ASR) Science Team and Fall Working Groups Accomplishments Read about the 20 years of accomplishments (PDF, 696KB) from the ARM Program and user facility. Performance Metrics ASR Metrics 2009 2008 2007 2006 Key Science Questions The role of clouds and water vapor in climate change is not well understood; yet water vapor is the largest greenhouse gas and directly affects cloud cover and the propagation of radiant energy. In fact, there may be positive feedback between water vapor and other greenhouse gases. Carbon dioxide and other gases from human activities slightly warm the

73

Evaluation criteria for blog design and analysis of causal relationships using factor analysis and DEMATEL  

Science Conference Proceedings (OSTI)

The purpose of this study is to find the key factors influencing blog design, and explore the causal relationships between the criteria for each factor. Since design is a multiple criteria decision-making (MCDM) problem, this study adopts a model which ... Keywords: Blog design, DEMATEL, Factor analysis, Multiple criteria decision-making (MCDM)

Chun-Cheng Hsu

2012-01-01T23:59:59.000Z

74

Key Research Results Achievement  

E-Print Network (OSTI)

daylighting options for specific spaces with sample design layouts · Various HVAC system types that achieve%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvanced school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy

75

Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... resulting in a pattern of light and dark lines ... whether the time is in seconds or days: factoring was ... decrypts to 'CAT', or 'TPW', which decrypts to 'DOG'. ...

2007-10-26T23:59:59.000Z

76

AP Key Accomplishments  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments Reduction of Carbon Dioxide Mechanistic insight into CO2 hydrogenation Rapid Transfer of Hydride Ion from a Ruthenium Complex to C1 Species in Water Reversible Hydrogen Storage using CO2 and a Proton-Switchable Iridium Catalyst in Aqueous Media Nickel(II) Macrocycles: Highly Efficient Electrocatalysts for the Selective Reduction of CO2 to CO Calculation of Thermodynamic Hydricities and the Design of Hydride Donors for CO2 Reduction Mechanisms for CO Production from CO2 Using Re(bpy)(CO)3X Catalysts Hydrogen Production Biomass-derived electrocatalytic composites for hydrogen evolution Hydrogen-Evolution Catalysts Based on NiMo Nitride Nanosheets Water Oxidation Enabling light-driven water oxidation via a low-energy RuIV=O intermediate

77

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

78

Influence of technological factors on statics of hydrogen sulfide absorption from coke-oven gas by the ammonia process  

SciTech Connect

The basic technological factors that determine the effectiveness of hydrogen sulfide absorption from coke-oven gas by the cyclic ammonia process are the initial H/sub 2/S content of the gas, the degree of purification, the absorption temperature and the NH/sub 3/ and CO/sub 2/ contents of the absorbent solution. The effects of these factors on the statics of hydrogen sulfide absorption are studied. The investigation is based on the phase-equilibrium distributions of components in the absorption-desorption gas-cleaning cycle. The mathematical model is presented which includes the solution of a system of chemical equilibrium equations for reactions in the solution, material balances, and electrical neutrality. 4 references, 5 figures, 1 table.

Nazarov, V.G.; Kamennykh, B.M.; Rus'yanov, N.D.

1983-01-01T23:59:59.000Z

79

Influence of the nucleon-nucleon collision geometry on the determination of the nuclear modification factor for nucleon-nucleus and nucleus-nucleus collisions  

Science Conference Proceedings (OSTI)

The influence of the underlying nucleon-nucleon collision geometry on evaluations of the nuclear overlap function (TAB) and number of binary collisions (Ncoll) is studied. A narrowing of the spatial distribution of the hard-partons with large light-cone fraction x in nucleons leads to a downward correction for Ncoll and TAB, which in turn, results in an upward correction for the nuclear modification factor RAB. The size of this correction is estimated for several experimentally motivated nucleon-nucleon overlap functions for hard-partons. It is found to be significant in peripheral nucleus-nucleus and nucleon-nucleus collisions, and is much larger at the LHC energy of {radical}s = 5.5 TeV than for the RHIC energy of {radical}s = 200 GeV. The implications for experimental measurements are also discussed.

Jia, J.i.

2009-11-01T23:59:59.000Z

80

Background on Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... Background on Quantum Key Distribution. ... If someone, referred to by cryptographers as Eve, tries to eavesdrop on the transmission, she will not ...

2011-08-02T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security proof of practical quantum key distribution schemes  

E-Print Network (OSTI)

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29T23:59:59.000Z

82

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

83

Identifying Socio-ecological Factors Influencing the Use of Prescribed Fire to Maintain and Restore Ecosystem Health in Texas, USA and Northern Chihuahua, Mexico  

E-Print Network (OSTI)

There is a critical need for more studies to identify socio-ecological drivers that affect conservation and management of fire adapted ecosystems, yet studies that identify such variables and explore their interaction in specific systems are not only scarce but limited to only a few systems. Although information on the socio-ecological effects of prescribed fire application exists, there is no integrative framework that simultaneously considers the interplay between social and ecological factors affecting the use of prescribed fires. Fire suppression, together with other human and natural disturbances in grassland systems that are adapted to episodic fire, are the major factors that have contributed to the recruitment of woody species into grasslands worldwide. Even though the ecology of restoring these fire prone systems back to a grassland state is becoming clearer, the major hurdle to reintroducing historic fire at a landscape scale is its social acceptability. To address these deficiencies, I studied the socio-ecological factors influencing the use of prescribed fire in Texas, USA and Chihuahua, Mexico using a combination of quantitative and qualitative approaches to examine how social and ecological factors affect ecosystem conservation and management of semi-arid grassland systems. For the Texas case study I used quantitative survey data analyzed using logistic regression models and structural equation models. For the Mexico case study I used qualitative interviews gathered using a snowball network sampling approach and coded them based on the analytic themes of land cover change, institutional failure, market drivers, and population dynamics. Results from the Texas case study suggest that risk taking orientation and especially, perceived support from others when implementing prescribed burns, play important roles in determining attitudes towards the use of high-intensity prescribed fires, which are sometimes needed to restore ecosystems. Results from the Texas case study also highlight how membership in Prescribed Burn Associations (PBAs) influence land manager decisions regarding the use of prescribed fire by reducing concerns over lack of skills, knowledge and resources. Results emphasize the potential for PBAs to reduce risk concerns regarding the application of prescribed fire and are relevant to management of brush encroached areas. Through PBAs, effective landscape-scale solutions to the brush encroachment problem can be achieved in Texas. Results from the Mexico case study show how fire stopped effectively being a driving factor on this system decades ago. Socio-political and ecological changes at the national, and international level produced changes in land use disrupting historical fire patterns and contributing to the ecological deterioration of the area. Droughts combined with poor management practices have depleted the fuel needed to carry a fire. Landowners also face safety and legal concerns but in most cases, even if a landowner decided to implement a prescribed burn, an ecological threshold has been crossed and current fine fuel loads (grass) are insufficient to carry a fire that is sufficiently intense to reduce brush cover and restore grassland and savanna ecosystems. Based on my findings I can conclude that ecologically sound adaptive management and social capital are fundamental components of the livelihoods of landowners and land managers in both case studies. Work and investment that is focused on strengthening this social capital will have the most profound effects in maintaining the integrity of grassland systems at a landscape scale.

Toledo, David

2013-05-01T23:59:59.000Z

84

Fundamental factors influencing coke strength.  

E-Print Network (OSTI)

??Research Doctorate - Doctor of Philosophy (PhD) In an ironmaking blast furnace solid-gas reactions are important and the rate of iron production is strongly dependent (more)

Curran, Joel

2009-01-01T23:59:59.000Z

85

Key Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Activities Key Activities Key Activities The Water Power Program conducts work in four key areas at the forefront of water power research. The Program is structured to help the United States meet its growing energy demands sustainably and cost-effectively by developing innovative renewable water power technologies, breaking down market barriers to deployment, building the infrastructure to test new technologies, and assessing water power resources for integration into our nation's grid. Research and Development Introduce and advance new marine and hydrokinetic technologies to provide sustainable and cost-effective renewable energy from the nation's waves, tides, currents, and ocean thermal gradients. Research and develop innovative hydropower technologies to sustainably tap our country's diverse water resources including rivers,

86

Key China Energy Statistics 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Title Key China Energy Statistics 2011 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

87

Key China Energy Statistics 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Title Key China Energy Statistics 2012 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

88

EPAct Transportation Regulatory Activities: Key Terms  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Terms Key Terms to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Terms on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Terms on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Terms on Google Bookmark EPAct Transportation Regulatory Activities: Key Terms on Delicious Rank EPAct Transportation Regulatory Activities: Key Terms on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Terms on AddThis.com... Home About Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Guidance Documents Statutes & Regulations Program Annual Reports Fact Sheets Newsletter Case Studies Workshops Tools Key Terms FAQs Key Terms The Energy Policy Act (EPAct) includes specific terminology related to

89

EPAct Transportation Regulatory Activities: Key Federal Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Key Federal Statutes to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Federal Statutes on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Federal Statutes on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Google Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Delicious Rank EPAct Transportation Regulatory Activities: Key Federal Statutes on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Federal Statutes on AddThis.com... Home About Contacts Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Key Federal Statutes These are excerpts from federal statutes that established key Energy Policy Act (EPAct) transportation regulatory activities.

90

Key Workplace Documents Federal Publications  

E-Print Network (OSTI)

, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devicesKey Workplace Documents Federal Publications Cornell University ILR School Year 2008 China/498 #12;Order Code RL33536 China-U.S. Trade Issues Updated March 7, 2008 Wayne M. Morrison Specialist

91

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

92

Key technology trends - Satellite systems  

Science Conference Proceedings (OSTI)

This paper is based on material extracted from the WTEC Panel Report Global Satellite Communications Technology and Systems, December 1998. It presents an overview of key technology trends in communications satellites in the last few years. After the ... Keywords: Communications satellites, Satellite communications, Satellite technology overview

Charles W. Bostian; William T. Brandon; Alfred U. Mac Rae; Christoph E. Mahle; Stephen A. Townes

2000-08-01T23:59:59.000Z

93

Statistical and Realistic Numerical Model Investigations of Anthropogenic and Climatic Factors that Influence Hypoxic Area Variability in the Gulf of Mexico  

E-Print Network (OSTI)

The hypoxic area in the Gulf of Mexico is the second largest in the world, which has received extensive scientific study and management interest. Previous modeling studies have concluded that the increased hypoxic area in the Gulf of Mexico was caused by the increased anthropogenic nitrogen loading of the Mississippi River; however, the nitrogen-area relationship is complicated by many other factors, such as wind, river discharge, and the ratio of Mississippi to Atchafalaya River flow. These factors are related to large-scale climate variability, and thus will not be affected by regional nitrogen reduction efforts. In the research presented here, both statistical (regression) and numerical models are used to study the influence of anthropogenic and climate factors on the hypoxic area variability in the Gulf of Mexico. The numerical model is a three-dimensional, coupled hydrological-biogeochemical model (ROMS-Fennel). Results include: (1) the west wind duration during the summer explain 55% of the hypoxic area variability since 1993. Combined wind duration and nitrogen loading explain over 70% of the variability, and combined wind duration and river discharge explain over 85% of the variability. (2) The numerical model captures the temporal variability, but overestimates the bottom oxygen concentrations. The model shows that the simulated hypoxic area is in agreement with the observations from the year 1991, as long as hypoxia is defined as oxygen concentrations below 3 mg/L rather than below 2 mg/L. (3) The first three modes from an Empirical Orthogonal Function (EOF) analysis of the numerical model output results explain 62%, 8.1% and 4.9% of the variability of the hypoxic area. The Principle Component time series is cross-correlated with wind, dissolved inorganic nitrogen concentration and river discharge. (4) Scenario experiments with the same nitrogen loading, but different duration of upwelling favorable wind, indicate that the upwelling favorable wind is important for hypoxic area development. However, a long duration of upwelling wind decreases the area. (5) Scenario experiments with the same nitrogen loading, but different discharges, indicate that increasing river discharge by 50% increases the area by 42%. Additionally, scenario experiments with the same river discharge, but different nitrogen concentrations, indicate that reducing the nitrogen concentration by 50% decreases the area by 75%. (6) Scenario experiments with the same nitrogen loading, but different flow diver- sions, indicate that if the Atchafalaya River discharges increased to 66.7%, the total hypoxic area increases the hypoxic area by 30%, and most of the hypoxic area moved from east to west Louisiana shelf. Additionally, if the Atchafalaya River discharge decreased to zero, the total hypoxic area increases by 13%. (7) Scenario experiments with the same nitrogen loading, but different nitrogen forms, indicate that if all the nitrogen was in the inorganic forms, the hypoxic area increases by 15%. These results have multiple implications for understanding the mechanisms that control the oxygen dynamics, reevaluating management strategies, and improving the observational methods.

Feng, Yang

2012-05-01T23:59:59.000Z

94

Factor Structure in Groups Selected on Observed Scores  

E-Print Network (OSTI)

corresponding to item format ('minor' answer key and 'other' answer key). There are two quantitative factors,into the full sample answer key factors (2 and 3). The five

Muthen, Bengt O.

1989-01-01T23:59:59.000Z

95

Security Notions for Quantum Public-Key Cryptography  

E-Print Network (OSTI)

It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

Takeshi Koshiba

2007-02-19T23:59:59.000Z

96

Rotating Plasma Finding is Key for ITER  

NLE Websites -- All DOE Office Websites (Extended Search)

Plasma Finding is Key for ITER Rotating Plasma Finding is Key for ITER PlasmaTurbulenceCSChang.png Tokamak turbulence showing inward-propagating streamers from normalized...

97

Use of a Rain Gauge Network to Infer the Influence of Environmental Factors on the Propagation of Quasi-Linear Convective Systems in West Africa  

Science Conference Proceedings (OSTI)

The West African squall line is a key quasi-linear storm system that brings much of the precipitation observed in the data-poor Sudanian climate zone. Squall lines propagate at a wide range of speeds and headings, but the lack of operational ...

Jon M. Schrage; Andreas H. Fink

2007-10-01T23:59:59.000Z

98

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities in Key Activities in Vehicles to someone by E-mail Share Vehicle Technologies Office: Key Activities in Vehicles on Facebook Tweet about Vehicle Technologies Office: Key Activities in Vehicles on Twitter Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Google Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Delicious Rank Vehicle Technologies Office: Key Activities in Vehicles on Digg Find More places to share Vehicle Technologies Office: Key Activities in Vehicles on AddThis.com... Key Activities Mission, Vision, & Goals Plans, Implementation, & Results Organization & Contacts National Laboratories Budget Partnerships Key Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or

99

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities to Key Activities to someone by E-mail Share Fuel Cell Technologies Office: Key Activities on Facebook Tweet about Fuel Cell Technologies Office: Key Activities on Twitter Bookmark Fuel Cell Technologies Office: Key Activities on Google Bookmark Fuel Cell Technologies Office: Key Activities on Delicious Rank Fuel Cell Technologies Office: Key Activities on Digg Find More places to share Fuel Cell Technologies Office: Key Activities on AddThis.com... Key Activities Plans, Implementation, & Results Accomplishments Organization Chart & Contacts Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Technology Validation Manufacturing Codes & Standards Education Systems Analysis Contacts Key Activities The Fuel Cell Technologies Office conducts work in several key areas to

100

Algorithms for dynamic multicast key distribution  

Science Conference Proceedings (OSTI)

We study the problem of multicast key distribution for group security. Secure group communication systems typically rely on a group key, which is a secret shared among the members of the group. This key is used to provide privacy by encrypting all group ... Keywords: Dynamic key distribution, experimental algorithms, multicast

Justin Goshi; Richard E. Ladner

2007-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Multiparty quantum key agreement with single particles  

Science Conference Proceedings (OSTI)

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. ... Keywords: Quantum cryptography, Quantum information, Quantum key agreement

Bin Liu; Fei Gao; Wei Huang; Qiao-Yan Wen

2013-04-01T23:59:59.000Z

102

SunShot Initiative: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities Printable Version Share this resource Send a link to SunShot Initiative: Key Activities to someone by E-mail Share SunShot Initiative: Key Activities on Facebook Tweet about SunShot Initiative: Key Activities on Twitter Bookmark SunShot Initiative: Key Activities on Google Bookmark SunShot Initiative: Key Activities on Delicious Rank SunShot Initiative: Key Activities on Digg Find More places to share SunShot Initiative: Key Activities on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Key Activities Under the SunShot Initiative, the DOE Solar Office issues competitive solicitations that fund selective research projects aimed at transforming the ways the United States generates, stores, and utilizes solar energy.

103

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

104

Renewable Energy Community: Key Elements  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy of Energy Office of Energy Efficiency & Renewable Energy National Renewable Energy Laboratory Innovation for Our Energy Future A Renewable Energy Community: Key Elements A reinvented community to meet untapped customer needs for shelter and transportation with minimal environmental impacts, stable energy costs, and a sense of belonging N. Carlisle, J. Elling, and T. Penney Technical Report NREL/TP-540-42774 January 2008 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle

105

Primeless factoring-based cryptography  

Science Conference Proceedings (OSTI)

Factoring-based public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off process, ...

Sonia Bogos, Ioana Boureanu, Serge Vaudenay

2013-06-01T23:59:59.000Z

106

Answering Key Fuel Cycle Questions  

Science Conference Proceedings (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

107

Key Elements of and Materials Performance Targets for Highly Insulating  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Elements of and Materials Performance Targets for Highly Insulating Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Title Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Publication Type Journal Article LBNL Report Number LBNL-5099E Year of Publication 2011 Authors Gustavsen, Arlid, Steinar Grynning, Dariush K. Arasteh, Bjørn Petter Jelle, and Howdy Goudey Journal Energy and Buildings Volume 43 Issue 10 Pagination 2583-2594 Date Published 10/2011 Keywords Fenestration, heat transfer modeling, thermal performance, thermal transmittance, u-factor, window frames Abstract The thermal performance of windows is important for energy efficient buildings. Windows typically account for about 30-50 percent of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U-factor of their opaque counterparts (wall, roof and floor constructions). In well insulated buildings the U-factor of walls, roofs an floors can be between 0.1-0.2 W/(m2K). The best windows have U-values of about 0.7-1.0. It is therefore obvious that the U-factor of windows needs to be reduced, even though looking at the whole energy balance for windows (i.e. solar gains minus transmission losses) makes the picture more complex.

108

Influence of Cooling on Distortion  

Science Conference Proceedings (OSTI)

Table 11   Factors that influence the cooling intensity of liquid quenchants...the vapor pressure is, the more difficult the

109

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

110

On multi-column foreign key discovery  

Science Conference Proceedings (OSTI)

A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is a crucial step in understanding and working with the data. Nevertheless, ...

Meihui Zhang; Marios Hadjieleftheriou; Beng Chin Ooi; Cecilia M. Procopiuc; Divesh Srivastava

2010-09-01T23:59:59.000Z

111

Cryptographic Key Managment Workshop 2012-A Draft ...  

Science Conference Proceedings (OSTI)

... Specify the key generation methods used Specify the random number generators used Specify ... primary and backup facilities ...

2012-09-11T23:59:59.000Z

112

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

113

DOE M 200.1-1 Chapter 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key ...

2000-02-15T23:59:59.000Z

114

Genotypic and environmental factors influencing flesh color, carotene content, total carotenoids, total phenolics and antioxidant activity in potato (Solanum tuberosum L.)  

E-Print Network (OSTI)

The influence of variety and location on flesh color, pigment content and total carotenoid content was studied using Texas and Colorado grown tubers from ten yellow flesh and two white flesh potato varieties. Antioxidant activity and total phenolics of two yellow flesh and two white flesh potato varieties were also determined. Flesh color was determined using a Hunter Colorimeter. Significant differences were found between the same variety grown in both locations for L* value, chroma, and hue. Texas grown tubers were lighter and redder than Colorado grown tubers, which were more yellow. Colorado tubers were lighter in the center than Texas tubers. Carotene and total carotenoid content of the same potato varieties grown in Texas and Colorado were determined, using BPLC and spectrophotometric techniques. Significant differences were found between the same variety grown in both locations for lutein, zeaxanthin, and total carotenoid content. Lutein and total carotenoids were greater in Colorado grown tubers, while zeaxanthin was greater in tubers grown in Texas. Data from the Hunter calorimeter, BPLC, and spectrophotometer were highly correlated, indicating that either of the three instruments can be used to determine flesh color, carotene and total carotenoid content. Varieties differed in antioxidant activity and total phenolic content. Granola had the highest antioxidant activity and Russet Norkotah the highest total phenolic content, while Yukon Gold had the lowest antioxidant activity and total phenolic content. Differences were slight among tuber parts in antioxidant activity, but they were significantly different in total phenolic content. Skin tissue had the highest antioxidant activity and total phenolic content. These differences in flesh color, carotene content, and total carotenoids were controlled genetically but were influenced by environment.

Al-Saikhan, Mohamed Salem

1994-01-01T23:59:59.000Z

115

Renewable: A key component of our global energy future  

DOE Green Energy (OSTI)

Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

Hartley, D.

1995-12-31T23:59:59.000Z

116

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

117

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eves side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eves memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

118

Comment on "Quantum dense key distribution"  

E-Print Network (OSTI)

In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.

Antoni Wojcik

2004-05-07T23:59:59.000Z

119

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

120

CODATA Key Values for Thermodynamics - TMS  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... This site includes internationally agreed upon values for thermodynamic properties of key chemical substances established by the Committee...

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Nanomechanics: New Test Measures Key Properties of ...  

Science Conference Proceedings (OSTI)

Nanomechanics: New Test Measures Key Properties of ... Tests using the wrinkle-crack method, however, show ... to the longest duration tested, 10 days ...

2012-10-18T23:59:59.000Z

122

Quantum key distribution network with wavelength addressing  

E-Print Network (OSTI)

Most traditional applications of quantum cryptography are point-to-point communications, in which only two users can exchange keys. In this letter, we present a network scheme that enable quantum key distribution between multi-user with wavelength addressing. Considering the current state of wavelength division multiplexing technique, dozens or hundreds of users can be connected to such a network and directly exchange keys with each other. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.

Mo, X F; Han, Z F; Xu, F X; Zhang, T; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Xu, Fang-Xing; Zhang, Tao

2006-01-01T23:59:59.000Z

123

New Quantum Key System Combines Speed, Distance  

Science Conference Proceedings (OSTI)

... a prototype high-speed quantum key distribution (QKD) system ... a theoretically unbreakable one-time pad encryption, transmission and decryption ...

2013-07-08T23:59:59.000Z

124

Two key questions about color superconductivity.  

E-Print Network (OSTI)

??We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of (more)

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

125

Schedules of Key Environmental Impact Statements  

Energy.gov (U.S. Department of Energy (DOE))

This document graphically displays the milestone dates and projected schedules of key Environmental Impact Statements (updated monthly).This chart represents anticipated activity and is not a...

126

BIASED RANDOM-KEY GENETIC ALGORITHMS WITH ...  

E-Print Network (OSTI)

Handbook of Metaheuristics. Kluwer. Academic Publishers, 2003. J.F. Gonalves and M.G.C. Resende. Biased random-key genetic algorithms for combinatorial...

127

Design and Analysis of Key Comparisons  

Science Conference Proceedings (OSTI)

... new methods, and make statistically best practices available ... to Key Comparisons such as data reporting and ... In the big picture, with the lowering ...

2010-11-18T23:59:59.000Z

128

Identity-based authenticated asymmetric group key agreement protocol  

Science Conference Proceedings (OSTI)

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key ... Keywords: asymmetric group key agreement, bilinear map, group key agreement, identity-based public-key cryptography

Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer

2010-07-01T23:59:59.000Z

129

Factor Separation in Numerical Simulations  

Science Conference Proceedings (OSTI)

A simple method is developed for computing the interactions among various factors influencing the atmospheric circulations. It is shown how numerical simulations can be utilized to obtain the pure contribution of any factor to any predicted field,...

U. Stein; P. Alpert

1993-07-01T23:59:59.000Z

130

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

131

General model of quantum key distribution  

E-Print Network (OSTI)

A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.

A. S. Trushechkin; I. V. Volovich

2005-04-20T23:59:59.000Z

132

General quantum key distribution in higher dimension  

E-Print Network (OSTI)

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1?g?d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key ...

Shi, Han-Duo

133

Robust key extraction from physical uncloneable functions  

Science Conference Proceedings (OSTI)

Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in ... Keywords: authentication, challenge-response pair, error correction, noise, physical uncloneable function, speckle pattern

B. kori?; P. Tuyls; W. Ophey

2005-06-01T23:59:59.000Z

134

residential sector key indicators | OpenEI  

Open Energy Info (EERE)

residential sector key indicators residential sector key indicators Dataset Summary Description This dataset is the 2009 United States Residential Sector Key Indicators and Consumption, part of the Source EIA Date Released March 01st, 2009 (5 years ago) Date Updated Unknown Keywords AEO consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon 2009 Residential Sector Key Indicators and Consumption (xls, 55.3 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm Rate this dataset Usefulness of the metadata Average vote Your vote Usefulness of the dataset Average vote Your vote

135

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities The Fuel Cell Technologies Office conducts work in several key areas to advance the development and commercialization of hydrogen and fuel cell technologies. Research, Development, and Demonstration Key areas of research, development, and demonstration (RD&D) include the following: Fuel Cell R&D, which seeks to improve the durability, reduce the cost, and improve the performance of fuel cell systems, through advances in fuel cell stack and balance of plant components Hydrogen Fuel R&D, which focuses on enabling the production of low-cost hydrogen fuel from diverse renewable pathways and addressing key challenges to hydrogen delivery and storage Manufacturing R&D, which works to develop and demonstrate advanced manufacturing technologies and processes that will reduce the cost of fuel cell systems and hydrogen technologies

136

Factors Influencing the Stability and Marketability of a Novel, Phytochemical-Rich Oil from the Aai Palm Fruit (Euterpe oleracea Mart.)  

E-Print Network (OSTI)

The aai palm fruit has recently become the focus of numerous research endeavors due to its extraordinary antioxidant content. However, little is known about the fruits phytochemical rich oil, which is a by-product of the aai pulp. Therefore, the aim of this study was to investigate the phytochemical content of aai oil and its relation to oxidative stability. A total of 206 mg/kg of chlorophylls, which included chlorophyll a as well as four chlorophyll derivatives were tentatively identified by HPLC in crude aai oil (CAO). Two predominant carotenoids (216 mg/kg ?-carotene and 177 mg/kg lutein) were also characterized in addition to ?-tocopherol (645 mg/kg). Initial investigations into oil stability focused upon the photooxidation of aai oil due to its significant chlorophyll content and findings demonstrated that the increases of nonanal were observed when phospholipids and polyphenolics were reduced. Subsequently, investigations into the interactions between phospholipids and lipophilic antioxidants and their contributions to the stability of aai oil were also assessed by isolating phytochemicals and selectively reconstituting the oil. Findings demonstrated a potential relationship between phospholipids and lipophilic antioxidants, but this was not conclusive. Advances in the processing of the aai pulp by-product created from the clarification process yielded a partially refined aai oil (RAO). The stability of both RAO and CAO as a result of autoxidation were compared to other common food oils (olive, canola, and soybean) and primary and secondary oxidation data suggested CAO was most stable. The difference in the stability of the two aai oils was also investigated by blending these oils and assessing oxidation. An increased stability was demonstrated in the blended RAO, which suggested a significant antioxidant contribution from the CAO. With such similar lipophilic compositions in CAO and RAO, it is theorized that the driving factor behind the stability of CAO can be attributed to its water soluble antioxidant content. While further investigations are required to fully comprehend the interactions of aai oil phytochemicals, these experiments provide insight into the phytochemical content and stability of aai oil. The understanding and information obtained in these studies is geared at increasing the marketability of aai oil as a food ingredient.

Duncan, Christopher Edward

2010-12-01T23:59:59.000Z

137

Captured key electrical safety lockout system  

DOE Patents (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

138

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions  

Science Conference Proceedings (OSTI)

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed ... Keywords: Fuzzy extractor, Helper data algorithm, Intrinsic PUF, Key distribution, LC-PUFs, Physical unclonable functions, SRAMs, Sensor nodes

Jorge Guajardo; Boris kori?; Pim Tuyls; Sandeep S. Kumar; Thijs Bel; Antoon H. Blom; Geert-Jan Schrijen

2009-03-01T23:59:59.000Z

139

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (6) Managers: Deanhiller Recent members: Hopcroft Vikasgoyal Ksearight NickL

140

Two key questions about color superconductivity  

E-Print Network (OSTI)

We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of color superconductivity? Motivated by the first question, we study ...

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

142

Cryptographic Key Management Project - Comments on the ...  

Science Conference Proceedings (OSTI)

... planned digital signature lifetime (based on the key strength ... Will the CAVP provide a standalone DH test that ... for about an eighth of the cost of 2.5 ...

2012-05-07T23:59:59.000Z

143

Jurisdiction Members Contact Info Key Staffers  

E-Print Network (OSTI)

Relevant Jurisdiction Members Contact Info Key Staffers House Science, Space, and Technology, aeronautics, civil aviation, environment, and marine science · America COMPETES · Energy labs · National Science Foundation, including NCAR · National Aeronautics and Space Administration · National Weather

144

Some key Y-12 General Foremen remembered  

NLE Websites -- All DOE Office Websites (Extended Search)

expanded from K-25 to Y-12 and X-10, they brought their management style with them. Clark Center was a key individual. Clark Center Park, still known by old timers as "Carbide...

145

Quantum Key Distribution Using Quantum Faraday Rotators  

E-Print Network (OSTI)

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against eavesdropping for single-photon source on a noisy environment and robust against impersonation attacks. It also allows for unconditionally secure key distribution for multiphoton source up to two photons. The protocol could be implemented experimentally with the current spintronics technology on semiconductors.

Choi, T; Choi, Mahn-Soo; Choi, Taeseung

2006-01-01T23:59:59.000Z

146

Multipartite secret key distillation and bound entanglement  

Science Conference Proceedings (OSTI)

Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

2009-10-15T23:59:59.000Z

147

High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution  

E-Print Network (OSTI)

The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can provide high secret key rate even when the transmission fiber is longer than 150km, which may make the continuous variable scheme to outvie the single photon one.

Yi-bo Zhao; Zheng-fu Han; Jin-jian Chen; You-zhen Gui; Guang-can Guo

2006-03-08T23:59:59.000Z

148

Industry-Wide Transformer Database: Key Findings and Case Studies  

Science Conference Proceedings (OSTI)

This report summarizes the development and application of the Electric Power Research Institutes (EPRIs) Industry-Wide Database (IDB) for power transformers. The IDB is a repository of detailed transformer performance data. Analysis of these data can provide information about the past performance of power transformers and the factors that influence that performance. With enough data, projections can be made about future performance, such as expected service life. Both past and ...

2013-12-19T23:59:59.000Z

149

Utility & Regulatory Factors Affecting Cogeneration & Independent Power Plant Design & Operation  

E-Print Network (OSTI)

In specifying a cogeneration or independent power plant, the owner should be especially aware of the influences which electric utilities and regulatory bodies will have on key parameters such as size, efficiency, design, reliability/ availability, operating capabilities and modes, etc. This paper will note examples of some of the major factors which could impact the project developer and his economics, as well as discuss potential mitigation measures. Areas treated include wheeling, utility ownership interests, dispatchability, regulatory acceptance and other considerations which could significantly affect the plant definition and, as a result, its attendant business and financing structure. Finally, suggestions are also made for facilitating the process of integration with the electric utility.

Felak, R. P.

1986-06-01T23:59:59.000Z

150

NIST Special Publication 800-57, Recommendation for Key ...  

Science Conference Proceedings (OSTI)

... keying material from key backup or archive. ... term random number generator (RNG) is ... Deterministic Random Bit Generators (DRBGs), sometimes ...

2012-07-10T23:59:59.000Z

151

ITL Bulletin Generating Secure Cryptographic Keys: A Critical ...  

Science Conference Proceedings (OSTI)

... KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC ... relies upon two basic components: an algorithm (or ... and of keys for symmetric algorithms. ...

2013-04-16T23:59:59.000Z

152

Factors influencing antioxidant phytochemical stability of teas  

E-Print Network (OSTI)

Tea is second only to water as the most consumed beverage in the world due to its health-promoting benefits and characteristic flavor. Even though many botanical teas such as yaupon holly (Ilex vomitoria) and mamaki (Pipturus albidus) are currently available in the tea market, only limited information is available on their polyphenolic contents containing diverse biological activities. Identification of phenolic compounds was performed using advanced analytical technique of mass spectrometry to provide polyphenolic profile of teas. To present fundamental information of phytochemical stability during tea storage, studies to determine the impacts of tea processing, different packaging materials, and various storage conditions on the phytochemical stability were conducted. Ascorbic acid addition and lowering pH successfully decreased the reduction of phenolic compounds by reducing the rate of oxidative degradation while tea pasteurization accelerated oxidative degradation. Glass bottles were most effective to retain higher concentration of polyphenolics. Tea polyphenolics at lower temperature (3 C) without light exposure were higher retained in each tea. Tea cream, the complex formed by interaction between polyphenolics, caffeine, protein, and metal ions, is highly undesirable in tea industry since it causes haziness and cloudiness in tea infusion as well as deteriorates sensorial properties. Only limited information is available on tea creaming in non-fermented type teas such as green tea, yaupon holly, and mamaki even though many tea creaming compounds are present in these teas. Therefore, studies were conducted to determine the degree of contribution of the tea creaming compounds to tea creaming and to develop novel chemical methods to minimize tea creaming without detrimental effects. Methods applied in the present study defined that hydrophobic interaction was the driving force make tea cream insoluble in the solution. Results obtained by present studies provided fundamental and practical information to the tea industry in terms of phytochemical stability and suggested storage stability of phytochemicals should be considered during processing and storage, since it could be better retained or improved by applying appropriate methods.

Kim, Youngmok

2008-12-01T23:59:59.000Z

153

A secure multiple-agent cryptographic key recovery system  

Science Conference Proceedings (OSTI)

Symmetric cryptography uses the same session key for message encryption and decryption. Without having it, the encrypted message will never be revealed. In case the session key is unavailable or government authorities need to inspect suspect messages, ... Keywords: key recovery, key recovery agent, key recovery center, secret sharing, session key

Kanokwan Kanyamee; Chanboon Sathitwiriyawong

2009-08-01T23:59:59.000Z

154

STGWG Key Outcomes for May 3, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Outcomes-Nashville 2010 Page 1 Key Outcomes-Nashville 2010 Page 1 State and Tribal Government Working Group (STGWG) Nashville, Tennessee - May 3, 2010 KEY OUTCOMES OVERVIEW Members appreciated the participation of all DOE officials at the STGWG meeting in Nashville, and are especially appreciative of the participation of high-level DOE management, such as Sky Gallegos, Deputy Assistant Secretary of the Office of Congressional and Intergovernmental Affairs, and Frank Marcinowski, Acting Chief Technical Officer and Deputy Assistant Secretary for Technical and Regulatory Support. Such participation demonstrates a continuing commitment to improve interaction with tribes and states. STGWG looks forward to our next Intergovernmental meeting with DOE in the fall. FULL STGWG ISSUES

155

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (7) Managers: Deanhiller Recent members: Bradmin Hopcroft Vikasgoyal Ksearight

156

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

157

Away-from-reactor storage of spent nuclear fuel: factors affecting demand  

SciTech Connect

This report analyzes factors that affect the magnitude and timing of demand for government AFRs, relative to the demand for other storage options, to assist policymakers in predicting this demand. Past predictions of AFT demand range widely and often appear to conflict. This report helps to explain the apparent conflicts among existing demand predictions by demonstrating their sensitivity to changes in key assumptions. Specifically, the report analyzes factors affecting the demand for government AFR storage facilities; illustrates why demand estimates may vary; and identifies actions that may be undertaken by groups, within and outside the government, to influence the level and timing of demands.

Dinneen, P.M.; Solomon, K.A.; Triplett, M.B.

1980-10-01T23:59:59.000Z

158

Nonorthogonal decoy-state Quantum Key Distribution  

E-Print Network (OSTI)

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.

Li, J B; Li, Jing-Bo; Fang, Xi-Ming

2005-01-01T23:59:59.000Z

159

Complementarity, distillable secret key, and distillable entanglement  

E-Print Network (OSTI)

We consider controllability of two conjugate observables Z and X by two parties with classical communication. The ability is specified by two alternative tasks, (i) agreement on Z and (ii) preparation of an eigenstate of X with use of an extra communication channel. We prove that their feasibility is equivalent to that of key distillation if the extra channel is quantum, and to that of entanglement distillation if it is classical. This clarifies the distinction between two entanglement measures, distillable key and distillable entanglement.

Masato Koashi

2007-04-27T23:59:59.000Z

160

Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate  

E-Print Network (OSTI)

We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bru

2013-03-14T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Basics about CIM technology and key  

E-Print Network (OSTI)

Basics about CIM® technology and key applications Ales Strancar March, 2011 #12;Leaders in Monolith monolithic technology (CIM®). 4 USA patents granted including their foreign equivalents, more pending. #12;Important Milestones · 2002: First Drug Master File (DMF) for CIM® DEAE supports. · 2002: Pass first FDA

Lebendiker, Mario

162

Key issues of RFID reader network system  

Science Conference Proceedings (OSTI)

RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, Key issues of RFID reader network system are ... Keywords: RFID, WSN, anti-collision algorithm, taxonomy

Leian Liu; Dashun yan; Jiapei Wu; Hongjiang Wang

2009-09-01T23:59:59.000Z

163

Key Management Challenges in Smart Grid  

Science Conference Proceedings (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL; Duren, Mike [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

164

Key Findings and Recommendations for Improvement NIST ...  

Science Conference Proceedings (OSTI)

... heat detection/fire alarm system was installed in the ... b) increasing the capacity of the ... eliminating trade-offs between sprinkler installation and factors ...

2011-08-15T23:59:59.000Z

165

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure  

Science Conference Proceedings (OSTI)

Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability ... Keywords: accountability, certificate validation, public log servers, public-key infrastructure, ssl, tls

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor

2013-05-01T23:59:59.000Z

166

Leakage resilient strong key-insulated signatures in public channel  

Science Conference Proceedings (OSTI)

Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The ... Keywords: continual key leakage, key-insulation, public channel, signatures

Le Trieu Phong; Shin'ichiro Matsuo; Moti Yung

2010-12-01T23:59:59.000Z

167

Key Facts: Solyndra Solar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Key Facts: Solyndra Solar Key Facts: Solyndra Solar On September 1, 2011, Solyndra, a solar energy start-up and recipient of an Energy Department loan guarantee, declared bankruptcy. While this event is deeply disappointing, at the time the loan guarantee was issued, Solyndra was widely seen as a promising and innovative company: Solyndra was named one of the world's "50 Most Innovative Companies" in 2010 by MIT's Technology Review and included in the Wall Street Journal's "The Next Big Thing: Top 50 Venture Backed Companies." Private investors, after conducting their own careful review of Solyndra, put $1 billion of their own private capital behind the company. Solyndra reported sales growth of 40% from 2009 to 2010, from $100

168

Practical Decoy State for Quantum Key Distribution  

E-Print Network (OSTI)

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

X. Ma; B. Qi; Y. Zhao; H. -K. Lo

2005-03-01T23:59:59.000Z

169

Key Physical Mechanisms in Nanostructured Solar Cells  

DOE Green Energy (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

170

Method for encryption and transmission of digital keying data  

DOE Patents (OSTI)

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

Mniszewski, Susan M. (Los Alamos, NM); Springer, Edward A. (Los Alamos, NM); Brenner, David P. (North Collins, NY)

1988-01-01T23:59:59.000Z

171

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

172

Key Renewable Energy Opportunities for Oklahoma Tribes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Renewable Energy Opportunities for Oklahoma Tribes Key Renewable Energy Opportunities for Oklahoma Tribes August 13, 2012 Oklahoma City, Oklahoma Cox Convention Center The...

173

Single, Key Gene Discovery Could Streamline Production of Biofuels...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

174

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

175

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency to someone by E-mail Share Building Technologies Office: Key Activities in Energy Efficiency on Facebook Tweet about Building Technologies Office: Key Activities...

176

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

177

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

178

Technology Key to Harnessing Natural Gas Potential | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy...

179

NIST SP 800-57, Recommendation for Key Management ...  

Science Conference Proceedings (OSTI)

... service use a hash function as a component of the ... mitigated by splitting the key into components that are ... a. When a symmetric key is used only for ...

2012-12-12T23:59:59.000Z

180

NERSC Played Key Role in Nobel Laureate's Discovery  

NLE Websites -- All DOE Office Websites (Extended Search)

Played Key Role in Nobel Laureate's Discovery NERSC Played Key Role in Nobel Laureate's Discovery NERSC, Berkeley Lab Now Centers for Computational Cosmology Community October 4,...

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

TEC Working Group Topic Groups Rail Key Documents Planning Subgroup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rail Key Documents Planning Subgroup TEC Working Group Topic Groups Rail Key Documents Planning Subgroup Planning Subgroup Rail Planning Timeline Benchmarking Project: AREVA Trip...

182

Many-core key-value store  

Science Conference Proceedings (OSTI)

Scaling data centers to handle task-parallel work-loads requires balancing the cost of hardware, operations, and power. Low-power, low-core-count servers reduce costs in one of these dimensions, but may require additional nodes to provide the required ... Keywords: 64-core Tilera TILEPro64, many-core key-value store, data centers, task-parallel workloads, low-core-count servers, low-power servers, under-utilizing memory, power consumption, high-core-count processor, clock rate, 4-core Intel Xeon L5520, 8-core AMD Opteron 6128 HE

M. Berezecki; E. Frachtenberg; M. Paleczny; K. Steele

2011-07-01T23:59:59.000Z

183

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Brierley, Stephen

2009-01-01T23:59:59.000Z

184

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Stephen Brierley

2009-10-14T23:59:59.000Z

185

A verifiable random function with short proofs and keys  

E-Print Network (OSTI)

Abstract. We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRFs proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive. 1

Yevgeniy Dodis; R Yampolskiy

2005-01-01T23:59:59.000Z

186

Analysis and design of a secure key exchange scheme  

Science Conference Proceedings (OSTI)

We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, ... Keywords: Block matrices, Cryptography, Discrete logarithm problem, Key exchange scheme, Public key, Quick exponentiation, Security, Triangular matrices

Rafael lvarez; Leandro Tortosa; Jos-Fco Vicent; Antonio Zamora

2009-05-01T23:59:59.000Z

187

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Activities in Vehicles Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or improving performance, power, and comfort. Research and development (R&D); testing and analysis; government and community stakeholder support; and education help people access and use efficient, clean vehicles that meet their transportation needs. Researcher loads a sample mount of battery cathode materials for X-ray diffraction, an analysis tool for obtaining information on the crystallographic structure and composition of materials. Research and Development of New Technologies Develop durable and affordable advanced batteries as well as other forms of energy storage. Improve the efficiency of combustion engines.

188

Toolpusher is key to efficient rig operation  

Science Conference Proceedings (OSTI)

Toolpushers earn a higher salary, control more personnel, and are responsible for a more expensive operation than many graduate MBAs. As a result, toolpushers are key to improved rig efficiencies and reduced crew turnover. For example, by having its toolpushers in Libya implement a new managerial approach, Santa Fe Drilling Co. reduced labor turnover 30%, reduced the number of lost-time accidents 58%, and increased average rig inspection scores 6%. During the boom years of drilling, toolpushers complained often about the poor quality of roustabouts and roughnecks assigned to them. Many toolpushers held poor screening of personnel responsible, and felt justified in firing those who were slow to adapt. Few of them considered that they were directly responsible. Today's toolpusher must realize that he is responsible not only for the rig, its maintenance, and its drilling performance, but for training and development of the rig's personnel as well.

Fortney, K.

1983-09-01T23:59:59.000Z

189

Key decisions near for Chad pipeline proposal  

Science Conference Proceedings (OSTI)

The World Bank is expected to play a key role in a proposed $3 billion development of oil fields in Chad and an export pipeline through Cameroon to the Atlantic Ocean. The project, which has been at least 4 years in the making, could see a breakthrough later this year. Esso Exploration and production Chad Inc. is operator for the consortium proposing the project. It holds a 40% interest, Ste. Shell Tchadienne de Recherches et d`Exploitation has 40%, and Elf Hydrocarbures Tchad has a 20% share it purchased from Chevron Corp. in 1993 (OGJ, February 1, 1993, p 25). The governments of Chad and Cameroon, which had approved a framework agreement for the pipeline in 1995, now are studying an assessment of the pipeline`s environmental impact. If they approve the plans, they are expected to apply to the World Bank for financing. The paper describes the Chad fields, the export pipeline, background information, and the Banks role.

Crow, P.

1997-05-12T23:59:59.000Z

190

Key Renewable Energy Opportunities for Oklahoma Tribes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRIBAL LEADER FORUM SERIES TRIBAL LEADER FORUM SERIES KEY RENEWABLE ENERGY OPPORTUNITIES FOR OKLAHOMA TRIBES August 13, 2012 COX CONVENTION CENTER 100 West Sheridan Avenue, Oklahoma City, OK 73102 (405) 602-8500 The fifth in a series of planned U.S. DOE Office of Indian Energy-sponsored strategic energy development & investment forums, this forum is designed to give Oklahoma tribal leaders the opportunity to receive the latest updates on DOE's energy development efforts in Indian Country. The Forum will provide a venue for tribal leaders to discuss best practices in renewable energy development, including project development and finance, issues related to Oklahoma land ownership, and energy planning and energy markets. Tribal leaders will also have the opportunity to directly converse with each other by participating in a roundtable

191

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key Distribution  

E-Print Network (OSTI)

It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. With correct interpretation of the criterion as well as a correct treatment of the error correcting code and privacy amplification code, it is shown that even for an ideal system under just collective attack, the maximum tolerable quantum bit error rate is about 1.5% and a net key cannot actually be generated with practical error correcting codes even at such low rates, contrary to claims in the literature.

Horace P. Yuen

2012-05-16T23:59:59.000Z

192

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution  

E-Print Network (OSTI)

We present a security analysis against collective attacks for the recently proposed time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond $10^4$ for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.

Catherine Lee; Jacob Mower; Zheshen Zhang; Jeffrey H. Shapiro; Dirk Englund

2013-11-05T23:59:59.000Z

193

Compression station key to Texas pipeline project  

SciTech Connect

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

194

Wind Powering America: A Key Influence on U.S. Wind Market (Fact Sheet)  

Science Conference Proceedings (OSTI)

This fact sheet summarizes an evaluation of the effectiveness of the Wind Powering America initiative conducted by an independent consultant funded by the U.S. Department of Energy.

O'Dell, K.

2013-09-01T23:59:59.000Z

195

Nonlinear InfluencesA Key to Short-Term Climatic Perturbations  

Science Conference Proceedings (OSTI)

The role of nonlinear interactions in the climatic system in contributing to variability at both spatial and temporal levels is poorly understood. To gain some insight into the possible role of nonlinearities an elementary model has been devised. ...

B. G. Hunt

1988-02-01T23:59:59.000Z

196

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

197

Implementation of Distributed Key Generation Algorithms using Secure Sockets  

Science Conference Proceedings (OSTI)

Distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such ...

A. T. Chronopoulos; F. Balbi; D. Veljkovic; N. Kolani

2004-08-01T23:59:59.000Z

198

Exploring the context : a small hotel in Key West  

E-Print Network (OSTI)

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

199

Key Ingredient: Change in Material Boosts Prospects of ...  

Science Conference Proceedings (OSTI)

Key Ingredient: Change in Material Boosts Prospects of Ultrafast Single-photon Detector. From NIST Tech Beat: June 30, 2011. ...

2011-10-14T23:59:59.000Z

200

Nano Changes Rise to Macro Importance in a Key Electronics ...  

Science Conference Proceedings (OSTI)

Nano Changes Rise to Macro Importance in a Key Electronics Material. From NIST Tech Beat: April 7, 2009. ...

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Better 'Photon Loops' May Be Key to Computer and Physics ...  

Science Conference Proceedings (OSTI)

Better 'Photon Loops' May Be Key to Computer and Physics Advances. From NIST Tech Beat: August 22, 2011. ...

2012-08-23T23:59:59.000Z

202

Energy Usage Data Standard for US Smart Grid Passes Key ...  

Science Conference Proceedings (OSTI)

Energy Usage Data Standard for US Smart Grid Passes Key Advisory Panel Vote. From NIST Tech Beat: March 1, 2011. ...

2011-03-01T23:59:59.000Z

203

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

204

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S, Ireland http://www.phy.hw.ac.uk/resrev/photoncounting/index.html Abstract: An improved quantum key-based quantum key distribution test system performance in terms of transmission distance and quantum bit error

Buller, Gerald S.

205

Conversion Factor  

Gasoline and Diesel Fuel Update (EIA)

Conversion Factor (Btu per cubic foot) Production Marketed... 1,110 1,106 1,105 1,106 1,109 Extraction Loss ......

206

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts November 29, 2011 - 4:34pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASENovember 29, 2011 President Obama Announces More Key Administration Posts WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Frederick "Rick" Barton - Assistant Secretary for Conflict and Stabilization Operations and Coordinator for Reconstruction and Stabilization, Department of State Arun Majumdar - Under Secretary of Energy, Department of Energy Marie F. Smith - Member, Social Security Advisory Board The President also announced his intent to appoint the following

207

Secret key distillation from shielded two-qubit states  

Science Conference Proceedings (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

2010-05-15T23:59:59.000Z

208

Secret key distillation from shielded two-qubit states  

E-Print Network (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Joonwoo Bae

2008-03-03T23:59:59.000Z

209

Douglas Factors  

Energy.gov (U.S. Department of Energy (DOE))

The Merit Systems Protection Board in its landmark decision, Douglas vs. Veterans Administration, 5 MSPR 280, established criteria that supervisors must consider in determining an appropriate penalty to impose for an act of employee misconduct. These twelve factors are commonly referred to as Douglas Factors and have been incorporated into the Federal Aviation Administration (FAA) Personnel Management System and various FAA Labor Agreements.

210

Optimising waste management performance - The key to successful decommissioning  

SciTech Connect

Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

Keep, Matthew [Entec UK Limited. 17 Angel Gate. City Road. London EC1V 2SH (United Kingdom)

2007-07-01T23:59:59.000Z

211

Transportation fuel use is a key factor in the outlook for U.S ...  

U.S. Energy Information Administration (EIA)

Tools; Glossary All Reports ... weather; gasoline; capacity; nuclear; exports; forecast; View All Tags ...

212

EIA Data: 2011 United States Residential Sector Key Indicators and  

Open Energy Info (EERE)

Residential Sector Key Indicators and Residential Sector Key Indicators and Consumption Dataset Summary Description This dataset is the 2011 United States Residential Sector Key Indicators and Consumption, part of the Annual Energy Outlook that highlights changes in the AEO Reference case projections for key energy topics. Source EIA Date Released December 16th, 2010 (4 years ago) Date Updated Unknown Keywords consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon Residential Sector Key Indicators and Consumption (xls, 62.5 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm

213

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts May 28, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Gordon Heddell, Inspector General, Department of Defense; Ellen Murray, Assistant Secretary for Resources and Technology, Department of Health and Human Services; Polly Trottenberg, Assistant Secretary for Transportation Policy, Department of Transportation; and James J. Markowsky, Assistant Secretary for Fossil Energy, Department of Energy. President Obama said, "Each of these individuals brings extensive expertise in their chosen fields, and they are joining my administration at a time

214

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

215

Florida Keys Electric Cooperative - Residential Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Heating & Cooling Commercial Heating & Cooling Cooling Insulation Design & Remodeling Windows, Doors, & Skylights Program Info State Florida Program Type Utility Rebate Program Rebate Amount Rebates $25 - $500, max $1000 per member Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a free home energy audit. An FKEC trained auditor will assess the home and make recommendations for

216

Natural Gas Markets: Recent Changes and Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Natural Gas Markets: Recent Changes and Key Drivers for

217

NREL: News - NREL Fills Key Leadership Role for Energy Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

513 NREL Fills Key Leadership Role for Energy Systems Integration June 17, 2013 Bryan J. Hannegan will join the Energy Department's National Renewable Energy Laboratory on June 24...

218

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable En ...

219

Overview of Indian Hydrogen Program and Key Safety Issues of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Energy Road Map - Initiatives - Target 2020 : GIFT - Programme in India - CNG - H 2 Programme - Partnership - Technology Development - Concerns & Challenges * Key...

220

Report Identifies Three Key R&D Priorities for Future ...  

Science Conference Proceedings (OSTI)

... Networking and Information Technology Research and Development Program. For more details, see Report Identifies Three Key R&D Priorities for ...

2011-07-18T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

222

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

013 Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development1 Abstract "The Government of...

223

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

224

Knowledge, Skills, and Abilities for Key Radiation Protection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice No. 1 November 2007 DOE STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910...

225

Key Facts about the Mathematics and Computer Science Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Documents Key Facts about the Mathematics and Computer Science Division Researchers in the Mathematics and Computer Science Division attack complex problems in four...

226

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable Energy

227

Fossil Energy Announces Addition of Three Key Staff Members ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant...

228

TEC Working Group Topic Groups Rail Key Documents Intermodal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Intermodal Subgroup TEC Working Group Topic Groups Rail Key Documents Intermodal Subgroup Intermodal Subgroup Draft Work Plan More Documents & Publications TEC Working Group Topic...

229

Big Coppitt Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigCoppittKey,Florida&oldid227749" Categories: Places Stubs Cities What links here...

230

Big Pine Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigPineKey,Florida&oldid227765" Categories: Places Stubs Cities What links here...

231

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

work in three key areas in order to continually develop innovative, cost-effective energy saving solutions. research and development (R&D), market stimulation, and building...

232

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become widely used as shared storage solutions for Internet-scale distributed applications. We present a fault-tolerant wait-free efficient ... Keywords: cloud storage, distributed storage

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Marko Vukolic

2011-06-01T23:59:59.000Z

233

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internet-scale cloud storage systems. We present an efficient wait-free algorithm that ...

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Alessandro Sorniotti; Marko Vukolic; Ido Zachevsky

2012-06-01T23:59:59.000Z

234

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

235

Efficient decoy-state quantum key distribution with quantified security  

E-Print Network (OSTI)

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

M. Lucamarini; K. A. Patel; J. F. Dynes; B. Frhlich; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

2013-10-01T23:59:59.000Z

236

An extension of secure group communication using key graph  

Science Conference Proceedings (OSTI)

With the continuously emerging of Internet applications based on secure group communication, the design of secure group communication becomes an important Internet design topic. Group key management is important for secure group communication. Previous ... Keywords: Batch rekey, Group security, Key graph, Rekey

Zhang Jun; Zhou Yu; Ma Fanyuan; Gu Dawu; Bai Yingcai

2006-10-01T23:59:59.000Z

237

Electricity and Development: Global Trends and Key Challenges  

E-Print Network (OSTI)

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

238

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

239

Energy Security: A Key Requirement forSustainable Development  

E-Print Network (OSTI)

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

240

MeerKAT Key Project Science, Specifications, and Proposals  

E-Print Network (OSTI)

We present the specifications of the MeerKAT Karoo Array Telescope, the South African Square Kilometre Array Precursor. Some of the key science for MeerKAT is described in this document. We invite the community to submit proposals for Large Key Projects.

Booth, R S; Jonas, J L; Fanaroff, B

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

A matricial public key cryptosystem with digital signature  

Science Conference Proceedings (OSTI)

We describe a new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group. The proposed cryptosystem is very efficient, requiring ... Keywords: DLP, Diffie-Hellman, ElGamal, cryptography, digital signature, finite fields, polynomial matrices, public-key, security

Rafael Alvarez; Francisco-Miguel Martinez; Jose-Francisco Vicent; Antonio Zamora

2008-04-01T23:59:59.000Z

242

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts President Obama Announces More Key Administration Posts July 8, 2011 - 12:00am Addthis THE WHITE HOUSE Office of the Press Secretary WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Michael A. Hammer, Assistant Secretary for Public Affairs, Department of State Charles McConnell, Assistant Secretary for Fossil Energy, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts: Terry Guen, Member, Advisory Council on Historic Preservation Dorothy T. Lippert, Member, Advisory Council on Historic Preservation Rosemary A. Joyce, Member, Cultural Property Advisory Committee President Obama said, "Our nation will be greatly served by the talent and

243

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Albert Einstein Distinguished Educator Fellowship (AEF) Program Einstein Fellowship Home Eligibility Benefits Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page Key Dates for the 2014-2015 Einstein Fellowship Application process. On-line Application Opens September 24, 2013 Application Deadline 5:00pm EST December 4, 2013 Application Review 7-8 weeks Notification to Semi-Finalists [Travel Arrangements made for Interviews in Washington, DC] Late January 2014 Interviews in Washington, DC February 23-25, 2014 Finalists Notifications March 2014 Congressional Fellows Placement Interviews June - July 2014 Fellows Arrive in Washington, DC August 2014 Orientation meeting for the 2014-2015 Einstein Fellows

244

The Effects of Economic and Environmental Factors on Investment Decisions in the Texas Grapefruit Industry  

E-Print Network (OSTI)

Economic and environmental factors were examined to determine their influences on grapefruit investment in the Lower Rio Grande Valley of Texas. Price instability explained 17 percent of the variation in investment decision making, while 83 percent was explained by uncertainty related to severe freezes impacting the Texas grapefruit industry. Trade and environmental factors were not identified as a significant source of uncertainty affecting investment decisions. Increased investment in freeze protection technologies and improved price risk management are the most effective ways to reduce the uncertainty associated with grapefruit production and marketing. Micro-sprinkler systems could eliminate the risk of future freeze damage, conserve valuable water resources, and reduce the variable costs of production, resulting in an estimated savings of $6,250 per acre. Price risk could be reduced by producing and marketing more fancy-grade fruit and reducing the proportion of choice fruit in the marketing mix. Key words:

Edited Flynn; J. Adcock; Nicole Elmer; Amy Thurow; Jason Johnson; Parr Rosson

1998-01-01T23:59:59.000Z

245

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

246

A Key-Distribution Scheme for Wireless Home Automation Networks  

E-Print Network (OSTI)

Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. In this paper we present a key-distribution scheme geared towards home automation networks, but applicable to other networks with related properties as well. Our approach uses a decentralized scheme that is designed to work on resource-poor devices, allows easy addition and removal of devices and limits the workload on the end user while guaranteeing the secrecy of the exchanged keys even in the presence of subverted nodes.

Arno Wacker; Timo Heiber; Holger Cermann

2004-01-01T23:59:59.000Z

247

The Electricity Transmission System Opportunities to Overcome Key Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities to Overcome Key Challenges Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia November 2, 2012 Breakout Group Discussion Overview Opportunities to Overcome Key Challenges Each of the four breakout groups prioritized the critical issues facing the grid from the list of synthesized challenges identified in the first breakout session of the workshop. Focusing on these top priorities, each group proposed specific R&D activities and initiatives that DOE can pursue to overcome these challenges and address existing gaps. Summary of Synthesized Challenges A. Need improved understanding of the availability, utility, maintenance, exchange, and security of data and associated requirements.

248

Analysis of the Past and Future Trends of Energy Use in Key Medium- and  

NLE Websites -- All DOE Office Websites (Extended Search)

the Past and Future Trends of Energy Use in Key Medium- and the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Title Analysis of the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Publication Type Report LBNL Report Number LBNL-6380E Year of Publication 2013 Authors Hasanbeigi, Ali, Zeyi Jiang, and Lynn K. Price Date Published 09/2013 Publisher Lawrence Berkeley National Laboratory Keywords china, decomposition, iron and steel industry, Low Emission & Efficient Industry Abstract The iron and steel industry is one of the most energy-intensive and polluting industries in China. This industry accounted for approximately 27% of China's primary energy use for the manufacturing industry in 2010. Also, China's steel production represented around 47% of the world steel production that year. Hence, reducing energy use and air pollutant emissions from the Chinese steel industry not only has significant implications for China but also for the entire world. For this reason, it is crucial and it is the aim of this study to analyze influential factors that affected the energy use of the steel industry in the past in order to try to quantify the likely effect of those factors in the future.

249

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Science Undergraduate Laboratory Internships (SULI) SULI Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. SULI Internship Term: Spring 2014 Summer 2014* Fall 2013 On-line Application Opens August 6, 2013 October 18, 2013 May 1, 2013 Applications Due October, 1, 2013 5:00 PM ET January 10, 2014 5:00 PM ET June 12, 2013 5:00 PM ET Offer Notification Period Begins on or around October, 15, 2013 January 20, 2014 June 24, 2013

250

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Visiting Faculty Program (VFP) VFP Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. VFP Term: Summer 2014 On-line Application Opens October 18, 2013 Applications Due January 10, 2014 5:00 PM ET* Offer Notification Period Begins January 20, 2014 All DOE Offers and Notifications Complete April 1, 2014 *A research proposal co-developed with a DOE laboratory researcher must be electronically submitted by all faculty applicants as part of their

251

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

252

Energy Secretary Bodman Commends Key Milestone In MOX Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commends Key Milestone In MOX Program Commends Key Milestone In MOX Program Energy Secretary Bodman Commends Key Milestone In MOX Program April 1, 2005 - 11:28am Addthis WASHINGTON, DC - In response to the Nuclear Regulatory Commission's (NRC) authorization of the construction of a U.S. Mixed-Oxide (MOX) Fuel Fabrication Facility at the Department of Energy's Savannah River Site in South Carolina, Secretary of Energy Samuel W. Bodman today released the following statement: "Issuing the permit for construction of a MOX facility in South Carolina is the crucial next step in the MOX program. It is a key milestone in our efforts to dispose of surplus weapons grade plutonium in the U.S. and Russia," Secretary Bodman said. "We look forward to proceeding with this nonproliferation program that will ultimately eliminate enough

253

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about

254

Department of Energy Announces Key Additions to Public Affairs Staff |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Key Additions to Public Affairs Announces Key Additions to Public Affairs Staff Department of Energy Announces Key Additions to Public Affairs Staff February 26, 2009 - 12:00am Addthis WASHINGTON, DC - Today, the Department of Energy announced key staff additions to the Office Public Affairs: Dan Leistikow, Director of Public Affairs; Tom Reynolds, Deputy Director of Public Affairs; Stephanie Mueller, Press Secretary; and Tiffany Edwards, Deputy Press Secretary. "I am pleased to have these talented individuals join the Department of Energy", said Secretary Steven Chu. "Having worked on President Obama's presidential campaign Dan, Tom, Stephanie and Tiffany bring knowledge about the President's commitment to end our addiction to foreign oil, invest in alternative and renewable energy, address the global climate crisis and

255

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

256

Table A4. Residential sector key indicators and consumption  

Gasoline and Diesel Fuel Update (EIA)

3 3 U.S. Energy Information Administration | Annual Energy Outlook 2013 Reference case Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Energy Information Administration / Annual Energy Outlook 2013 Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020 2025 2030 2035 2040 Key indicators Households (millions) Single-family ....................................................... 82.85 83.56 91.25 95.37 99.34 103.03 106.77 0.8% Multifamily ........................................................... 25.78 26.07 29.82 32.05 34.54 37.05 39.53 1.4%

257

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 27, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Ray Mabus, Secretary of the Navy, Department of Defense; Donald Remy, General Counsel of the Army, Department of Defense; J. Randolph Babbitt, Administrator, Federal Aviation Administration; Jose D. Riojas, Assistant Secretary for Operations, Security and Preparedness, Department of Veterans Affairs; John Trasviña, Assistant Secretary for Fair Housing and Equal Opportunity, Department of Housing and Urban Development; Lawrence E. Strickling, Assistant Secretary for Communications and Information, Department of Commerce; and Cathy Zoi, Assistant Secretary for Energy Efficiency and

258

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

259

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts June 10, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joan Evans, Assistant Secretary for Congressional and Legislative Affairs, Department of Veterans Affairs; Warren F. "Pete" Miller, Jr., PhD, Assistant Secretary for Nuclear Energy, Department of Energy; and John R. Norris, Commissioner, Federal Energy Regulatory Commission. President Obama said, "I am grateful that these three impressive individuals will be working with me in these important roles. The commitment of these experienced public servants has made an impression on

260

Key Science and Engineering Indicators: Digest 2012 | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Science and Engineering Indicators: Digest 2012 Key Science and Engineering Indicators: Digest 2012 BusinessUSA Data/Tools Apps Challenges Let's Talk BusinessUSA You are here Data.gov » Communities » BusinessUSA » Data Key Science and Engineering Indicators: Digest 2012 Dataset Summary Description This 2012 digest of key S&E indicators is an interactive tool that draws from the National Science Board's (NSB's) Science and Engineering Indicators report. The digest serves to draw attention to important trends and data points from across Indicators and to introduce readers to the data resources available in the report. Tags {science,engineering,indicators,statistics,nsf,nsb,srs,federal,government,education,labor,employment,workforce,research,development,industry,international,global,r&d,technology,patents,"research citations"}

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Recommendation for Pair-Wise Key Establishment Schemes ...  

Science Conference Proceedings (OSTI)

... with unilateral key-confirmation from party V to party ... may be a component of a protocol, which in ... Note that protocols, per se, are not specified in this ...

2013-06-05T23:59:59.000Z

262

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

263

SLAC National Accelerator Laboratory - LCLS-II Passes Key Milestone...  

NLE Websites -- All DOE Office Websites (Extended Search)

LCLS-II Passes Key Milestone in DOE Approval Process By Glennda Chui November 1, 2011 The Department of Energy has approved a preliminary budget, schedule and design plans for the...

264

First look at cellulose's early production could hold keys to...  

NLE Websites -- All DOE Office Websites (Extended Search)

cellulose's early production could hold keys to bacteria-free medical devices, better biofuel By Jared Sagoff * May 14, 2013 Tweet EmailPrint Produced by plants as well as algae...

265

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

266

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy...

267

The use of a logistic map for key generation  

E-Print Network (OSTI)

A key generation scheme is proposed and its performance analyzed. The method, the logistic map scheme (LMS), is applicable for use on wireless networks because it does not require devices to engage in computationally ...

Ando, Megumi, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

268

EIA Data: 2011 United States Residential Sector Key Indicators...  

Open Energy Info (EERE)

Residential Sector Key Indicators and Consumption This datasetis the 2011 United...

269

An Implementation of Key-Based Digital Signal Steganography  

Science Conference Proceedings (OSTI)

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random ...

Toby Sharp

2001-04-01T23:59:59.000Z

270

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network (OSTI)

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

271

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 20, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Dr. Steven E. Koonin, Under Secretary for Science, Department of Energy; David Sandalow, Assistant Secretary for Policy and International Affairs, Department of Energy; Ambassador Johnnie Carson, Assistant Secretary for African Affairs, State Department; Kathy Martinez, Assistant Secretary for Disability Employment Policy (ODEP), Department of Labor; Jonathan S. Adelstein, Administrator for the Rural Utilities Service, United States Department of Agriculture; Timothy W. Manning, Deputy Administrator for National Preparedness, FEMA, Department of Homeland Security; and Priscilla

272

Key Activities in Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About » Key Activities in Energy Efficiency About » Key Activities in Energy Efficiency Key Activities in Energy Efficiency The Building Technologies Office conducts work in three key areas in order to continually develop innovative, cost-effective energy saving solutions: research and development (R&D), market stimulation, and building codes and equipment standards. Working with our partners on these activities results in better products, better new homes, better ways to improve older homes, and better buildings in which to work, shop, and lead our everyday lives. Research and Development Spearhead the development of new, energy efficient technologies. Lead R&D activities that reduce home energy use through Building America. Collaborate with industry to improve the energy efficiency of new

273

Interest/Users Group Meeting Proceedings and Key Findings, 2011  

Science Conference Proceedings (OSTI)

This technical update is the summary of the meeting proceedings and key findings for the Fossil Operations and Maintenance Program Area Interest/Users Groups meetings held during 2011. The report represents a culmination of numerous meetings, conferences, users groups, and workshops conducted throughout the year. The document incorporates the meeting logistics and objectives; names of keynote speaker, attendees, and host utility; presentation location, and key findings and recommendations from each meeti...

2011-12-21T23:59:59.000Z

274

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

ystein Mary; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

275

Key-and-keyway coupling for transmitting torque  

DOE Patents (OSTI)

The design of an improved key-and-keyway coupling for the transmission of torque is given. The coupling provides significant reductions in stress concentrations in the vicinity of the key and keyway. The keyway is designed with a flat-bottomed u-shaped portion whose inboard end terminates in a ramp which is dished transversely, so that the surface of the ramp as viewed in transverse section defines an outwardly concave arc.

Blue, S.C.; Curtis, M.T.; Orthwein, W.C.; Stitt, D.H.

1975-11-18T23:59:59.000Z

276

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

277

W-like bound entangled states and secure key distillation  

E-Print Network (OSTI)

We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

Remigiusz Augusiak; Pawel Horodecki

2008-11-21T23:59:59.000Z

278

Key distillation from Gaussian states by Gaussian operations  

E-Print Network (OSTI)

We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

M. Navascues; J. Bae; J. I. Cirac; M. Lewenstein; A. Sanpera; A. Acin

2004-05-11T23:59:59.000Z

279

Effects of Vegetation Structure and Elevation on Lower Keys Marsh Rabbit Density  

E-Print Network (OSTI)

The Lower Keys marsh rabbit (Sylvilagus palustris hefneri, LKMR), 1 of 3 subspecies of Sylvilagus palustris, is endemic to the Lower Florida Keys. The LKMR is listed as an endangered species due to predation by feral and free roaming domestic cats (Felis catus) and raccoons (Procyon lotor), road mortality, effects of storm surges, sea level rise, the small declining metapopulation size, and possible habitat loss from hardwood encroachment. The purpose of this study was to determine the current LKMR density on lands managed by the United States Navy, Naval Air Station Key West and evaluate how vegetation structure and patch elevation effect LKMR population density. I conducted fecal pellet counts to determine LKMR density, collected vegetation data using percent composition of ground cover, Robel range pole, and point-centered quarter methods, and obtained data on patch area and elevation. I used simple linear regression to assess the relationship between LKMR density and 9 measured vegetation characteristics, patch area, and patch elevation to determine which variables have an influence on LKMR density and the relationship between them. In my examination of the simple regression models, 6 out of the 11 variables appeared to influence LKMR population density. The average per patch percent composition of nonliving material and grasses, maximum height of vegetation at the range pole, distance to nearest woody vegetation, patch elevation, and visual obstruction readings (VOR) individually accounted for 26.4%, 30.4% , 18.1%, 8.5%, 6.8%, and 1.4% of the variability in LKMR density, respectively. According to the regression models, LKMR density increased in patches with greater amounts of grasses and with greater distance to woody vegetation. Habitat management is vital to the recovery of the LKMR and needs to focus on providing greater amounts of grasses and reducing the amount of woody vegetation encroachment to enhance LKMR population density.

Dedrickson, Angela

2011-12-01T23:59:59.000Z

280

A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks  

Science Conference Proceedings (OSTI)

Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impractical for a WSN. Random key predistribution ...

Guanfeng Li; Hui Ling; Taieb Znati; Weili Wu

2006-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

282

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage: The Key to a Reliable, Clean Electricity Supply Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

283

Technology Key to Harnessing Natural Gas Potential | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy What does this project do? Builds on President Obama's call for a new era for American energy

284

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist for the Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

285

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

Transportation Energy Futures Study: The Key Results and Conclusions Transportation Energy Futures Study: The Key Results and Conclusions Webinar Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 1 May, 2013 - 11:38 This webinar will outline the key results and conclusions from EERE's Transportation Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be time for questions from attendees at the end of the webinar. Principal Deputy Assistant Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on cross-cutting activities in EERE's portfolio. In particular, he is using his experience in policy

286

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist, Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

287

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

Keys El Coop Assn, Inc Keys El Coop Assn, Inc Jump to: navigation, search Name Florida Keys El Coop Assn, Inc Place Florida Utility Id 6443 Utility Location Yes Ownership C NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Rate Code 1 - Residential Service Residential Rate Code 2 - Commercial Service (General Service Non-Demand) Commercial Rate Code 3 - Commercial Service (General Service Demand) Commercial Average Rates Residential: $0.1210/kWh Commercial: $0.1220/kWh Industrial: $0.1140/kWh

288

Turn Your Key, Be Idle Free | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes gasoline, costs money, produces pollutants, and yet doesn't get you anywhere? Idling! And yet, every year, Americans waste 3 billion gallons of fuel by idling their vehicles. Idling is running a vehicle any time that it's not moving. In this condition, the car's fuel economy is exactly zero miles per gallon. Although many people think that restarting the engine too often will wear out the starter, that idea is just an "old husband's tale." In fact, idling places unnecessary wear-and-tear on the engine, and many manufacturers discourage it. Although drivers can't avoid some amount of idling, such as being stuck in

289

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar July 12, 2010 - 3:51pm Addthis APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS Nestled in the mountains of northern Arizona and just 75 miles from Grand Canyon National Park, the city of Flagstaff, Ariz. is an ideal city for the Arizona Public Service (APS) to pilot a high concentration of solar photovoltaic energy systems. "Flagstaff is unique electrically," says Eran Mahrer, Director of Renewable

290

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

291

Property:Specializations, Capabilities, and Key Facility Attributes Not  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Jump to: navigation, search Property Name Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Property Type Text Pages using the property "Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere" Showing 25 pages using this property. 1 11-ft Wave Flume Facility + Glass window 6 6-ft Wave Flume Facility + Glass window A Alden Large Flume + This is a recirculating flume facility, so a constant velocity can be maintained indefinitely. This allows collection of a much greater amount of data than possible in tow tanks. Alden's biologists are highly experienced in assessing the impacts of generation devices on fish and the facilities allow for accurate testing with fish in a highly controlled environment.

292

SECOQC White Paper on Quantum Key Distribution and Cryptography  

E-Print Network (OSTI)

The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

Romain Alleaume; Jan Bouda; Cyril Branciard; Thierry Debuisschert; Mehrdad Dianati; Nicolas Gisin; Mark Godfrey; Philippe Grangier; Thomas Langer; Anthony Leverrier; Norbert Lutkenhaus; Philippe Painchault; Momtchil Peev; Andreas Poppe; Thomas Pornin; John Rarity; Renato Renner; Gregoire Ribordy; Michel Riguidel; Louis Salvail; Andrew Shields; Harald Weinfurter; Anton Zeilinger

2007-01-23T23:59:59.000Z

293

Physical key-protected one-time pad  

E-Print Network (OSTI)

We describe an encrypted communication principle that can form a perfectly secure link between two parties without electronically saving either of their keys. Instead, cryptographic key bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 cubic millimeter scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any random bits without fundamentally altering the entire key space. Beyond the demonstrated communication scheme, our ability to securely couple the randomness contained within two unique physical objects may help strengthen the hardware for a large class of cryptographic protocols, which ...

Horstmeyer, Roarke; Vellekoop, Ivo; Yang, Changhuei

2013-01-01T23:59:59.000Z

294

Worldwide Trends in Energy Use and Efficiency: Key Insights from  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Focus Area: Power Plant Efficiency Topics: Potentials & Scenarios Website: www.iea.org/papers/2008/indicators_2008.pdf Equivalent URI: cleanenergysolutions.org/content/worldwide-trends-energy-use-and-effic Language: English Policies: "Regulations,Deployment Programs" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

295

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

296

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

297

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

298

Single, Key Gene Discovery Could Streamline Production of Biofuels |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON, DC -- A team of researchers at the Department of Energy's BioEnergy Science Center (BESC) have pinpointed the exact, single gene that controls ethanol production capacity in a microorganism. This discovery could be the missing link in developing biomass crops that produce higher concentrations of ethanol at lower costs. "The Department of Energy relies on the scientific discoveries of its labs and research centers to improve the production of clean energy sources," said Energy Secretary Steven Chu. "This discovery is an important step in developing biomass crops that could increase yield of

299

Building MRV Standards and Capacity in Key Countries | Open Energy  

Open Energy Info (EERE)

MRV Standards and Capacity in Key Countries MRV Standards and Capacity in Key Countries Jump to: navigation, search Name Building MRV Standards and Capacity in Key Countries Agency/Company /Organization World Resources Institute (WRI) Sector Climate Focus Area Renewable Energy Topics Implementation Website http://www.wri.org/topics/mrv Program Start 2011 Program End 2014 Country Brazil, Colombia, Ethiopia, India, South Africa, Thailand South America, South America, Eastern Africa, Southern Asia, Southern Africa, South-Eastern Asia References World Resources Institute (WRI)[1] Program Overview Developing countries will be required to measure, report, and verify (MRV) mitigation actions according to international guidelines, but few have the capacity to do so. The goal of this project is to build the capacity of a

300

Special Presentation: Key Findings from the Barrier Immune Radio  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Presentation: Key Findings from the Barrier Immune Radio Special Presentation: Key Findings from the Barrier Immune Radio Communications Project Speaker(s): Francis Rubinstein Girish Ghatikar Peter Haugen Date: November 29, 2007 - 12:00pm Location: 90-3122 The Barrier Immune Radio Communications (BIRC) Project was established in January 2007 by the Demand Response Emerging Technologies Program (DRETD) to identify radio frequency technologies that could enable the widespread deployment of Demand Response strategies in buildings. Researchers from Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory will present the key findings from this project in a one-hour presentation. Researchers found that several of the RF technologies tested at LBNL's Molecular Foundry building were able to provide sufficiently

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Small Businesses Key in Hydropower Tech Advancement | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Businesses Key in Hydropower Tech Advancement Businesses Key in Hydropower Tech Advancement Small Businesses Key in Hydropower Tech Advancement September 6, 2011 - 2:59pm Addthis Earlier today, the Department of Energy and the Department of Interior announced nearly $17 million in funding over the next three years to advance hydropower technology. The funding announced today will go to sixteen innovative projects around the country, including sustainable small hydro projects, like the ones from Hydro Green Energy, a small business that handles hydroelectric power generation and power and communication line construction. The company, which has eight employees currently, has been awarded funding for two projects. Near Space Systems, a Colorado Springs-based company, is a service-disabled veteran-owned business with a manufacturing focus that's

302

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

303

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

304

Security bounds for continuous variables quantum key distribution  

E-Print Network (OSTI)

Security bounds for key distribution protocols using coherent and squeezed states and homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) collective attacks where Eve interacts individually with the sent states, but delays her measurement until the end of the reconciliation process. For the case of a lossy line and coherent states, it is first proven that a secure key distribution is possible up to 1.9 dB of losses. For the second scenario, the security bounds are the same as for the completely incoherent attack.

Miguel Navascues; Antonio Acin

2004-07-19T23:59:59.000Z

305

Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation  

E-Print Network (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

Dagmar Bruss; Matthias Christandl; Artur Ekert; Berthold-Georg Englert; Dagomir Kaszlikowski; Chiara Macchiavello

2003-03-31T23:59:59.000Z

306

KeyTex Energy LLC | Open Energy Information  

Open Energy Info (EERE)

KeyTex Energy LLC KeyTex Energy LLC Jump to: navigation, search Name KeyTex Energy LLC Place Greensburg, Pennsylvania Zip 15601 Product KeyTex Energy is a full service energy and consulting company, helping businesses implement both wholesale and retail strategies to control and reduce energy costs as well as manage the risks and complexities associated with the energy markets. Coordinates 40.299245°, -79.543159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.299245,"lon":-79.543159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

307

The S/KEY One-Time Password System  

Science Conference Proceedings (OSTI)

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories ...

N. Haller

1995-02-01T23:59:59.000Z

308

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels  

Science Conference Proceedings (OSTI)

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally ...

Dominic Mayers

1996-08-01T23:59:59.000Z

309

The Key Renewal Theorem for a Transient Markov Chain  

E-Print Network (OSTI)

We consider a time-homogeneous Markov chain $X_n$, $n\\ge0$, valued in ${\\bf R}$. Suppose that this chain is transient, that is, $X_n$ generates a $\\sigma$-finite renewal measure. We prove the key renewal theorem under condition that this chain has asymptotically homogeneous at infinity jumps and asymptotically positive drift.

Korshunov, Dmitry

2007-01-01T23:59:59.000Z

310

Essential lack of security proof in quantum key distribution  

E-Print Network (OSTI)

All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability $\\geq 1-\\epsilon$ under the trace distance criterion $d\\leq\\epsilon$, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.

Horace P. Yuen

2013-10-02T23:59:59.000Z

311

Illustrated plant identification keys: An interactive tool to learn botany  

Science Conference Proceedings (OSTI)

An Interactive Dichotomous Key (IDK) for 390 taxa of vascular plants from the Ria de Aveiro, available on a website, was developed to help teach botany to school and universitary students. This multimedia tool includes several links to Descriptive and ... Keywords: Applications in subject areas, Post-secondary education, Secondary education, Teaching/learning strategies

Helena Silva; Rosa Pinho; Lsia Lopes; Antnio J. A. Nogueira; Paulo Silveira

2011-05-01T23:59:59.000Z

312

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

construction of a verifiable ran- dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

313

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

#cient construction of a verifiable ran­ dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali­Rabin­Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

314

Verifiable Random Functions from Identity-Based Key Encapsulation  

Science Conference Proceedings (OSTI)

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption ...

Michel Abdalla; Dario Catalano; Dario Fiore

2009-04-01T23:59:59.000Z

315

A Veri able Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

?? Abstract. We give a simple and e?cient construction of a veri#12;able random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids reasonable given cur- rent state of knowledge. For small message spaces, our VRF's proofs and keys have

316

What were the key energy commodity price trends in 2011?  

Reports and Publications (EIA)

Energy commodity price trends varied widely during 2011. Crude oil and petroleum products prices increased during 2011, while natural gas, coal, and electricity prices declined. This article provides an overview of key energy commodity price trends in 2011 based on prices seen in futures markets.

2012-02-14T23:59:59.000Z

317

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

318

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

319

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

An improved quantum key distribution test system operating at clock rates of up to 2GHz using a specially adapted commercially available silicon single photon avalanche diode is presented. The use of improved detectors has improved the fibre-based test system performance in terms of transmission distance and quantum bit error rate.

K. J. Gordon; V. Fernandez; G. S. Buller; I. Rech; S. D. Cova; P. D. Townsend

2006-05-08T23:59:59.000Z

320

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network (OSTI)

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

322

news and views A key issue for hydrogen storage materi-  

E-Print Network (OSTI)

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

323

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network (OSTI)

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS Gerald A. Navratil Columbia University/FESAC Burning Plasma Strategy Dec 2002 NRC/NAS Interim Report on Burning Plasmas Jan 30, 2003 DOE of the physics of burning plasma, advance fusion technology, and contribute to the development of fusion energy

324

Key issues in ITER diagnostics: Problems and solutions (invited)  

Science Conference Proceedings (OSTI)

The key problems associated with designing diagnostic systems for the International Thermonuclear Experimental Reactor (ITER) are identified and representative solutions are described. The plans for dealing with some outstanding issues are briefly presented. The detailed work is specific to the ITER

A. E. Costley; Members of the ITER Joint Central Team and Home Teams

1999-01-01T23:59:59.000Z

325

Quantum key distribution with a reference quantum state  

SciTech Connect

A new quantum key distribution protocol stable at arbitrary losses in a quantum communication channel has been proposed. For the stability of the protocol, it is of fundamental importance that changes in states associated with losses in the communication channel (in the absence of the eavesdropper) are included in measurements.

Molotkov, S. N., E-mail: molotkov@issp.ac.ru [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

2011-11-15T23:59:59.000Z

326

Generic Security Proof of Quantum Key Exchange using Squeezed States  

E-Print Network (OSTI)

Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.

Karin Poels; Pim Tuyls; Berry Schoenmakers

2005-08-09T23:59:59.000Z

327

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

328

Influence of Midlatitude Winds on the Stratification of the Equatorial Thermocline  

Science Conference Proceedings (OSTI)

The stratification of the equatorial thermocline is a key variable for tropical climate dynamics, through its influence on the temperature of the water that upwells in the eastern equatorial ocean. In this study, two types of ocean models are ...

Masami Nonaka; Julian P. McCreary Jr.; Shang-Ping Xie

2006-02-01T23:59:59.000Z

329

NIST Demonstrates Key Step in Use of Quantum Computers ...  

Science Conference Proceedings (OSTI)

... to factor large numbers, are used to encode ... Nevertheless, Shor's algorithm uses these properties to ... in the original input, and to use this information ...

2013-04-23T23:59:59.000Z

330

TYPiMatch: type-specific unsupervised learning of keys and key values for heterogeneous web data integration  

Science Conference Proceedings (OSTI)

Instance matching and blocking, a preprocessing step used for selecting candidate matches, require determining the most representative attributes of instances called keys, based on which similarities between instances are computed. We show that for the ... Keywords: heterogeneous web data, information integration, unsupervised learning

Yongtao Ma; Thanh Tran

2013-02-01T23:59:59.000Z

331

Behavioral ecology of striped skunk: factors influencing urban rabies management  

E-Print Network (OSTI)

Striped skunks (Mephitis mephitis) are a rabies vector in Texas and efforts are underway to develop an oral rabies vaccination program for skunks. To better understand some of the components necessary, I studied the habitat preferences and home range of skunks, an alternative skunk capture method, and surveyed the knowledge base of medical providers practicing across the state. I radiocollared 99 skunks from the Houston, Texas metropolitan area and monitored skunk movements from March 2004June 2006. To accelerate progress of this study, I captured 93 of 99 skunks using a dip net. Dip netting allowed for an effective collection alternative to cage trapping. Movement data indicated a strong preference for short grass areas (82%), however, habitat use changed to remote, brushy areas when temperatures were ?7C. Habitat use during the year was different (P = 0.001), with December 2004, January 2005, and February 2005 significantly (P = 0.001) different from one another. Additionally, habitat use during December 2005, February 2006, and March 2006 were significantly different (P = 0.045, P =0.098, and P =0.003, respectively). Data from 20 skunks, covering multiple seasons, were analyzed for home range use. I found male home range use averaged 255 ha (217345), while females averaged 126 ha (60218). Male range use was significantly larger than females (P = 0.005). No significant seasonal movements were observed. Lastly, I conducted a survey of 297 Texas primary care medical providers to assess their knowledge of rabies vaccine procedures and their experience with rabies vaccines. Small town providers within the oral rabies vaccination baiting zone were more aware of rabies prophylaxis (P 95% of 297) rarely saw patients for rabies prophylaxis. Survey data indicated providers have minimal, if any, experience with acquiring and administering rabies prophylaxis. My data suggests that an effective oral rabies vaccination program could be established within urban areas by using short grass area baiting strategies during the fall season, using dip net capturing for faster surveillance collection, and by initiating a rabies education program targeted at Texas primary care physicians and their staff.

Ruffino, Denise Marie

2008-12-01T23:59:59.000Z

332

Main Factors Influencing the Qualitative Properties of Casts in the ...  

Science Conference Proceedings (OSTI)

Numerical Modeling of Centrifugally Cast HSS Rolls Numerical Simulation of Electro-magnetic Turbulent Inhibitor Technology in a Tundish Optimizing the...

333

146 The Influence of Geometrical Factors of the Deformation Zone ...  

Science Conference Proceedings (OSTI)

005 Calcium Phosphates for Drug Carrier: Adsorption and Release Kinetics of Drugs ... 058 Properties Optimization of Refractory Mineral Resources in China.

334

An Examination of the Thermally Related Factors Influencing the ...  

Science Conference Proceedings (OSTI)

Abstract Scope, The melting/dissolution behaviour of solids in molten titanium has ... An Effective Method for Determining Single Crystal Material Parameters in ...

335

Biofuels in South Africa : factors influencing production and consumption.  

E-Print Network (OSTI)

?? Interest in the biofuels industry in South Africa is driven largely by high oil prices and a strain on energy resources and logistics. This (more)

Chambers, David

2010-01-01T23:59:59.000Z

336

Factors influencing the neglect of color photography : 1860 to 1970  

E-Print Network (OSTI)

While the history of photographic color technology has been adequately discussed by E.J. Hall, Joseph Friedman, and Brian Coe, the relationship between complex tri-color systems and generalized use of color photography has ...

Milanowski, Stephen R

1982-01-01T23:59:59.000Z

337

Discussion on Cycle Water Injection Effect and Its Influencing Factors  

Science Conference Proceedings (OSTI)

Cyclic waterflooding is a kind of waterflood technique, which can improve the waterflood efficiency in low-permeability and fracture-porosity reservoir by changing periodically injected water volume. This article gives the principle and the applied conditions ... Keywords: water flooding, principle, the opportunity of water injection, water injection efficiency, water injection period

Shan Wuyi, Zhang Xue

2013-06-01T23:59:59.000Z

338

Metallurgical Factors Influencing the Machinability of Inconel 718  

Science Conference Proceedings (OSTI)

such as milling, drilling and turning have an average metal removal rate of about 3.28 cm3 per minute for Inconel7 18 which results in approximately 3625 hours...

339

Determining Factors Influencing Nuclear Envelope and Nuclear Pore Complex Structure.  

E-Print Network (OSTI)

The cells nuclear envelope (NE) has pores that are stabilized by nuclear pore complexes (NPC), large proteinaceous structures whose function is to mediate transport between the nucleus and cytoplasm. Although the transport process is well studied, the mechanism of NPC assembly from its protein constituents (nucleoporins) is less understood. To investigate NPC biogenesis, I investigated mutants that result in defective NPCs in Saccharomyces cerevisiae. First, I examined mutants in the GPI anchor pathway (gpi1) that resulted in mislocalized nucleoporins by testing two models: gpi1 mutants cause either misregulation of N-linked glycosylation or alter membrane properties. To test the models, I combined gpi1 mutants with a nucleoporin mutant that is susceptible to disruption of glycosylation or with mutants in membrane bending proteins. Select double mutant of each class rescued the growth phenotype of the single mutants. These results indicate that both of the models play a role in NPC assembly. Secondly, we found the proteasome, a complex responsible for degrading proteins is involved in NPC assembly. In order to further investigate interactions between the NPC and the proteasome, I combined the proteasomal mutant with 3 classes of nuclear pore assembly (npa) mutants to test for synergistic interactions. Positive interactions were observed as the proteasome mutant rescued a temperature sensitive npa mutant providing further evidence for the role of the proteasome in NPC assembly

Gouni, Sushanth

2013-05-01T23:59:59.000Z

340

An analysis of factors influencing wheat flour yield.  

E-Print Network (OSTI)

??The cost of wheat is the largest input cost for a flour mill, and as a result, profitability in wheat flour milling is determined in (more)

Mog, David L.

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Factors Influencing Simulated Changes in Future Arctic Cloudiness  

Science Conference Proceedings (OSTI)

This study diagnoses the changes in Arctic clouds simulated by the Community Climate System Model version 3 (CCSM3) in a transient 2 CO2 simulation. Four experimentsone fully coupled and three with prescribed SSTs and/or sea ice coverare used ...

Stephen J. Vavrus; Uma S. Bhatt; Vladimir A. Alexeev

2011-09-01T23:59:59.000Z

342

Anthrax Lethal Factor  

NLE Websites -- All DOE Office Websites (Extended Search)

Thiang Yian Wong, Robert Schwarzenbacher and Robert C. Liddington Thiang Yian Wong, Robert Schwarzenbacher and Robert C. Liddington The Burnham Institute, 10901 North Torrey Pines Road, La Jolla, CA 92037. Anthrax Toxin is a major virulence factor in the infectious disease, Anthrax1. This toxin is produced by Bacillus anthracis, which is an encapsulated, spore-forming, rod-shaped bacterium. Inhalation anthrax, the most deadly form, is contracted through breathing spores. Once spores germinate within cells of the immune system called macrophages2, bacterial cells are released into the bloodstream. There they proliferate rapidly and secrete Anthrax Toxin, ultimately leading to septic shock and death. Although antibiotics may be used to kill the bacteria, the level of toxin has often become so high in the bloodstream that removing the bacteria alone is not sufficient to prevent death. Therefore, the design of anti-toxins offers the prospect of treatment in the advanced stages of infection. Together with collaborators from the NIH and Harvard Medical School, we are involved in the atomic resolution study of the Anthrax Toxin components and their complexes, including small molecules with therapeutic potential. Data collection at SSRL and other synchrotron radiation sources has been key to the advances made in this research so far and is expected to play a continuing role in the future.

343

Key West, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Key West, FL) (Redirected from Key West, FL) Jump to: navigation, search Equivalent URI DBpedia Coordinates 24.5557025°, -81.7825914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":24.5557025,"lon":-81.7825914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

344

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 27, 2011 - 3:25pm July 27, 2011 - 3:25pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson - Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy Dot Harris - Director of the Office of Minority Economic Impact, Department of Energy President Obama said, "I am honored that these talented individuals have decided to join this Administration and serve our country. I look forward to working with them in the months and years to come." President Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson, Nominee for Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy

345

Key Accomplishments @ Catalysis: Reactivity and Structure Group | Chemistry  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments WGS: Importance of the Metal-Oxide Interface in Catalysis: In Situ Studies of the Water-Gas Shift Reaction by Ambient-Pressure X-ray Photoelectron Spectroscopy A New Type of Strong Metal-Support Interaction and the Production of H-2 through the Transformation of Water on Pt/CeO2(111) and Pt/CeOx/TiO2(110) Catalysts In situ studies of CeO2-supported Pt, Ru, and Pt-Ru alloy catalysts for the water-gas shift reaction: Active phases and reaction intermediates In situ/operando studies for the production of hydrogen through the water-gas shift on metal oxide catalysts Mechanistic understanding of WGS catalysts from first principles: Au(111) Supported Oxide Nanoparticles Theoretical catalyst optimization of WGS catalysts: Cu(111) supported oxide nanostructures

346

Contributions to Key Energy Conversion Technologies and Advanced Methods  

NLE Websites -- All DOE Office Websites (Extended Search)

Contributions to Key Energy Conversion Technologies and Advanced Methods Contributions to Key Energy Conversion Technologies and Advanced Methods for Optimum Energy Systems Design and Planning Speaker(s): Daniel Favrat Date: February 27, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Kristina LaCommare This presentation reviews some of EPFL-LENI's recent contributions to advanced cogeneration and heat pump technologies as well as to new system design approaches based on multimodal evolutionar algorithms. In the field of cogeneration, theoretical and experimental results show that gas engines with unscavenged ignition prechambers can, without the need of a catalyst, achieve high efficiencies with reasonable emissions with both natural gas and biogas. Combination with Organic Rankine Cycle (ORC) heat recovery

347

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

348

Quantum key distribution using intra-particle entanglement  

E-Print Network (OSTI)

We propose the use of intra-particle entanglement to enhance the security of a practical implementation of the Bennett-Brassard-1984 (BB84) quantum key distribution scheme. Intra-particle entanglement is an attractive resource since it can be easily generated using only linear optics. Security is studied under a simple model of incoherent attack for protocols involving two or all five mutually unbiased bases. In terms of efficiency of secret key generation and tolerable error rate, the latter is found to be superior to the former. We find that states that allow secrecy distillation are necessarily entangled, though they may be local. Since more powerful attacks by Eve obviously exist, our result implies that security is a strictly stronger condition than entanglement for these protocols.

S. Adhikari; Dipankar Home; A. S. Majumdar; A. K. Pan; Akshata Shenoy H.; R. Srikanth

2011-01-04T23:59:59.000Z

349

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network (OSTI)

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

350

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

and Policy Recommendations for Future Bioenergy and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Agency/Company /Organization Food and Agriculture Organization of the United Nations Sector Land Focus Area Biomass, Agriculture Topics Co-benefits assessment, Policies/deployment programs, Background analysis Resource Type Lessons learned/best practices Website http://www.fao.org/docrep/013/ Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development[1] Abstract "The Government of Thailand, through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion

351

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2011 - 9:20pm August 2, 2011 - 9:20pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Ashton B. Carter - Nominee for Deputy Secretary of Defense, Department of Defense I. Charles McCullough III - Inspector General of the Intelligence Community, Office of the Director of National Intelligence Ernest Mitchell, Jr. - Administrator, United States Fire Administration, Federal Emergency Management Agency, Department of Homeland Security Nancy M. Ware - Director, Court Services and Offender Supervision Agency for the District of Columbia Gregory H. Woods - General Counsel, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts:

352

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy efficiency goals and standards. In addition, this guide will help instruct policy makers on how they can: » Encourage the adoption of statewide codes. » Establish energy code awareness programs. » Support enforcement of and compliance with energy codes. » Participate in the development of national codes and standards. » Determine the viability of the new code. Building TECHnOlOgiES PROgRAM Resource Guide for Policy Makers PREPAREd By Building Energy Codes Program The u.S. department of Energy's (uSdOE) Building Energy Codes Program (BECP) is an information resource on national energy codes. They work with other government

353

Extensible router for multi-user quantum key distribution network  

E-Print Network (OSTI)

A feasible quantum key distribution (QKD) network scheme has been proposed with the wavelength routing. An apparatus called "quantum router", which is made up of many wavelength division multiplexers, can route the quantum signals without destroying their quantum states. Combining with existing point-to-point QKD technology, we can setup a perfectly QKD star-network. A simple characteristic and feasibility of this scheme has also been obtained.

Zhang, T; Han, Z F; Mo, X F; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Zhang, Tao

2006-01-01T23:59:59.000Z

354

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

355

Key management and encryption under the bounded storage model.  

SciTech Connect

There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

2005-11-01T23:59:59.000Z

356

Distal chromatin structure influences local nucleosome positions and gene expression  

E-Print Network (OSTI)

The positions of nucleosomes across the genome influence several cellular processes, including gene transcription. However, our understanding of the factors dictating where nucleosomes are located and how this affects gene ...

Jansen, An

357

Factors Affecting KM Implementation in the Chinese Community  

Science Conference Proceedings (OSTI)

This paper reviews past research on KM to identify key factors affecting Chinese KM implementation. It begins with a chronological overview of 76 KM related publications, followed by two separate discussions of socio-cultural and non-socio-cultural factors ... Keywords: China, Chinese, KM Implementation, Knowledge Management

Yang Lin; Kimiz Dalkir

2010-01-01T23:59:59.000Z

358

Regarding Proton Form Factors  

Science Conference Proceedings (OSTI)

1 DFG Research Center ''Mathematics for Key Technologies,'' c=o Weierstrass Institute ...... Burden, C. J., Roberts, C. D., Thomson, M. J.: Phys. Lett. B371, 163...

359

Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative *Ways of Using Wireless Technology to Help You Reduce Energy Usage at your Facility Together with our industry partners, we strive to: * Accelerate adoption of the many energy-efficient technologies and practices available today * Conduct vigorous technology innovation to radically improve future energy diversity, resource efficiency, and carbon mitigation * Promote a corporate culture of energy efficiency and carbon management What Is the Industrial Technologies Program ? The Industrial Technologies Program (ITP) is the lead federal agency responsible for improving energy efficiency in the largest energy-using sector of the country. Industrial Sector National Initiative

360

Local structures - key to improved gas adsorption in carbon materials |  

NLE Websites -- All DOE Office Websites (Extended Search)

Functional Materials for Energy Functional Materials for Energy Local structures - key to improved gas adsorption in carbon materials September 23, 2013 (Inset, top left) A simulated disordered carbon structure. (Inset, bottom right) Same structure, with dense colored regions showing the strongest adsorption positions. (Main figure) Isosteric heat of adsorption as a function of carbon density, showing the strong change of adsorption with pore size. Combined results from electron microscopy, neutron scattering, and theory, illustrate the link between local structures and adsorption properties in carbon materials. The achieved understanding at the atomic scale is a crucial step towards predicting and designing materials with enhanced gas adsorption properties, with important implications for applications such as

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

362

Stable polarization-encoded quantum key distribution in fiber  

E-Print Network (OSTI)

Polarizations of single-photon pulses have been controlled with long-term stability of more than 10 hours by using an active feedback technique for auto-compensation of unpredictable polarization scrambling in long-distance fiber. Experimental tests of long-term operations in 50, 75 and 100 km fibers demonstrated that such a single-photon polarization control supported stable polarization encoding in long-distance fibers to facilitate stable one-way fiber system for polarization-encoded quantum key distribution, providing quantum bit error rates below the absolute security threshold.

Wu, G; Li, Y; Zeng, H; Wu, Guang; Chen, Jie; Li, Yao; Zeng, Heping

2006-01-01T23:59:59.000Z

363

Key results from SB8 simulant flowsheet studies  

SciTech Connect

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

364

Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells  

SciTech Connect

Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

1997-10-13T23:59:59.000Z

365

Conversion factors for energy equivalents: All factors  

Science Conference Proceedings (OSTI)

... Conversion factors for energy equivalents Return to online conversions. Next page of energy equivalents. Definition of uncertainty ...

366

Oil resources: the key to prosperity or to poverty? : Influence of oil price shocks on spending of oil revenues.  

E-Print Network (OSTI)

??Abundant natural resources, in particular oil, play an important role in the economics of many countries. The oil price shocks that have been happening continuously (more)

Selivanova, Olga

2008-01-01T23:59:59.000Z

367

Organisational change through influence  

Science Conference Proceedings (OSTI)

Influence is a phenomenon underpinning many types of interactions in both human and artificial organisations, and has a significant impact on the operation of the organisation. If influence can be examined at the ... Keywords: Formal specification and analysis/verification, Organisational changes, Organisations, Software agents

Mairi Mccallum; Wamberto W. Vasconcelos; Timothy J. Norman

2008-10-01T23:59:59.000Z

368

Newly Described "Dragon" Protein Could Be Key to Bird Flu Cure |  

NLE Websites -- All DOE Office Websites (Extended Search)

Hearing the Highest Pitches Hearing the Highest Pitches Unveiling the Secrets of Nanoparticle Haloing A Fruit-Fly Protein that Captures Tumor Growth Factors A Protein that Repairs Damage to Cancer Cells An X-ray Vortex on the Horizon? Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Newly Described "Dragon" Protein Could Be Key to Bird Flu Cure JULY 16, 2008 Bookmark and Share The overall structure of the PAC -PB1 N complex. The structure is colored according to secondary structure and elements are labeled. Helices are shown as cylinders and are red in the brain domain and blue in the mouth domain; strands are yellow and loops are green. The PB1 N peptide is

369

Key Distribution based on Three Player Quantum Games  

E-Print Network (OSTI)

We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In the scheme proposed in this paper, players in the game, Bob and Charlie (and Alice also) can get some common key or information (applied strategies and their payoffs in the game), when Alice informs Bob and Charlie about some results of the measurement made by her. Even if somebody else knows the public information, he/she can not get any key information. There is not any arbiter in our scheme, since existence of an arbiter increases the risk of wiretapping. Lastly we discuss robustness of the proposed QKD method for eavesdrop. We show that though maximally entangled case and non-entangled case essentially provide an equivalent way as QKD, the latter is not available in the case where there are some eavesdroppers. At the same time, we point put that the entanglement of the initial state is crucial when a partially entangled state is used.

Norihito Toyota

2010-10-09T23:59:59.000Z

370

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network (OSTI)

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

371

Influence of wettability on liquid water transport in gas diffusion layer of proton exchange membrane fuel cells (PEMFC)  

E-Print Network (OSTI)

Water management is a key factor that limits PEFC's performance. We show how insights into this problem can be gained from pore-scale simulations of water invasion in a model fibrous medium. We explore the influence of contact angle on the water invasion pattern and water saturation at breakthrough and show that a dramatic change in the invasion pattern, from fractal to compact, occurs as the system changes from hydrophobic to hydrophilic. Then, we explore the case of a system of mixed wettability, i.e. containing both hydrophilic and hydrophobic pores. The saturation at breakthrough is studied as a function of the fraction of hydrophilic pores. The results are discussed in relation with the water management problem, the optimal design of a GDL and the fuel cell performance degradation mechanisms. We outline how the study could be extended to 3D systems, notably from binarised images of GDLs obtained by X ray microtomography.

Hamza Chraibi; L. Ceballos; M. Prat; Michel Quintard; Alexandre Vabre

2009-09-16T23:59:59.000Z

372

Water Is Key to Sustainability of Energy Production  

E-Print Network (OSTI)

Estimate net water use (consumption) ­ Irrigation water, process water, produced water, cooling water 4 fuels The Issue With substantial amounts of water needed to produce energy feedstocks and fuels, water consumption factors across the U.S. (assuming corn produced from all regions is used to produce ethanol) Water

Argonne National Laboratory

373

Investing in Oil and Natural Gas A Few Key Issues  

U.S. Energy Information Administration (EIA) Indexed Site

Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Investing in Oil and Natural Gas: A Few Key Issues Prepared for EIA Conference Susan Farrell, Senior Director PFC Energy April 8, 2009 Investing in Oil and Gas| PFC Energy| Page 2 The Top 20 IOCs and Top 20 NOCs Account for Over Half of E&P Spend Source: PFC Energy, Global E&P Surveys Investing in Oil and Gas| PFC Energy| Page 3 Oil Prices Rose, But So Did Costs + 52% $0 $20 $40 $60 $80 $100 $120 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 WTI $/barrel Annual averages Large Gulf of Mexico Facility Costs by Segment Avg $28.31 Avg $59.13 Source: PFC Energy Investing in Oil and Gas| PFC Energy| Page 4 Near term Spending Cuts will be Significant

374

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 9, 2009 - 12:00am December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about real change for the American people. I look forward to working with them in

375

Nano Changes Have Macro Importance for a Key Electronics Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Squeezing an Old Material Could Yield "Instant-On" Memory Squeezing an Old Material Could Yield "Instant-On" Memory A Metal That Becomes Transparent under Pressure Under Pressure, Atoms Make Unlikely Alloys Slowing Down Near the Glass Transition New Light on Improving Engine Efficiencies Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Nano Changes Have Macro Importance for a Key Electronics Material APRIL 23, 2009 Bookmark and Share Original image courtesy of http://www.freefoto.com By combining the results from several powerful techniques for studying materials structure at the nanoscale, including work at the U.S. Department of Energy's Advanced Photon Source (APS) at Argonne National Laboratory,

376

LANL to play key role in biofuel development  

NLE Websites -- All DOE Office Websites (Extended Search)

Biofuel development Biofuel development LANL to play key role in biofuel development LANL to create a proof-of-concept system for commercializing algae-based biofuels or other advanced biofuels that can be transported and sold using the nation's existing fueling infrastructure. January 14, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

377

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

378

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 10, 2010 - 12:00am December 10, 2010 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Peter B. Lyons, Assistant Secretary for Nuclear Energy, Department of Energy Denise E. O'Donnell, Director of the Bureau of Justice Assistance, Department of Justice Stephanie O'Sullivan, Principal Deputy Director of National Intelligence, Directorate of National Intelligence David Shear, Ambassador to the Socialist Republic of Vietnam, Department of State The President also announced his intent to appoint Harvey S. Wineberg as a Member of the President's Advisory Council on Financial Capability. His biography is below. President Obama said, "The American people will be greatly served by the

379

Potential Benefits from Improved Energy Efficiency of Key Electrical Products:  

NLE Websites -- All DOE Office Websites (Extended Search)

8254 8254 Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India Michael McNeil, Maithili Iyer, Stephen Meyers, Virginie Letschert, James E. McMahon Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California, Berkeley Berkeley, CA December 2005 This work was supported by the International Copper Association through the U.S. Department of Energy under Contract No. DE-AC03-76SF00098. 2 ABSTRACT The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These

380

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 8, 2009 - 12:00am July 8, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joe Garcia, Director of the Office of Minority Economic Impact, Department of Energy Michael H. Posner, Assistant Secretary of State for Democracy, Human Rights, and Labor, Department of State Stephen J. Rapp, Ambassador at Large for War Crimes Issues, Department of State Alexander G. Garza, Assistant Secretary for Health Affairs and Chief Medical Officer, Department of Homeland Security Susan L. Kurland, Assistant Secretary for Aviation and International Affairs, Department of Transportation Kenneth A. Spearman, Member of the Board of Directors, Farm Credit Administration Rolena Adorno, Member of the National Council on the Humanities

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A Key Target for Diabetes Drugs | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Molten Metal Solidifies into a New Kind of Glass Molten Metal Solidifies into a New Kind of Glass Organic Polymers Show Sunny Potential A New Family of Quasicrystals Cool Muscles: Storing Elastic Energy for Flight A Further Understanding of Superconductivity Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor, which could help scientists design new drugs for type 2 diabetes. (Image courtesy of Katya Kadyshevskaya, The Scripps Research Institute) The three-dimensional (3-D) atomic structure of the human glucagon receptor has been identified by an international team of researchers carrying out

382

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Florida (Utility Company) Florida (Utility Company) Jump to: navigation, search Name Key West City of Place Florida Utility Id 10226 Utility Location Yes Ownership M NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Governmental Recreational Facility Lighting (Schedule S-3) LED High Watt, Approx. 72 Watt (Street Light Schedule S-1) Lighting LED High Watt, Approx. 72 Watts (Area Lighting Schedule S-2) Lighting

383

LANL breaks ground on key sediment control project  

NLE Websites -- All DOE Office Websites (Extended Search)

Sediment control project Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately $2 million features are up to eight feet high and made of rocks packed tightly into wire enclosures. November 5, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

384

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network (OSTI)

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process of initiating an energy management program is detailed. The establishment of long range goals, together with the organization and commitment to accomplish these goals are specified. The necessity of performing an energy audit is discussed, together with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed.

Darby, D. F.

1984-01-01T23:59:59.000Z

385

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2009 - 12:00am 4, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Daniel B. Poneman, Deputy Secretary, Department of Energy; Fred P. Hochberg, President and Chairman of the Export-Import Bank of the United States; Francisco "Frank" J. Sánchez, Under Secretary for International Trade, Department of Commerce; Miriam E. Sapiro, Deputy Trade Representative; Judith A. McHale, Under Secretary for Public Diplomacy and Public Affairs, Department of State; Philip J. "P.J." Crowley, Assistant Secretary of State for Public Affairs, Department of State; Bonnie D. Jenkins, Coordinator for Threat Reduction Programs (with the Rank of Ambassador), Department of

386

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network (OSTI)

Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators (KPIs) to summarize volumes of data into a few critical nuggets of actionable information. These KPIs provide both the metrics that will be used to determine the success of a business plan as well as the timely information managers need to track performance and make adjustments to ensure success. A similar approach can be used in the practice of energy management, where KPIs can be designed to measure the success of key elements in an energy management plan and provide energy managers with the timely nuggets of information they need to ensure success. This paper describes how to define and use KPIs to track the performance and measure the success of an energy management plan. A framework is provided to assist in selecting measurable goals from an energy management plan and determine the raw data and processing required to generate the associated KPIs.

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

387

Understanding Key Players and Factors Involved in the Implementation of Physical Activity Push Strategies into Organizational Settings  

E-Print Network (OSTI)

evolution of an organizational heart health assessment. Am Jbuilding a legacy of health organizational wellness program.in employee health and organizational productivity outcomes

Hopkins, Jammie Mack

2012-01-01T23:59:59.000Z

388

Key success factors in managing the visitors' experience at the Klein Karoo National Arts Festival / Erasmus L.J.J.  

E-Print Network (OSTI)

??The ABSA Klein Karoo National Arts Festival (KKNK) is one of the biggest and most popular Afrikaans arts festivals in South Africa, and since its (more)

Erasmus, Lourens Johannes Jacobus

2011-01-01T23:59:59.000Z

389

Conversion factors for energy equivalents: All factors  

Science Conference Proceedings (OSTI)

... Previous page of energy equivalents. Definition of uncertainty notation eg, 123(45) | Basis of conversion factors for energy equivalents. Top. ...

390

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified by the LKMR Recovery Team: (1) monitoring of populations and (2) reintroduction. Monitoring the distribution and status of LKMR populations is critical for targeting future management actions. Informal transects for rabbit fecal pellets were used to survey habitat patches documented in1988?1995 surveys and to identify additional patches of occupied and potential habitat. Next, a buffer was created around patches to help managers account for uncertainty in rabbit movements and to identify groups of patches that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied and potential habitat. Considering only areas included in 1988?1995 surveys, however, revealed a net decrease in the number of occupied patches. Many of the recently extirpated populations, which tended to occupy the periphery of larger islands or small neighboring islands, were unlikely to be recolonized without human intervention. Reintroduction provides a means of artificially recolonizing potential habitat. Two pilot reintroductions were conducted to evaluate this conservation strategy for the species. The second reintroduction was postponed, but the first effort met all criteria for short-term success, including survival comparable to a control group, fidelity to release sites, and evidence of reproduction. There are a limited number of potential source populations for translocations. Future efforts should consider using in-situ captive breeding to prevent potential long-term impacts to these populations. Few potential release sites exhibited suitable habitat quality and landscape context. Thus, for reintroduction to be more widely-applied for this species, it must be part of a comprehensive management plan involving land acquisition, control of secondary impacts from development, and habitat restoration and enhancement.

Faulhaber, Craig Alan

2003-12-01T23:59:59.000Z

391

Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities  

SciTech Connect

This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

Cassard, H.; Denholm, P.; Ong, S.

2011-02-01T23:59:59.000Z

392

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

393

Multi-client quantum key distribution using wavelength division multiplexing  

Science Conference Proceedings (OSTI)

Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons are emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.

Grice, Warren P [ORNL; Bennink, Ryan S [ORNL; Earl, Dennis Duncan [ORNL; Evans, Philip G [ORNL; Humble, Travis S [ORNL; Pooser, Raphael C [ORNL; Schaake, Jason [ORNL; Williams, Brian P [ORNL

2011-01-01T23:59:59.000Z

394

Feasibility of 300 km Quantum Key Distribution with Entangled States  

E-Print Network (OSTI)

A significant limitation of practical quantum key distribution (QKD) setups is currently their limited operational range. It has recently been emphasized (X. Ma, C.-H. F. Fung, and H.-K. Lo., Phys. Rev. A, 76:012307, 2007) that entanglement-based QKD systems can tolerate higher channel losses than systems based on weak coherent laser pulses (WCP), in particular when the source is located symmetrically between the two communicating parties, Alice and Bob. In the work presented here, we experimentally study this important advantage by implementing different entanglement-based QKD setups on a 144~km free-space link between the two Canary Islands of La Palma and Tenerife. We established three different configurations where the entangled photon source was placed at Alice's location, asymmetrically between Alice and Bob and symmetrically in the middle between Alice and Bob, respectively. The resulting quantum channel attenuations of 35~dB, 58~dB and 71~dB, respectively, significantly exceed the limit for WCP systems. This confirms that QKD over distances of 300~km and even more is feasible with entangled state sources placed in the middle between Alice and Bob.

Thomas Scheidl; Rupert Ursin; Alessandro Fedrizzi; Sven Ramelow; Xiao-Song Ma; Thomas Herbst; Robert Prevedel; Lothar Ratschbacher; Johannes Kofler; Thomas Jennewein; Anton Zeilinger

2010-07-27T23:59:59.000Z

395

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

396

Artificial neural networks for electricity consumption forecasting considering climatic factors  

Science Conference Proceedings (OSTI)

This work develops Artificial Neural Networks (ANN) models applied to predict the consumption forecasting considering climatic factors. It is intended to verify the influence of climatic factors on the electricity consumption forecasting through the ... Keywords: artificial neural networks, electricity consumption forecasting

Francisco David Moya Chaves

2010-06-01T23:59:59.000Z

397

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

398

High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors  

E-Print Network (OSTI)

We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

Spellmeyer, Neal W.

399

A hybrid data structure for dense keys in in-memory database systems  

E-Print Network (OSTI)

This thesis presents a data structure which performs well for in-memory indexing of keys that are unevenly distributed into clusters with a high density of keys. This pattern is prevalent, for example, in systems that use ...

Muiz Navarro, Jos Alberto

2010-01-01T23:59:59.000Z

400

Direct and Reverse Secret-Key Capacities of a Quantum Channel  

E-Print Network (OSTI)

We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

Braunstein, Samuel L.

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NERSC Global Filesystem Played a Key Role in Discovery of the...  

NLE Websites -- All DOE Office Websites (Extended Search)

NGFS Played a Key Role in Neutrino Finding NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino Mixing Angle February 7, 2013 | Tags: High Energy Physics...

402

Time-cost analysis of a quantum key distribution system clocked at 100 MHz  

E-Print Network (OSTI)

We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

2011-05-18T23:59:59.000Z

403

Chapter 2 Suggested Problems: Final Answer Key Atomic mass: mass of an individual atom  

E-Print Network (OSTI)

Chapter 2 Suggested Problems: Final Answer Key 2.1 Atomic mass: mass of an individual atom Atomic;Chapter 3 Suggested Problems: Final Answer Key 3.1 Atomic Structure: relates the # of protons and neutrons of intercepts 2 2 1 Reduction not necessary Enclosure (221) #12;Chapter 12 Suggested Problems: Final Answer Key

Grunlan, Melissa A.

404

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

405

Low Complexity Spatio-Temporal Key Frame Encoding for Wyner-Ziv Video Coding  

Science Conference Proceedings (OSTI)

In most Wyner-Ziv video coding approaches, the temporal correlation of key frames is not exploited since they are simply intra encoded and decoded. In this paper, using the previously decoded key frame as the side information for the key frame to be ... Keywords: Wyner-Ziv coding, Distributed video coding

Ghazaleh Esmaili; Pamela Cosman

2009-03-01T23:59:59.000Z

406

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challengessome inherited from wireless sensor networks (WSNs), some unique to themselvesthat require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

407

factor.mws - CECM  

E-Print Network (OSTI)

... 0 "" {TEXT -1 61 "Be default \\+ factor factors over the field of rational numbers. ... {PARA 0 "> " 0 "" {MPLTEXT 1 0 36 "alias(beta=RootOf(x^5+x^3+x^2+x+1));" }...

408

A New Parameterization of an Asymmetry Factor of Cirrus Clouds for Climate Models  

Science Conference Proceedings (OSTI)

The aspect ratio (AR) of a nonspherical ice particle is identified as the key microphysical parameter to determine its asymmetry factor for solar radiation. The mean effective AR is defined for cirrus clouds containing various nonspherical ice ...

Qiang Fu

2007-11-01T23:59:59.000Z

409

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

410

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

411

SKA Key science project: Radio observations of cosmic reionization and first light  

E-Print Network (OSTI)

I update the SKA key science program (KSP) on first light and cosmic reionization. The KSP has two themes: (i) Using the 21cm line of neutral hydrogen as the most direct probe into the evolution of the neutral intergalactic medium during cosmic reionization. Such HI 21cm studies are potentially the most important new window on cosmology since the discovery of the CMB. (ii) Observing the gas, dust, star formation, and dynamics, of the first galaxies and AGN. Observations at cm and mm wavelengths, provide an unobscured view of galaxy formation within 1 Gyr of the Big Bang, and are an ideal complement to the study of stars, ionized gas, and AGN done using near-IR telescopes. I summarize HI 21cm signals, challenges, and telescopes under construction. I also discuss the prospects for studying the pre-galactic medium, prior to first light, using a low frequency telescope on the Moon. I then review the current status of mm and cm observations of the most known distant galaxies (z > 6). I make the simple argument that even a 10% SKA-high demonstrator will have a profound impact on the study of the first galaxies. In particular, extending the SKA to the 'natural' atmospheric limit (set by the O_2 line) of 45 GHz, increases the effective sensitivity to thermal emission by another factor four.

C. L. Carilli

2008-02-12T23:59:59.000Z

412

The influence of personality on Facebook usage, wall postings, and regret  

Science Conference Proceedings (OSTI)

The Five Factor Model of personality has been used extensively in the management and psychology fields to predict attitudes and behaviors. Only recently have researchers begun to examine the role of psychological factors in influencing an individual's ... Keywords: Facebook, Five Factor Model (FFM), Personality

Kelly Moore; James C. McElroy

2012-01-01T23:59:59.000Z

413

Freedom of expression in Jordan: a critical study of themes and issues based on an evaluation of influences on the development of the press and publication laws in Jordan since 1920, with particular emphasis on government pressures and censorship of weekly newspapers between 1989 and 1998.  

E-Print Network (OSTI)

??This thesis considers the major factors that influenced the development of the printed press in Jordan between 1920 and 1998. Amongst the many influences and (more)

Elananza, Azzam A.H.

2005-01-01T23:59:59.000Z

414

Energy use and carbon dioxide emissions in energy-intensive industries in key developing countries  

E-Print Network (OSTI)

Structural Factors Affecting Energy Use and Carbon DioxideStructural Factors Affecting Energy Use and Carbon Dioxide

Price, Lynn; Worrell, Ernst; Phylipsen, Dian

1999-01-01T23:59:59.000Z

415

Family of Finite Geometry Low-Density Parity-Check Codes for Quantum Key Expansion  

E-Print Network (OSTI)

We consider a quantum key expansion (QKE) protocol based on entanglement-assisted quantum error-correcting codes (EAQECCs). In these protocols, a seed of a previously shared secret key is used in the post-processing stage of a standard quantum key distribution protocol like the Bennett-Brassard 1984 protocol, in order to produce a larger secret key. This protocol was proposed by Luo and Devetak, but codes leading to good performance have not been investigated. We look into a family of EAQECCs generated by classical finite geometry (FG) low-density parity-check (LDPC) codes, for which very efficient iterative decoders exist. A critical observation is that almost all errors in the resulting secret key result from uncorrectable block errors that can be detected by an additional syndrome check and an additional sampling step. Bad blocks can then be discarded. We make some changes to the original protocol to avoid the consumption of the preshared key when the protocol fails. This allows us to greatly reduce the bit error rate of the key at the cost of a minor reduction in the key production rate, but without increasing the consumption rate of the preshared key. We present numerical simulations for the family of FG LDPC codes, and show that this improved QKE protocol has a good net key production rate even at relatively high error rates, for appropriate choices of these codes.

Kung-Chuan Hsu; Todd A. Brun

2013-03-07T23:59:59.000Z

416

The Douglas Factors  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Douglas Factors Douglas Factors The Merit Systems Protection Board in its landmark decision, Douglas vs. Veterans Administration, 5 MSPR 280, established criteria that supervisors must consider in determining an appropriate penalty to impose for an act of employee misconduct. These twelve factors are commonly referred to as "Douglas Factors: (1) The nature and seriousness of the offense, and its relation to the employee's duties, position, and responsibilities, including whether the offense was intentional or technical or inadvertent, or was committed maliciously or for gain, or was frequently repeated; (2) the employee's job level and type of employment, including supervisory or fiduciary role,

417

Population Status and Evaluation of Landscape Change for the Lower Keys Marsh Rabbit  

E-Print Network (OSTI)

Wildlife biologists and land managers tasked with the recovery of the endangered Lower Keys marsh rabbit (LKMR; Sylvilagus palustris hefneri) were in need of a current population estimate as well as a method to estimate the LKMR population annually. Habitat loss and fragmentation from population growth and development have threatened the existence of the LKMR. Establishing and understanding long-term habitat availability for the LKMR is important for determining causes of historical population declines as well as designing and implementing successful recovery plans. I conducted a range-wide pellet survey and a mark-recapture study to estimate the LKMR population. I evaluated the fit of 5 models and considered the variation in behavioral response model the best model. I correlated (r2 = 0.913) this model's rabbit abundance estimates to pellet density in 11 patches and generated a range-wide population estimate of 317, a western clade population of 257, an eastern clade population of 25, and translocated LKMR populations of 35 and 0 on Little Pine and Water keys, respectively. This prediction equation provides managers a quick, efficient, and non-invasive method to estimate LKMR abundance from pellet counts. To quantify the amount of habitat loss and fragmentation that occurred over the last 50 years, I systematically delineated and compared potential LKMR habitat using 1959 and 2006 aerial photographs. Additionally, I investigated if other factors could have reduced the amount of suitable habitat available for the LKMR with a comparison of habitat loss and fragmentation on a developed island and an undeveloped island. Range-wide, I found that number of habitat patches increased by 38, total class area decreased by 49.0%, and mean patch size decreased by 44.3%. Mean shape index increased by 4.2% and mean proximity index decreased by 13%. Both the 1959 and 2006 connectance indices were low while the 2006 set decreased 12.1%. I observed the same patterns of habitat loss and fragmentation on both the developed and undeveloped islands as I did in the range-wide landscape analysis. I found that LKMR habitat has declined in area and become more fragmented over the last 50 years. Habitat loss and fragmentation by development have directly endangered the LKMR; however, sea level rise and woody encroachment also could have historically caused habitat loss and fragmentation. Although development in LKMR habitat was halted, sea-level rise and woody encroachment could continue to alter LKMR habitat.

Schmidt, Jason Alan

2009-12-01T23:59:59.000Z

418

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

419

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents (OSTI)

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

420

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Mental State of Influencers  

Science Conference Proceedings (OSTI)

Most analysis of influence looks at the mechanisms Used, and how effectively they work on the intended audience. Here we consider influence from another perspective: what do the language choices made by influencers enable us to detect about their internal ... Keywords: language usage, ranking, Jihadi language, deception

D. B. Skillicorn; C. Leuprecht

2012-08-01T23:59:59.000Z

422

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

423

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

424

Category Key Area Sub Area Do?an, .N., "Materials...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Papers funded by the Fuels Program (2013) Category Key Area Sub Area Doan, .N., "Materials Development for Fossil Fueled Energy Conversion Systems," Materials Science...

425

An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity  

E-Print Network (OSTI)

Maximum and Minimum Displacement Demands .Shear Key Maximum and Minimum Displacement Demands B Max Minunder 5, the maximum displacement ductility demand specified

Wasef, Nardin Mofid

426

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

427

0001 1-5 KEY VISUAL CUES: man, clutter, headphone 0001 ...  

Science Conference Proceedings (OSTI)

... 0290 1-5 KEY VISUAL CUES: Rudy Giuliani, giant head, Yankee Stadium, pennant 0290 QUERY: Find the video with Rudy Giuliani's giant talking ...

2011-01-06T23:59:59.000Z

428

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network (OSTI)

in geomicrobiology, ecosystem health, nuclear waste technology and reactor safety, environmental science and ecology reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key

Christensen, Dan

429

The Outlook for Electricity Supply and Demand to 2035: Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov The Outlook for Electricity Supply and Demand to 2035: Key Drivers

430

Improved practical decoy state method in quantum key distribution with parametric down conversion source  

E-Print Network (OSTI)

In this paper, a new decoy-state scheme for quantum key distribution with parametric down-conversion source is proposed. We use both three-intensity decoy states and their triggered and nontriggered components to estimate the fraction of single-photon counts and quantum bit-error rate of single-photon, and then deduce a more accurate value of key generation rate. The final key rate over transmission distance is simulated, which shows that we can obtain a higher key rate than that of the existing methods, including our own earlier work.

Qin Wang; Xiang-Bin Wang; Gunnar Bjork; Anders Karlsson

2007-03-27T23:59:59.000Z

431

0500 1-5 KEY VISUAL CUES: laptop, young man, swivel chair ...  

Science Conference Proceedings (OSTI)

... light, gold ring 0512 QUERY: Find a video by Stone Farm showing a ... 0514 1-5 KEY VISUAL CUES: sailboat anchored in the wind and waves, water ...

2012-01-11T23:59:59.000Z

432

TransForum v7n1 - Diversity of Choices: Key to Improving Transportatio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Diversity of Choices: Key to Improving Transportation Energy Efficiency Argonne's Mobile Automotive Technology Testbed Argonne's Mobile Automotive Technology Testbed can be...

433

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

DOE Green Energy (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

434

Conversion factors for energy equivalents  

Science Conference Proceedings (OSTI)

... Conversion factors for energy equivalents, For your convenience, you may convert energies online below. Or display factors as: ...

435

On the (Im)Possibility of Key Dependent Encryption Iftach Haitner  

E-Print Network (OSTI)

, queries h(k ), encrypt this with k itself, and gives the resulting ciphertext to Breaker. We prove for every key. In this case, Breaker finds a key k such that fk,r (h(k)) = c, where f is the pseudorandom given by Halevi and Krawczyk [HK07]), is that Breaker as defined above does not seem to give useful

International Association for Cryptologic Research (IACR)

436

Common randomness and secret key capacities of two-way channels  

Science Conference Proceedings (OSTI)

Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental primitives in information theory and cryptography. We study these two problems over the two-way communication channel model, introduced by Shannon. In this model, the ... Keywords: common randomness capacity, secret key capacity, two-way channel, wiretap channel

Hadi Ahmadi; Reihaneh Safavi-Naini

2011-05-01T23:59:59.000Z

437

Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol  

E-Print Network (OSTI)

In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

2010-03-11T23:59:59.000Z

438

Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key  

Science Conference Proceedings (OSTI)

The beauty of identity-based encryption (IBE) lies in the convenience of public key handling, in the sense that any identification such as an email address, a name, or an IP number can serve as a public key of a party. However, such convenience is not ... Keywords: ID-based encryption, pairing

Fuchun Guo; Yi Mu; Zhide Chen

2007-07-01T23:59:59.000Z

439

Key distribution and update for secure inter-group multicast communication  

Science Conference Proceedings (OSTI)

Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys. ... Keywords: inter-group communication, key distribution and update, security

Weichao Wang; Bharat Bhargava

2005-11-01T23:59:59.000Z

440

Feasibility study of free-space quantum key distribution in the mid-infrared  

Science Conference Proceedings (OSTI)

We report on a feasibility study of a free-space Quantum Key Distribution setup operatingat a mid-infrared wavelength. Alice sends polarization-coded pseudo-single photonsfrom a Quantum Cascade Laser at 4.6 m to Bob, who uses a nonlinear crystal ... Keywords: free-space optics, frequency up-conversion, mid-infrared, quantum key distribution

Guilherme Temporao; Hugo Zibinden; Sebastien Tanzilli; Nicolas Gisin; Thierry Aellen; Marcella Giovannini; Jerome Faist; Jean von der Weid

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

A Coarse to Fine Facial Key Landmark Points Locating Algorithm Based on Active Shape Model  

Science Conference Proceedings (OSTI)

In this paper, we proposed an improved coarse to fine improved algorithm to enhance the accuracy of facial key landmark points locating. Based on the analysis of PCA, the proposed algorithm redesigns the parameter update rule through adding a monotonically ... Keywords: ASM, facial key landmarks point locating

Bo Fan; Xiaokang Yang; Xi Zhou; Weiyao Lin; Changjian Chen

2012-12-01T23:59:59.000Z

442

SkimpyStash: RAM space skimpy key-value store on flash-based storage  

Science Conference Proceedings (OSTI)

We present SkimpyStash, a RAM space skimpy key-value store on flash-based storage, designed for high throughput, low latency server applications. The distinguishing feature of SkimpyStash is the design goal of extremely low RAM footprint at about 1 ( ... Keywords: flash memory, indexing, key-value store, log-structured index., ram space efficient index

Biplob Debnath; Sudipta Sengupta; Jin Li

2011-06-01T23:59:59.000Z

443

A brief history of provably-secure public-key encryption  

Science Conference Proceedings (OSTI)

Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be the production of a very efficient encryption scheme with a proof of security ...

Alexander W. Dent

2008-06-01T23:59:59.000Z

444

Influence of leaf area index prescriptions on simulations of heat, moisture, and carbon fluxes  

Science Conference Proceedings (OSTI)

Leaf-area index (LAI), the total one-sided surface area of leaf per ground surface area, is a key component of land surface models. We investigate the influence of differing, plausible LAI prescriptions on heat, moisture, and carbon fluxes ...

Jatin Kala; Mark Decker; Jean-Franois Exbrayat; Andy J. Pitman; Claire Carouge; Jason P. Evans; Gab Abramowitz; David Mocko

445

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS June 1, 2010 - 12:00pm Addthis CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS Aiken, SC - Construction of a key cleanup facility at the Savannah River Site (SRS) is gaining some serious ground given the remarkable building progress since Fall 2009. Construction and operation of the Salt Waste Processing Facility (SWPF) is among the U.S. Department of Energy's (DOE) highest cleanup priorities. When operational, SWPF will treat millions of gallons of salt waste currently stored in 49 underground tanks at SRS by removing radioactive constituents for vitrification at the nearby Defense Waste Processing Facility. Disposition of the salt waste inventory is a

446

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS June 1, 2010 - 12:00pm Addthis CONSTRUCTION OF KEY CLEANUP PROJECT GAINS GOOD GROUND AT SRS Aiken, SC - Construction of a key cleanup facility at the Savannah River Site (SRS) is gaining some serious ground given the remarkable building progress since Fall 2009. Construction and operation of the Salt Waste Processing Facility (SWPF) is among the U.S. Department of Energy's (DOE) highest cleanup priorities. When operational, SWPF will treat millions of gallons of salt waste currently stored in 49 underground tanks at SRS by removing radioactive constituents for vitrification at the nearby Defense Waste Processing Facility. Disposition of the salt waste inventory is a

447

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

448

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Create a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

449

LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Prioritize and Plan) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

450

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Implement and Monitor) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

451

LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Evaluate the System) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

452

factors | OpenEI  

Open Energy Info (EERE)

36 36 Varnish cache server Browse Upload data GDR 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253836 Varnish cache server factors Dataset Summary Description This dataset is from the report Operational water consumption and withdrawal factors for electricity generating technologies: a review of existing literature (J. Macknick, R. Newmark, G. Heath and K.C. Hallett) and provides estimates of operational water withdrawal and water consumption factors for electricity generating technologies in the United States. Estimates of water factors were collected from published primary literature and were not modified except for unit conversions. Source National Renewable Energy Laboratory Date Released August 28th, 2012 (2 years ago)

453

FGF growth factor analogs  

SciTech Connect

The present invention provides a fibroblast growth factor heparin-binding analog of the formula: ##STR00001## where R.sub.1, R.sub.2, R.sub.3, R.sub.4, R.sub.5, X, Y and Z are as defined, pharmaceutical compositions, coating compositions and medical devices including the fibroblast growth factor heparin-binding analog of the foregoing formula, and methods and uses thereof.

Zamora, Paul O. (Gaithersburg, MD); Pena, Louis A. (Poquott, NY); Lin, Xinhua (Plainview, NY); Takahashi, Kazuyuki (Germantown, MD)

2012-07-24T23:59:59.000Z

454

Optimizing Power Factor Correction  

E-Print Network (OSTI)

The optimal investment for power factor correcting capacitors for Kansas Power and Light Company large power contract customers is studied. Since the billing capacity is determined by dividing the real demand by the power factor (the minimum billing capacity is based on 80 percent of the summer peak billing capacity) and the billing capacity is used to determine the number of kilowatt-hours billed at each pricing tier, the power factor affects both the demand and the energy charge. There is almost no information available in the literature concerning recommended power factor corrections for this situation. The general advice commonly given in the past has been that power factor should be corrected to above 0.9 if it is below that value to begin with, but that does not take into account the facts of the situation studied here. Calculations relevant to a commercial consumer of electricity were made for demands of 200, 400, 800, 1,600, 3,200, and 6,400 kW and monthly energy consumption periods of 100, 150, 200, 300, 400, and 500 hours for several capacitor purchase and installation costs. The results are displayed in a series of graphs that enable annual cost savings and payback periods to be readily determined over a range of commonly encountered parameter values. It is found that it is often economically advantageous to correct a power factor to near unity.

Phillips, R. K.; Burmeister, L. C.

1986-06-01T23:59:59.000Z

455

KEY THEMES  

Science Conference Proceedings (OSTI)

... For senior leaders, the MAP database provides preprogrammed analyses, which include ... Team or the Chief Innovation Officer (CIO) and Channel ...

2012-10-10T23:59:59.000Z

456

KEY THEMES  

Science Conference Proceedings (OSTI)

... may find it difficult to evaluate the effectiveness of the organization's workforce engagement and environmental management processes and ...

2012-09-09T23:59:59.000Z

457

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

curriculum development, course design and multi-media strategy. Initiate a tribal energy development issues and strategies matrix, which ICEIWG will iterate, pull data from...

458

Separate Training Influences Relative Validity  

E-Print Network (OSTI)

concurrent inhibitory training of B were to alter respondingComparative Psychology Separate Training Influences RelativeDuring relative validity training, X was reinforced when

Mehta, Rick; Dumont, Jamie-Lynne; Combiadakis, Sharon; Williams, Douglas A.

2004-01-01T23:59:59.000Z

459

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network (OSTI)

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-06-28T23:59:59.000Z

460

Climate Action Planning: A Review of Best Practices, Key Elements, and  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to: navigation, search Name Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Agency/Company /Organization Eastern Research Group Inc. Partner U.S. Environmental Protection Agency Sector Energy Focus Area Greenhouse Gas Phase Bring the Right People Together, Determine Baseline, Evaluate Options, Develop Goals, Prepare a Plan, Get Feedback, Create Early Successes Resource Type Lessons learned/best practices Availability Publicly available; free

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Thermal energy storage : a key technology for the food cold chain Denis Leducq(a), P. Schalbart(a), F. Trinquet(a), G. Alvarez(a), B. Verlinden(b),P.  

E-Print Network (OSTI)

ID: 123 Thermal energy storage : a key technology for the food cold chain Denis Leducq(a), P and intermittent renewable energy sources, energy storage, and more specifically thermal energy storage is one of thermal energy storage devices, is also an important factor of food quality and security enhancement

462

NIST Atomic Form Factors: Form factors and standard ...  

Science Conference Proceedings (OSTI)

... 2. Form Factors and Standard Definitions. ... with ? in, eg, ngstroms; the "anomalous" scattering factor f? (depending on x-ray energy E and the ...

463

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

Develop Alternative Scenarios Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Develop Alternative Scenarios) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

464

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

465

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

466

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

Assess Opportunities Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Assess Opportunities) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

467

Turbulence may be key to "fast magnetic reconnection" mystery  

NLE Websites -- All DOE Office Websites (Extended Search)

Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery The new research could lead to better understanding of solar flares and ejections of material from the Sun's corona. July 11, 2013 Electric current intensity from a high-resolution simulation of a turbulent plasma Electric current intensity from a high-resolution simulation of a turbulent plasma. The phenomenon of "fast magnetic reconnection" of the plasmas has puzzled physicists for decades, because it violates Alfven's Theorem with striking manifestations, such as solar flares and coronal mass ejection. A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all

468

Could Solar Energy Storage be Key for Residential Solar? | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage device the Sacramento Municipal Utility District intends to install in residential homes as part of its distributed solar power storage study. | Photo Courtesy of the Sacramento Municipal Utility District This is the silent power storage device the Sacramento Municipal Utility District intends to install in residential homes as part of its distributed solar power storage study. | Photo Courtesy of the Sacramento Municipal Utility District Lorelei Laird Writer, Energy Empowers What are the key facts? SolarSmart Homes storage pilot project gearing up in Sacramento. Pilot project is funded by a $4.3 million Recovery Act grant.

469

Geek-Up[6.10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10.2011]: Thermoelectrics' Great Power, Key Ingredient in 10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's Nanostructure Geek-Up[6.10.2011]: Thermoelectrics' Great Power, Key Ingredient in Bone's Nanostructure June 10, 2011 - 5:07pm Addthis Data image on lead telluride thermal conductivity | Photo Courtesy of Oak Ridge National Laboratory Data image on lead telluride thermal conductivity | Photo Courtesy of Oak Ridge National Laboratory Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs What does this mean for me? Identifying a key ingredient in bone's nanostructure may help treat and prevent bone diseases such as osteoporosis and develop new light-weight, high-strength materials for innovative technologies. Advanced thermoelectric materials could be used to develop vehicle

470

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

471

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

472

Fossil Energy Announces Addition of Two Key Staff Members | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fossil Energy Announces Addition of Two Key Staff Members Fossil Energy Announces Addition of Two Key Staff Members Fossil Energy Announces Addition of Two Key Staff Members August 27, 2013 - 1:30pm Addthis Washington, D.C. - The Department of Energy's Office of Fossil Energy today announced the recent appointment of two key senior staff members to the Office of Fossil Energy - Julio Friedmann, Deputy Assistant Secretary for Clean Coal, and Paula Gant, Deputy Assistant Secretary for Oil and Natural Gas. "The Energy Department is fortunate to have attracted such qualified people with relevant industry and technical experience," said Christopher Smith, Acting Assistant Secretary for Fossil Energy. "Their expertise and experience make them the right people in the right jobs, and I'm proud to have them as part of our Fossil Energy team."

473

Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booklet, DOE Subject Area Indicators and Key Word List for RD and Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 October 2005 The purpose of this booklet is to assist individuals of Government agencies who generate or review classified documents to recognize the presence of nuclear information that is potentially classified as Restricted Data (RD) or Formerly Restricted Data (FRD). This book is particularly helpful to document reviewers conducting declassification reviews pursuant to Executive orders. Booklet, DOE Subject Area Indicators and Key Word List for RD and FRD - October 2005 More Documents & Publications Brochure, Classification Overview of RD and FRD - September 2010 Briefing, Restricted Data Classifiers - March 2013

474

Turbulence may be key to "fast magnetic reconnection" mystery  

NLE Websites -- All DOE Office Websites (Extended Search)

Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery Turbulence may be key to "fast magnetic reconnection" mystery The new research could lead to better understanding of solar flares and ejections of material from the Sun's corona. July 11, 2013 Electric current intensity from a high-resolution simulation of a turbulent plasma Electric current intensity from a high-resolution simulation of a turbulent plasma. The phenomenon of "fast magnetic reconnection" of the plasmas has puzzled physicists for decades, because it violates Alfven's Theorem with striking manifestations, such as solar flares and coronal mass ejection. A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all

475

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols  

Science Conference Proceedings (OSTI)

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper's ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao ...

Dominic Mayers

1995-08-01T23:59:59.000Z

476

Rain Gauge and Disdrometer Measurements during the Keys Area Microphysics Project (KAMP)  

Science Conference Proceedings (OSTI)

Four impact disdrometers and 27 tipping bucket rain gauges were operated at 11 different sites during August and September 2001, as part of the Keys Area Microphysics Project. The rain gauge and disdrometer network was designed to study the range ...

Ali Tokay; David B. Wolff; Katherine R. Wolff; Paul Bashor

2003-11-01T23:59:59.000Z

477

Cryptographic security of the quantum key distribution from the triangle inequality  

E-Print Network (OSTI)

We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

2013-12-18T23:59:59.000Z

478

Chemistry 208--Spring 2012 Problem Set 6 Professor K. N. Raymond Answer Key  

E-Print Network (OSTI)

facilities help answer key, early ques- tions about the promise of technology options. Image credit: NASA #12; electrical power technologies such as batter- ies or fuel cells to reduce the amount of fuel needed. Green

479

May 19, 2011, HSS/Union Focus Group Meeting - Key Milestone Status...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HSS Directives Reform - Key Milestone Status Chart (June 15, 2011) 100 60 80 Directives 40 HSS D 0 20 1- Mar -10 1- Apr- 10 1- May -10 1- Jun -10 1- Jul- 10 1- Aug -10 1- Sep...

480

GE, Berkeley Lab-EETD Explore Possible Key to Energy Storage...  

NLE Websites -- All DOE Office Websites (Extended Search)

GE, Berkeley Lab-EETD Explore Possible Key to Energy Storage for Electric Vehicles August 2013 From a General Electric press release: It's a little more complex than making instant...

Note: This page contains sample records for the topic "key factor influencing" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

482

0891 1-5 KEY VISUAL CUES: geysers, bus, flags 0891 ...  

Science Conference Proceedings (OSTI)

... 0913 1-5 KEY VISUAL CUES: web address of www.avezpasa.co.yu, older man with jacket, old woman in black with scarf, dog 0913 QUERY: Find ...

2013-01-23T23:59:59.000Z

483

Lab plays key role in Richard Tapia Diversity in Computing Conference  

NLE Websites -- All DOE Office Websites (Extended Search)

22713conf 02272013 Lab plays key role in Richard Tapia Diversity in Computing Conference Donald B Johnston, LLNL, (925) 423-4902, johnston19@llnl.gov Printer-friendly Elizabeth...

484

Potential for Producing Hydrogen from Key Renewable Resources in the United States  

DOE Green Energy (OSTI)

This study estimates the potential for hydrogen production from key renewable resources (onshore wind, solar photovoltaic, and biomass) by county in the United States. It includes maps that allow the reader to easily visualize the results.

Milbrandt, A.; Mann, M.

2006-02-01T23:59:59.000Z

485

Fossil Energy Announces Addition of Three Key Staff Members | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Announces Addition of Three Key Staff Members Energy Announces Addition of Three Key Staff Members Fossil Energy Announces Addition of Three Key Staff Members November 16, 2009 - 12:00pm Addthis Washington, D.C. - The Department of Energy today announced the recent appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant Secretary for Oil and Natural Gas; and Michelle Dallafior, Senior Policy Advisor to the Assistant Secretary. "The Energy Department is fortunate to have attracted such qualified people with relevant industry and Capitol Hill experience," said Dr. James Markowsky, Assistant Secretary for Fossil Energy. "Their familiarity with fossil energy issues makes them the right people in the right jobs, and I'm

486

TEC Working Group Topic Groups Section 180(c) Key Documents | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Section 180(c) Key Documents Section 180(c) Key Documents TEC Working Group Topic Groups Section 180(c) Key Documents Key Documents Briefing Package for Section 180(c) Implementation - July 2005 Executive Summary Introduction Appendix A - Funding Distribution Method Appendix B - Timing and Eligibility Appendix C - Allowable Activities/Training Appendix D - Definitions Appendix E - Pass-Through of Funds Appendix F - Contingency Re-Routing Appendix G - Policy on Rulemaking Appendix H - Funding Allocation Method Appendix I - State Fees Appendix J - Funding Operational Activities Appendix K - Matching Funds More Documents & Publications Implementation of Section 180(c) of the Nuclear Waste Policy Act TEC Working Group Topic Groups Section 180(c) Meeting Summaries TEC Working Group Topic Groups Tribal

487

Impact of key design parameters on neutron wall load in an ignited tokamak  

SciTech Connect

A study was performed to determine the impact of key design parameters on neutron wall load in an ignited deuterium-tritium (D-T) tokamak. Systems effects of parameter variations were determined using the Fusion Engineering Design Center (FEDC) Systems Code. Poloidal variations in neutron wall load were determined using the Monte Carlo Code for Neutron and Photon Transport (MCNP). The marked impact of key design parameters is quantitatively shown.

Reiersen, W.T.

1983-01-01T23:59:59.000Z

488

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

489

Security bound of continuous-variable quantum key distribution with noisy coherent states and channel  

E-Print Network (OSTI)

Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

Yong Shen; Jian Yang; Hong Guo

2009-04-08T23:59:59.000Z

490

A Study of Channel Estimation and Postprocessing in Quantum Key Distribution Protocols  

E-Print Network (OSTI)

This thesis investigate the channel estimation and the postprocessing of the quantum key distribution protocols. In particular, we propose a new channel estimation procedure, in which we utilize the bit sequences transmitted and received by different bases, and a new postprocessing with two-way classical communication. Then, we show that the key generation rates of the QKD protocols with our channel estimation and/or our postprocessing are higher than those with conventional ones.

Shun Watanabe

2009-04-13T23:59:59.000Z

491

Generating Electricity with your Steam System: Keys to Long Term Savings  

E-Print Network (OSTI)

The application of combined heat and power principals to existing plant steam systems can help produce electricity at more than twice efficiency of grid generated electricity. In this way, steam plant managers can realize substantial savings with relatively quick payback of capital. Carefully planned and executed projects are the key to unlocking the maximum value of generating electricity from an existing steam system. This paper illustrates the key concepts of generating onsite power with backpressure steam turbine generators along with practical considerations.

Bullock, B.; Downing, A.

2010-01-01T23:59:59.000Z

492

PQ Encyclopedia: Understanding Power Factor  

Science Conference Proceedings (OSTI)

This PQ Encylopedia offers a thorough understanding of what power factor is, what factors affect it, and what to be aware of when attempting to improve it. In particular, efforts to remedy power factor can sometimes worsen harmonics.

2009-12-11T23:59:59.000Z

493

ERYTHROPOIETIC FACTOR PURIFICATION  

DOE Patents (OSTI)

A method is given for purifying and concentrating the blood plasma erythropoietic factor. Anemic sheep plasma is contacted three times successively with ion exchange resins: an anion exchange resin, a cation exchange resin at a pH of about 5, and a cation exchange resin at a pH of about 6. (AEC)

White, W.F.; Schlueter, R.J.

1962-05-01T23:59:59.000Z

494

Assessment of International Work on Organizational Factors: Cosponsor: U.S. Department of Energy  

Science Conference Proceedings (OSTI)

Nuclear power plant safety depends not only upon its engineered safety systems, but also upon the people running the plant, and the organization and management responsible for it. Organizations and their senior managers establish an organizational culture that profoundly influences the behavior and performance of its employees. Such influences are called "organizational factors." Existing probabilistic safety analyses do not quantify the impact of such influences on the plant risk.

2002-06-04T23:59:59.000Z

495

Thermal Conversion Factor Source Documentation  

U.S. Energy Information Administration (EIA)

national annual quantity-weighted average conversion factors for conventional, reformulated, and oxygenated motor gasolines (see Table A3). The factor ...

496

Dynamic Multi-Relational Chinese Restaurant Process for Analyzing Influences on Users in Social Media  

E-Print Network (OSTI)

We study the problem of analyzing influence of various factors affecting individual messages posted in social media. The problem is challenging because of various types of influences propagating through the social media network that act simultaneously on any user. Additionally, the topic composition of the influencing factors and the susceptibility of users to these influences evolve over time. This problem has not studied before, and off-the-shelf models are unsuitable for this purpose. To capture the complex interplay of these various factors, we propose a new non-parametric model called the Dynamic Multi-Relational Chinese Restaurant Process. This accounts for the user network for data generation and also allows the parameters to evolve over time. Designing inference algorithms for this model suited for large scale social-media data is another challenge. To this end, we propose a scalable and multi-threaded inference algorithm based on online Gibbs Sampling. Extensive evaluations on large-scale Twitter and...

Lakkaraju, Himabindu; Bhattacharyya, Chiranjib

2012-01-01T23:59:59.000Z

497

Many Factors Affect MPG  

NLE Websites -- All DOE Office Websites (Extended Search)

Many Factors Affect Fuel Economy Many Factors Affect Fuel Economy How You Drive Vehicle Maintenance Fuel Variations Vehicle Variations Engine Break-In Vehicles in traffic Quick acceleration and heavy braking can reduce fuel economy by up to 33 percent on the highway and 5 percent around town. New EPA tests account for faster acceleration rates, but vigorous driving can still lower MPG. Excessive idling decreases MPG. The EPA city test includes idling, but more idling will lower MPG. Driving at higher speeds increases aerodynamic drag (wind resistance), reducing fuel economy. The new EPA tests account for aerodynamic drag up to highway speeds of 80 mph, but some drivers exceed this speed. Cold weather and frequent short trips can reduce fuel economy, since your engine doesn't operate efficiently until it is warmed up. In colder

498

Human factoring administrative procedures  

Science Conference Proceedings (OSTI)

In nonnuclear business, administrative procedures bring to mind such mundane topics as filing correspondence and scheduling vacation time. In the nuclear industry, on the other hand, administrative procedures play a vital role in assuring the safe operation of a facility. For some time now, industry focus has been on improving technical procedures. Significant efforts are under way to produce technical procedure requires that a validated technical, regulatory, and administrative basis be developed and that the technical process be established for each procedure. Producing usable technical procedures requires that procedure presentation be engineered to the same human factors principles used in control room design. The vital safety role of administrative procedures requires that they be just as sound, just a rigorously formulated, and documented as technical procedures. Procedure programs at the Tennessee Valley Authority and at Boston Edison's Pilgrim Station demonstrate that human factors engineering techniques can be applied effectively to technical procedures. With a few modifications, those same techniques can be used to produce more effective administrative procedures. Efforts are under way at the US Department of Energy Nuclear Weapons Complex and at some utilities (Boston Edison, for instance) to apply human factors engineering to administrative procedures: The techniques being adapted include the following.

Grider, D.A.; Sturdivant, M.H.

1991-11-01T23:59:59.000Z

499

Human Factors Review Plan  

SciTech Connect

''Human Factors'' is concerned with the incorporation of human user considerations into a system in order to maximize human reliability and reduce errors. This Review Plan is intended to assist in the assessment of human factors conditions in existing DOE facilities. In addition to specifying assessment methodologies, the plan describes techniques for improving conditions which are found to not adequately support reliable human performance. The following topics are addressed: (1) selection of areas for review describes techniques for needs assessment to assist in selecting and prioritizing areas for review; (2) human factors engineering review is concerned with optimizing the interfaces between people and equipment and people and their work environment; (3) procedures review evaluates completeness and accuracy of procedures, as well as their usability and management; (4) organizational interface review is concerned with communication and coordination between all levels of an organization; and (5) training review evaluates training program criteria such as those involving: trainee selection, qualification of training staff, content and conduct of training, requalification training, and program management.

Paramore, B.; Peterson, L.R. (eds.)

1985-12-01T23:59:59.000Z

500

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2\\tau ) for passive basis selection, and 1/\\tau for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol.

Viacheslav Burenkov; Bing Qi; Ben Fortescue; Hoi-Kwong Lo

2010-05-03T23:59:59.000Z