Sample records for key macroeconomic variables

  1. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  2. Term Structure Dynamics with Macroeconomic Factors 

    E-Print Network [OSTI]

    Park, Ha-Il

    2011-02-22T23:59:59.000Z

    Affine term structure models (ATSMs) are known to have a trade-off in predicting future Treasury yields and fitting the time-varying volatility of interest rates. First, I empirically study the role of macroeconomic variables ...

  3. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  4. Essays in macroeconomics

    E-Print Network [OSTI]

    Nenov, Plamen T. (Plamen Toshkov)

    2012-01-01T23:59:59.000Z

    This thesis examines questions in macroeconomics motivated by the 2007-2008 financial crisis and its aftermath. Chapter 1 studies the impact of a housing bust on regional labor reallocation and the labor market. I document ...

  5. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    E-Print Network [OSTI]

    Yong Shen; Jian Yang; Hong Guo

    2009-06-29T23:59:59.000Z

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

  6. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  7. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  8. A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2

    E-Print Network [OSTI]

    Bertini, Robert L.

    A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2 3 Jesse operational3 and maintenance (O&M) per-mile costs increase as buses age. From a purely economic4 perspective, there is a cost tradeoff between the lower O&M costs of newer fleets and their5 higher initial capital costs

  9. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol

    E-Print Network [OSTI]

    Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2014-03-04T23:59:59.000Z

    We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

  10. Finite-size analysis of a continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Leverrier, Anthony [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46 rue Barrault, 75634 Paris Cedex 13, France and ICFO-Institut de Ciences Fotoniques, E-08860 Castelldefels (Barcelona) (Spain); Grosshans, Frederic [Laboratoire de Photonique Quantique et Moleculaire, ENS de Cachan, UMR CNRS 8735, F-94235 Cachan Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry, Institut d'Optique, CNRS, Universite Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex (France)

    2010-06-15T23:59:59.000Z

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than 50 km.

  11. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  12. A 24 km fiber-based discretely signaled continuous variable quantum key distribution system

    E-Print Network [OSTI]

    Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

    2009-10-06T23:59:59.000Z

    We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

  13. Dense-coding quantum key distribution based on continuous-variable entanglement

    SciTech Connect (OSTI)

    Su Xiaolong; Jing Jietai; Pan Qing; Xie Changde [State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan, 030006 (China)

    2006-12-15T23:59:59.000Z

    We proposed a scheme of continuous-variable quantum key distribution, in which the bright Einstein-Podolsky-Rosen entangled optical beams are utilized. The source of the entangled beams is placed inside the receiving station, where half of the entangled beams are transmitted with round trip and the other half are retained by the receiver. The amplitude and phase signals modulated on the signal beam by the sender are simultaneously extracted by the authorized receiver with the scheme of the dense-coding correlation measurement for continuous quantum variables, thus the channel capacity is significantly improved. Two kinds of possible eavesdropping are discussed. The mutual information and the secret key rates are calculated and compared with those of unidirectional transmission schemes.

  14. Long-distance continuous-variable quantum key distribution with a Gaussian modulation

    SciTech Connect (OSTI)

    Jouguet, Paul [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46, rue Barrault, F-75634 Paris Cedex 13 (France); SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Kunz-Jacques, Sebastien [SeQureNet, 23 avenue d'Italie, F-75013 Paris (France); Leverrier, Anthony [ICFO-Institut de Ciencies Fotoniques, E-08860 Castelldefels (Barcelona) (Spain)

    2011-12-15T23:59:59.000Z

    We designed high-efficiency error correcting codes allowing us to extract an errorless secret key in a continuous-variable quantum key distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an additive white Gaussian noise channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a CVQKD with a Gaussian modulation, giving a secret key rate of about 10{sup -3} bit per pulse at a distance of 120 km for reasonable physical parameters.

  15. Experimental study on discretely modulated continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Shen Yong; Zou Hongxin; Chen Pingxing; Yuan Jianmin [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Tian Liang [Department of Physics, National University of Defense Technology, Changsha 410073 (China); College of Optoelectronic Science and Engineering, National University of Defense Technology, Changsha 410073 (China)

    2010-08-15T23:59:59.000Z

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10 MHz for a 90% channel loss when the modulation variance is optimal.

  16. Essays in macroeconomics and experiments

    E-Print Network [OSTI]

    Shurchkov, Olga

    2008-01-01T23:59:59.000Z

    This dissertation consists of four chapters on empirical and experimental macroeconomics and other experimental topics. Chapter 1 uses a laboratory experiment to test the predictions of a dynamic global game designed to ...

  17. Essays in open economy macroeconomics

    E-Print Network [OSTI]

    Ghosh, Indradeep, Ph. D. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    This thesis is a collection of two essays on open economy macroeconomics. The first essay is on imperfect asset substitutability and current account dynamics. It is divided into four chapters. The first chapter in this ...

  18. Controlling excess noise in fiber optics continuous variables quantum key distribution

    E-Print Network [OSTI]

    Jérôme Lodewyck; Thierry Debuisschert; Rosa Tualle-Brouri; Philippe Grangier

    2005-12-01T23:59:59.000Z

    We describe a continuous variables coherent states quantum key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecom components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mb/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber set-up is studied as a function of the line transmission and excess noise.

  19. Controlling excess noise in fiber-optics continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128 91767 Palaiseau CEDEX (France); Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, Campus Universitaire, Batiment 503 91403 Orsay CEDEX (France)

    2005-11-15T23:59:59.000Z

    We describe a continuous-variable coherent-states quantum-key distribution system working at 1550 nm, and entirely made of standard fiber optics and telecommunications components, such as integrated-optics modulators, couplers and fast InGaAs photodiodes. The setup is composed of an emitter randomly modulating a coherent state in the complex plane with a doubly Gaussian distribution, and a receiver based on a shot-noise limited time-resolved homodyne detector. By using a reverse reconciliation protocol, the device can transfer a raw key rate up to 1 Mbit/s, with a proven security against Gaussian or non-Gaussian attacks. The dependence of the secret information rate of the present fiber setup is studied as a function of the line transmission and excess noise.

  20. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30T23:59:59.000Z

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  1. Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection

    E-Print Network [OSTI]

    Bing Qi; Pavel Lougovski; Raphael Pooser; Warren Grice; Miljko Bobrek

    2015-03-02T23:59:59.000Z

    Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and also limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme which enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25 km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad^2), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent (MDI) CV-QKD where independent light sources are employed by different users.

  2. Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise

    SciTech Connect (OSTI)

    Symul, Thomas; Alton, Daniel J.; Lance, Andrew M.; Lam, Ping Koy [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Assad, Syed M. [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Department of Physics, National University of Singapore (Singapore); Weedbrook, Christian [Quantum Optics Group, Department of Physics, Faculty of Science, Australian National University, ACT 0200 (Australia); Department of Physics, University of Queensland, St Lucia, Queensland 4072 (Australia); Ralph, Timothy C. [Department of Physics, University of Queensland, St Lucia, Queensland 4072 (Australia)

    2007-09-15T23:59:59.000Z

    In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection-based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection-based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise.

  3. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18T23:59:59.000Z

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  4. Essays in macroeconomics and corporate finance

    E-Print Network [OSTI]

    Goldberg, Jonathan E. (Jonathan Elliot)

    2011-01-01T23:59:59.000Z

    This thesis examines questions at the intersection of macroeconomics and finance. Chapter 1 studies the persistent effects of a decrease in firms' ability to borrow. I develop a tractable model of deleveraging that emphasizes ...

  5. Essays on political institutions and macroeconomics

    E-Print Network [OSTI]

    Yared, Pierre

    2007-01-01T23:59:59.000Z

    This dissertation consists of three chapters on the interaction of political institutions and macroeconomic activity in dynamic environments. Chapter 1 studies the optimal management of taxes and debt in a framework which ...

  6. Essays in International Macroeconomics and Forecasting

    E-Print Network [OSTI]

    Bejarano Rojas, Jesus Antonio

    2012-10-19T23:59:59.000Z

    This dissertation contains three essays in international macroeconomics and financial time series forecasting. In the first essay, I show, numerically, that a two-country New-Keynesian Sticky Prices model, driven by monetary and productivity shocks...

  7. Macroeconomics: A Survey of Laboratory Research Department of Economics

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    to laboratory experiments involving human subjects but rather to computational experiments using calibrated Welcome Abstract This chapter surveys laboratory experiments addressing macroeconomic phenomena. The first and mechanisms for resolving these problems. Part three looks at experiments in specific macroeconomic sectors

  8. Essays in Macroeconomics and Finance

    E-Print Network [OSTI]

    Khramov, Vadim

    2013-01-01T23:59:59.000Z

    3, 14, pages 325–332. Huizinga, John and Frederic Mishkin,variables (Mishkin (1981) and Huizinga and Mishkin (1986)).

  9. Response Surfaces for Key Controlled Variables in a Hybrid Solid Oxide Fuel Cell/Gas Turbine System

    SciTech Connect (OSTI)

    Rosen, William G.; Banta, Larry; Gorrell, Megan; Restrepo, Bernardo; Tucker, David

    2012-07-01T23:59:59.000Z

    Hybrid generation systems have been extensively modeled as a first step toward the development of automatic controls for the system. In most cases, it is impossible to validate mathematical models against real hardware because only a handful of hardware systems exist in the world. Data taken from the existing hardware has demonstrated significant nonlinearity, complex coupling between controlled variables, and sometimes non-intuitive behavior. This work exploits the capability of the HyPer hardware test bed at the National Energy Technology Laboratory (NETL) to generate data from a real recuperated gas turbine coupled with hardware simulations of a fuel cell cathode and appropriate ancillary equipment. Prior work has characterized the system only over a limited range of its operating envelope, due to the inability to manipulate multiple control inputs simultaneously. The work presented here fills the gaps using data from a 34 factorial experiment to generate quasi-continuous response surfaces describing the operating state space of the HyPer system. Polynomial correlation functions have been fitted to the data with excellent agreement. Relationships between the control inputs and critical state variables such as cathode mass flow, cathode temperature, turbine inlet and exhaust temperatures and other key system parameters are presented.

  10. WAGES, FLEXIBLE EXCHANGE RATES, AND MACROECONOMIC POLICY*

    E-Print Network [OSTI]

    WAGES, FLEXIBLE EXCHANGE RATES, AND MACROECONOMIC POLICY* JEFFREY SACHS In an open economy with a floaLing exchange rate, the efficacy of fiscal and monetary policy depends fundamentally on the wage rate depreciation, while fiscal expansion has no output effect. These results hold only when real wages

  11. NBER WORKING PAPER SERIES MACROECONOMIC INTERDEPENDENCE OF

    E-Print Network [OSTI]

    .S.; (2) the macroeco- nomic implications of a protectionist tariff imposed by the U.S.; and (3) the scope be the macroeconomic implications of a protectionist tariff imposed by the U.S.? Finally, what is the scope for policy

  12. Oxygen Modulation via Microfluidic Devices Oxygen is a key but under-studied metabolic variable. It influences biological phenomena as diverse as

    E-Print Network [OSTI]

    Ben-Arie, Jezekiel

    Oxygen Modulation via Microfluidic Devices Oxygen is a key but under-studied metabolic variable methods to modulate oxygen are crude and inefficient. Our lab has developed a suite of devices which can rapidly alter oxygen conditions surrounding cells in both position and time.[1-3]. Moreover, because

  13. Emerging Economies, Trade Policy, and Macroeconomic Shocks

    E-Print Network [OSTI]

    Bown, Chad P.; Crowley, Meredith A.

    2014-05-09T23:59:59.000Z

    and across countries – as to how constrained these emerging economies are by WTO disciplines over their applied import tariff policies. Argentina, India, Malaysia, Philippines and Thailand, for example, each have years for which there are major changes... 0 Emerging Economies, Trade Policy, and Macroeconomic Shocks Chad P. Bown† The World Bank Meredith A. Crowley‡ University of Cambridge This version: March 2014 Abstract This paper estimates the impact of aggregate...

  14. Integrating Variable Renewable Energy Into the Grid: Key Issues, Greening the Grid (Fact Sheet), NREL (National Renewable Energy Laboratory)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other NewsSpin andInterim DataCooling -INTEGRATING VARIABLE

  15. Long Run Macroeconomic Relations in the Global Economy

    E-Print Network [OSTI]

    Dees, S; Holly, Sean; Pesaran, M Hashem; Smith, L Vanessa

    This paper focuses on testing long run macroeconomic relations for interest rates, equity, prices and exchange rates within a model of the global economy. It considers a number of plausible long run relationships suggested by arbitrage in financial...

  16. 14.454 Macroeconomic Theory IV, Fall 2004

    E-Print Network [OSTI]

    Caballero, Ricardo

    This half-term course covers the macroeconomic implications of imperfections in labor markets, goods markets, credit and financial markets. The role of nominal rigidities is also an area of focus.

  17. Three essays on empirical macroeconomics and financial markets

    E-Print Network [OSTI]

    Chen, Lili

    2012-08-21T23:59:59.000Z

    This dissertation consists of three essays on empirical macroeconomics and financial markets in the United States. Although they can be considered as three independent essays, their findings are connected with each other ...

  18. 14.452 Macroeconomic Theory II, Spring 2002

    E-Print Network [OSTI]

    Blanchard, Olivier (Olivier J.)

    The basic machines of macroeconomics. Ramsey, Solow, Samuelson-Diamond, RBCs, ISLM, Mundell-Fleming, Fischer-Taylor. How they work, what shortcuts they take, and how they can be used. Half-term subject. From the course ...

  19. An Econometric Model of the Yield Curve With Macroeconomic Jump Effects

    E-Print Network [OSTI]

    Piazzesi, Monika

    2001-01-01T23:59:59.000Z

    Kenneth Singleton (1997). “An Econometric Model of the TermDiscretely-Sampled Data. ” Econometric Theory 4, pp. 231-An Econometric Model of the Yield Curve with Macroeconomic

  20. Transportation technology transitions and macroeconomic growth -- Contemporary evidence

    SciTech Connect (OSTI)

    Santini, D.J.

    1994-12-31T23:59:59.000Z

    This paper presents international and temporal extensions of evidence for a theory developed by the author concerning the interaction of transportation technology transitions and macroeconomic growth. The period 1970 to the present is examined for the nations of Japan, the US, and Europe (France, Germany, Italy and the United Kingdom collectively). An addition to the abstract logic supporting the general arguments of the theory is also presented. The theory has been developed concerning the role of significant transportation technology transitions as a cause of significant macroeconomic declines in nations for which the manufacture of transportation vehicles (ships, locomotives, and automobiles) is a dominant economic activity. The theory offers an explanation for periods of pronounced multiyear decline in economic growth rate--sometimes called depressions and sometimes called stagnations. One purpose of this paper is to explore whether or not Japan and Europe have each recently experienced a multiyear event of this type. In the theory and the evidence presented for it, environmental regulation of transportation vehicles has been shown to be an initiating cause of significant technical change, with sharp, sustained fuel price increases being a second frequent initiating cause. These causes of significant technical change, and their possible consequences, are potentially important considerations for those proposing policies to deal with global warming, since both fuel economy regulation and fuel price increases have been recommended by policy analysts as means to reduce transportation`s contribution to global warming. The theory has been offered and supported by publications developing mathematical models and examining US historical evidence consistent with the theory.

  1. Monday 16 June 09:30 Macroeconomics. 14:30 Advanced Econometrics 1 (2 hours).

    E-Print Network [OSTI]

    Oxford, University of

    Monday 16 June 09:30 Macroeconomics. 14:30 Advanced Econometrics 1 (2 hours). Tuesday 17 June 09 2 (2 hours). 14:30 Advanced Econometrics 2 (2 hours). Friday 20 June 09:30 Advanced Microeconomics 1

  2. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  3. Course title: Sustainable Development and Macroeconomics Lecturer: Dina Barbian, University of Erlangen-Nuremberg

    E-Print Network [OSTI]

    1 Course title: Sustainable Development and Macroeconomics Lecturer: Dina Barbian, University: 9-11.30 Introduction to the topic and the case studies Sustainable Development ­ Definition and History Lecture Notes Tuesday: 9-11.30 Sustainable Development and Economic Growth Searching for a new way

  4. The macroeconomic effects of oil price shocks : why are the 2000s so different from the 1920s?

    E-Print Network [OSTI]

    Blanchard, Olivier

    2007-01-01T23:59:59.000Z

    We characterize the macroeconomic performance of a set of industrialized economies in the aftermath of the oil price shocks of the 1970s and of the last decade, focusing on the differences across episodes. We examine four ...

  5. Macroeconomic Study of Construction Firm's Profitability Using Cluster Analysis

    E-Print Network [OSTI]

    Arora, Parth

    2012-10-19T23:59:59.000Z

    productivity and other important factors contributing gross margin at a state level. For this research, these factors were calculated for all the states in USA for the periods ending in 1997, 2002 and 2007. An attempt was then made to analyze the data... for 1997, 2002 and 2007. Construction worker wages per construction worker: Construction worker average wages is studied as one of the six dependent variables used in Model 1 of the research. It is calculated as: 5 Construction worker wages per...

  6. An empirical specification of the pesek and saving macroeconomic model

    E-Print Network [OSTI]

    Moser, Ernest Richard

    1970-01-01T23:59:59.000Z

    AN EvtPIRICAL SPECIFICATION OF THE PESEK AND SAVING EACROECONONIC NODEL A Thesis by Ernest Richard Noser Submitted to the Graduate ColleEe of Texas A ". i University in partial fulfillment of the requirement for the deCree of KASTM OF SCIENCE... of non-accumulating totals for the stocks of equitics, durables, and bonds must be considered as a source of error. 19 TADLE 4 TlDE DZUQ~D FGd DG:;DD Variable e yt FJP r E ? P Coefficient -0. 03 0. 07 -0. 01 -0. 11 -O. G7 31. 09 -0. 53 1. 29...

  7. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  8. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  9. Approved Module Information for BS3365, 2014/5 Module Title/Name: Macroeconomics Policy Module Code: BS3365

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    on macroeconomic policies 3 Oil and the macroeconomy ? Causes of oil price changes ? Oil prices; investment and depreciation ? Steady state ? Numerical examples 5 Economic Growth 2 ? Savings and investment Direct Investment and Policy (Professor Nigel Driffield) ? Benefits of FDI ? Aspects to FDI Policy

  10. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  11. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  12. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  13. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  14. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  16. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  17. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  18. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  19. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  20. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  1. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  2. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  3. Cataclysmic Variables

    E-Print Network [OSTI]

    Robert Connon Smith

    2007-01-23T23:59:59.000Z

    Cataclysmic variables are binary stars in which a relatively normal star is transferring mass to its compact companion. This interaction gives rise to a rich range of behaviour, of which the most noticeable are the outbursts that give the class its name. Novae belong to the class, as do the less well known dwarf novae and magnetic systems. Novae draw their energy from nuclear reactions, while dwarf novae rely on gravity to power their smaller eruptions. All the different classes of cataclysmic variable can be accommodated within a single framework and this article will describe the framework, review the properties of the main types of system and discuss models of the outbursts and of the long-term evolution.

  4. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  5. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  6. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  7. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  8. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  9. Information-Theoretic Key Agreement of Multiple Terminals -Part I: Source Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model Amin Aminzadeh the widely studied source model. In the source model the terminals wishing to generate a secret key, as well of jointly distributed random variables, after which the terminals are allowed interactive authenticated

  10. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  11. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  12. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  13. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  14. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  15. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  16. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  17. 10/24/14, 1:40 PMA New Macroeconomic Strategy by Jeffrey D. Sachs -Project Syndicate Page 1 of 4http://www.project-syndicate.org/print/declining-investment-in-rich-countries-by-jeffrey-d-sachs-2014-10

    E-Print Network [OSTI]

    books include The End of Poverty and Common Wealth. OCT 23, 2014 A New Macroeconomic Strategy NEW YORK of income that is saved rather than consumed should be invested to improve future wellbeing that we turn "excess" saving into another consumption binge. Supply-siders, by contrast, want to promote

  18. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  19. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  20. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  1. Essays on Macroeconomics

    E-Print Network [OSTI]

    Llosa, Luis Gonzalo

    2012-01-01T23:59:59.000Z

    A Microfounded Business Cycle Model . . . . . . . . . . .A Real Business Cycle Model . . . . . . . . . . . .A Real Business Cycle Model . . . . .

  2. Three essays in macroeconomics

    E-Print Network [OSTI]

    Farhi, Emmanuel

    2006-01-01T23:59:59.000Z

    Chapter 1 analyzes the theoretical and quantitative implications of optimal fiscal policy in a business cycle model with incomplete markets. I first consider the problem of a government facing expenditure shocks in an ...

  3. Essays in Quantitative Macroeconomics

    E-Print Network [OSTI]

    Neumuller, Seth

    2013-01-01T23:59:59.000Z

    quantitative model), I choose to focus on the volatility of permanent shocks to wages as the measure of risk for my analysis.

  4. Essays in macroeconomics

    E-Print Network [OSTI]

    Daula, Thomas Anthony; Daula, Thomas Anthony

    2012-01-01T23:59:59.000Z

    2.2.4 Multivariate GARCH . . . . . . . . . .US quarterly growth volatility: GARCH(1,1) . . . . . . . .to output volatility: GARCH(1,1) . . Correlation with US

  5. Essays in macroeconomics

    E-Print Network [OSTI]

    Daula, Thomas Anthony; Daula, Thomas Anthony

    2012-01-01T23:59:59.000Z

    A. , Sanjay Mithal, and Eric Neis, “Corporate Yield Spreads:power. Longstaff, Mithal, and Neis (2005) also found that a

  6. Macroeconomic Activity Module

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    explain the growth in GDP: the growth rate of nonfarm employment and the rate of productivity change associated with employment. As Table 2.1 indicates, in the Reference case,...

  7. Macroeconomic Activity Module

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    explain the growth in GDP: the growth rate of nonfarm employment and the rate of productivity change associated with employment. As Table 2.1 indicates, real GDP growth slows...

  8. Essays on international macroeconomics

    E-Print Network [OSTI]

    Gómez-González, Patricia

    2014-01-01T23:59:59.000Z

    This thesis examines several aspects of open economies. The first two chapters are about sovereign debt and its interactions with domestic financial markets. The third chapter, coauthored with my classmate Daniel Rees, ...

  9. Essays on Macroeconomics

    E-Print Network [OSTI]

    Llosa, Luis Gonzalo

    2012-01-01T23:59:59.000Z

    and volatility can lead to information being used in aexternalities lead to information being used inefficientlywhere public information can lead to welfare losses because

  10. Continuous variable entanglement on a chip

    E-Print Network [OSTI]

    Genta Masada; Kazunori Miyata; Alberto Politi; Toshikazu Hashimoto; Jeremy L. O'Brien; Akira Furusawa

    2015-05-29T23:59:59.000Z

    Encoding quantum information in continuous variables (CV)---as the quadrature of electromagnetic fields---is a powerful approach to quantum information science and technology. CV entanglement---light beams in Einstein-Podolsky-Rosen (EPR) states---is a key resource for quantum information protocols; and enables hybridisation between CV and single photon discrete variable (DV) qubit systems. However, CV systems are currently limited by their implementation in free-space optical networks: increased complexity, low loss, high-precision alignment and stability, as well as hybridisation, demand an alternative approach. Here we show an integrated photonic implementation of the key capabilities for CV quantum technologies---generation and characterisation of EPR beams in a photonic chip. Combined with integrated squeezing and non-Gaussian operation, these results open the way to universal quantum information processing with light.

  11. Continuous-variable private quantum channel

    SciTech Connect (OSTI)

    Bradler, Kamil [Instituto de Fisica, UNAM, Apdo. Postal 20-364, Mexico DF 01000 (Mexico); Department of Optics, Palacky University, 17. listopadu 50, 77200 Olomouc (Czech Republic)

    2005-10-15T23:59:59.000Z

    In this paper we introduce the concept of quantum private channel within the continuous variables framework (CVPQC) and investigate its properties. In terms of CVPQC we naturally define a 'maximally' mixed state in phase space together with its explicit construction and show that for increasing number of encryption operations (which sets the length of a shared key between Alice and Bob) the encrypted state is arbitrarily close to the maximally mixed state in the sense of the Hilbert-Schmidt distance. We bring the exact solution for the distance dependence and give also a rough estimate of the necessary number of bits of the shared secret key (i.e., how much classical resources are needed for an approximate encryption of a generally unknown continuous-variable state). The definition of the CVPQC is analyzed from the Holevo bound point of view which determines an upper bound of information about an incoming state an eavesdropper is able to get from his optimal measurement.

  12. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  13. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  14. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  15. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  16. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  17. Ashtekar's variables without spin

    E-Print Network [OSTI]

    Thomas Schucker

    2009-06-26T23:59:59.000Z

    Ashtekar's variables are shown to arise naturally from a 3+1 split of general relativity in the Einstein-Cartan formulation. Thereby spinors are exorcised.

  18. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  19. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  20. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  1. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  2. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  3. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  4. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  5. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  6. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  7. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  8. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  9. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  10. Variable Renewable Energy: a Regulatory Roadmap (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-10-01T23:59:59.000Z

    There is not a one-size-fits-all approach to the regulation of variable renewable energy (VRE), but international experience reveals many approaches that are proving successful. Drawing upon research and experiences from various international contexts, the 21st Century Power Partnership in conjunction with the Clean Energy Solutions Center and Clean Energy Regulators Initiative identified key issues and ideas that have emerged as variable deployment has grown. The Power Partnership research, published in 2014, identified four broad categories of regulatory issues.

  11. Understanding Biomass Feedstock Variability

    SciTech Connect (OSTI)

    Kevin L. Kenney; William A. Smith; Garold L. Gresham; Tyler L. Westover

    2013-01-01T23:59:59.000Z

    If the singular goal of biomass logistics and the design of biomass feedstock supply systems is to reduce the per ton supply cost of biomass, these systems may very well develop with ultimate unintended consequences of highly variable and reduced quality biomass feedstocks. This paper demonstrates that due to inherent species variabilities, production conditions, and differing harvest, collection, and storage practices, this is a very real scenario that biomass producers and suppliers as well as conversion developers should be aware of. Biomass feedstock attributes of ash, carbohydrates, moisture, and particle morphology will be discussed. We will also discuss specifications for these attributes, inherent variability of these attributes in biomass feedstocks, and approaches and solutions for reducing variability for improving feedstock quality.

  12. Understanding Biomass Feedstock Variability

    SciTech Connect (OSTI)

    Kevin L. Kenney; Garold L. Gresham; William A. Smith; Tyler L. Westover

    2013-01-01T23:59:59.000Z

    If the singular goal of biomass logistics and the design of biomass feedstock supply systems is to reduce the per-ton supply cost of biomass, these systems may very well develop with ultimate unintended consequences of highly variable and reduced quality biomass feedstocks. This paper demonstrates that, due to inherent species variabilities, production conditions and differing harvest, collection and storage practices, this is a very real scenario that biomass producers and suppliers as well as conversion developers should be aware of. Biomass feedstock attributes of ash, carbohydrates, moisture and particle morphology will be discussed. We will also discuss specifications for these attributes, inherent variability of these attributes in biomass feedstocks, and approaches and solutions for reducing variability for improving feedstock quality.

  13. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  15. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  16. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  17. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  18. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  19. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  20. Hybrid High-Order Methods for Variable-Diffusion Problems on General Daniele A. Di Pietroa

    E-Print Network [OSTI]

    Boyer, Edmond

    ], the Virtual Element Method [5], the Mixed High-Order method [6], and the Hybrid High- Order (HHO) methods [7 work is to extend the HHO method of [7] to the variable-diffusion problem (1). The key idea

  1. Variable Responses of Lowland Tropical Forest Nutrient Status

    E-Print Network [OSTI]

    Harms, Kyle E.

    Variable Responses of Lowland Tropical Forest Nutrient Status to to play a key role in nutrient retention. We discuss our findings in the context of possible impacts Springer Science+Business Media, LLC 387 #12;growth not only alters forests' nutrient demands but also

  2. Geometric Characterization of Series-Parallel Variable Resistor Networks

    E-Print Network [OSTI]

    Tygar, Doug

    simultaneously by an algorithm of complexity O(nk). Key Words: Worst case analysis, linear circuits, series-parallel networks, projective geometry. 1. Introduction The task of worst case circuit analysis [7] involves a method for performing a worst case analysis of a variable linear resistor network by casting

  3. Device-Independent Quantum Cryptography for Continuous Variables

    E-Print Network [OSTI]

    Kevin Marshall; Christian Weedbrook

    2014-05-27T23:59:59.000Z

    We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the infinite-dimensional space of a quantum harmonic oscillator. The novel application of discrete-variable device-independent quantum key distribution to this encoding enables a continuous-variable analogue. Since the security of this protocol is based on discrete-variables we inherit by default security against collective attacks and, under certain memoryless assumptions, coherent attacks. We find that our protocol is valid over the same distances as its discrete-variable counterpart, except that we are able to take advantage of high efficiency commercially available detectors where, for the most part, only homodyne detection is required. This offers the potential of removing the difficulty in closing the loopholes associated with Bell inequalities.

  4. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  5. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  6. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  7. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  8. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  9. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  10. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  11. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  12. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  13. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  14. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  15. Variable nonlinear resistances

    E-Print Network [OSTI]

    Howard, James Edgar

    1955-01-01T23:59:59.000Z

    VARIETAL". NONLINEAR RESIS'IANCES A Thes1s JA'. 4ES EDGAR HOWARD as to style and content by Head Department January 1955 LIBRARY A 4 IS COLLEGE PF TEXAS VARIABLE NONLINEAR RESISTANCES A Thesis By JAMES EDGAR HOWARD Submitted...

  16. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  17. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  18. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  19. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  20. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  1. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  2. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  3. Variable depth core sampler

    DOE Patents [OSTI]

    Bourgeois, P.M.; Reger, R.J.

    1996-02-20T23:59:59.000Z

    A variable depth core sampler apparatus is described comprising a first circular hole saw member, having longitudinal sections that collapses to form a point and capture a sample, and a second circular hole saw member residing inside said first hole saw member to support the longitudinal sections of said first hole saw member and prevent them from collapsing to form a point. The second hole saw member may be raised and lowered inside said first hole saw member. 7 figs.

  4. Variable Crop Share Leases.

    E-Print Network [OSTI]

    Sartin, Marvin; Sammons, Ray

    1980-01-01T23:59:59.000Z

    )OC lAL45.7 173 1. 1224 Texas Agricultural Extension Service The Texas A&M University System Daniel C. Pfannstiel,Director colleg e Station, Texas / f , ' '~ :';,; ,,: ''': ~ " k , -~. _Variable _Crop Share _Leases ... Marvin... Sartin and Ray Sammons* Renting or leasing farmland is part of many modern farming operations and increases average farm size in U. S. agriculture. Economies of size are vitally import ant to farm operations as they strive to cope with the continuous...

  5. Variable Frequency Pump Drives

    E-Print Network [OSTI]

    Karassik, I. J.; Petraccaro, L. L.; McGuire, J. T.

    . In a conventional pump and driver arrangement (for example, a centrifugal pump coupled to an AC induction motor'with no speed control provision), the motor runs at. a constant speed, which is determined by the incoming line frequency, and the pump... when it is needed. LONG RANGE DESIGN TRENDS The growing use of variable-frequency electric motor drives will permit the integration of 60 and 50 cycle pump lines. One important concern for future improvements is the growing possibility...

  6. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  7. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  8. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  9. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  10. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  11. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  12. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  13. Variable Valve Actuation

    SciTech Connect (OSTI)

    Jeffrey Gutterman; A. J. Lasley

    2008-08-31T23:59:59.000Z

    Many approaches exist to enable advanced mode, low temperature combustion systems for diesel engines - such as premixed charge compression ignition (PCCI), Homogeneous Charge Compression Ignition (HCCI) or other HCCI-like combustion modes. The fuel properties and the quantity, distribution and temperature profile of air, fuel and residual fraction in the cylinder can have a marked effect on the heat release rate and combustion phasing. Figure 1 shows that a systems approach is required for HCCI-like combustion. While the exact requirements remain unclear (and will vary depending on fuel, engine size and application), some form of substantially variable valve actuation is a likely element in such a system. Variable valve actuation, for both intake and exhaust valve events, is a potent tool for controlling the parameters that are critical to HCCI-like combustion and expanding its operational range. Additionally, VVA can be used to optimize the combustion process as well as exhaust temperatures and impact the after treatment system requirements and its associated cost. Delphi Corporation has major manufacturing and product development and applied R&D expertise in the valve train area. Historical R&D experience includes the development of fully variable electro-hydraulic valve train on research engines as well as several generations of mechanical VVA for gasoline systems. This experience has enabled us to evaluate various implementations and determine the strengths and weaknesses of each. While a fully variable electro-hydraulic valve train system might be the 'ideal' solution technically for maximum flexibility in the timing and control of the valve events, its complexity, associated costs, and high power consumption make its implementation on low cost high volume applications unlikely. Conversely, a simple mechanical system might be a low cost solution but not deliver the flexibility required for HCCI operation. After modeling more than 200 variations of the mechanism it was determined that the single cam design did not have enough flexibility to satisfy three critical OEM requirements simultaneously, (maximum valve lift variation, intake valve opening timing and valve closing duration), and a new approach would be necessary. After numerous internal design reviews including several with the OEM a dual cam design was developed that had the flexibility to meet all motion requirements. The second cam added complexity to the mechanism however the cost was offset by the deletion of the electric motor required in the previous design. New patent applications including detailed drawings and potential valve motion profiles were generated and alternate two cam designs were proposed and evaluated for function, cost, reliability and durability. Hardware was designed and built and testing of sample hardware was successfully completed on an engine test stand. The mechanism developed during the course of this investigation can be applied by Original Equipment Manufacturers, (OEM), to their advanced diesel engines with the ultimate goal of reducing emissions and improving fuel economy. The objectives are: (1) Develop an optimal, cost effective, variable valve actuation (VVA) system for advanced low temperature diesel combustion processes. (2) Design and model alternative mechanical approaches and down-select for optimum design. (3) Build and demonstrate a mechanism capable of application on running engines.

  14. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  15. A VECX* Model of the Swiss Economy

    E-Print Network [OSTI]

    Assenmacher-Wesche, Katrin; Pesaran, M Hashem

    A VECX? Model of the Swiss Economy? Katrin Assenmacher-Wesche Swiss National Bank M. Hashem Pesaran Cambridge University, CIMF, and USC February 21, 2008 Abstract This paper applies the modelling strategy of Garratt, Lee, Pesaran and Shin (2003... ) to the estimation of a structural cointegrated VAR model that relates the core macroeconomic variables of the Swiss economy to current and lagged values of a number of key foreign variables. We identify and test a long-run structure between the variables. Moreover...

  16. Essays in Macroeconomics and Finance

    E-Print Network [OSTI]

    Khramov, Vadim

    2013-01-01T23:59:59.000Z

    economies. ” Journal of Finance 39, pages 77-92. Vasicek,Interest Rate. ” Journal of Finance, Vol. 47, No. 3 Chernov,of Economics. B.A. (Finance), Higher School of Economics.

  17. Essays on Open Economy Macroeconomics

    E-Print Network [OSTI]

    Lu, Mi

    2013-01-01T23:59:59.000Z

    Hong Kong Household House Preference Shock . . . . . PPPnominal depreciation rate (or PPP relationship) is ˆ t+1 ? U1 + ? ?,t Where ? ?,t is PPP shock. PPP shock is very common

  18. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    Venezuelan Oil Industry Total Wells Drilled and InvestmentWells Drilled and Investment in the Venezuelan Oil Industryopenness of the oil sector to foreign investment contributes

  19. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    reserves. In the data, crude oil reserve addi- tions consistForce and Proven Reserves in the Venezuelan Oil Industry .such as crude oil production, proved reserves, new reserves,

  20. Essays in macroeconomics and finance

    E-Print Network [OSTI]

    Mohsenzadeh Kermani, Amir Reza

    2013-01-01T23:59:59.000Z

    The first chapter proposes a model of booms and busts in housing and non-housing consumption driven by the interplay between relatively low interest rates and an expansion of credit, triggered by further decline in interest ...

  1. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    is described below. Data Crude oil production data is fromproductivity measure is crude oil production per worker, andwhich is measured as crude oil production per worker, is

  2. Essays on finance and macroeconomics

    E-Print Network [OSTI]

    Di Tella, Sebastian T. (Sebastian Tariacuri)

    2013-01-01T23:59:59.000Z

    This thesis studies the role of the financial system in the amplification and propagation of business cycles. Chapter 1 studies the origin and propagation of balance sheet recessions. I first show that in standard models ...

  3. Essays on macroeconomics and forecasting

    E-Print Network [OSTI]

    Liu, Dandan

    2006-10-30T23:59:59.000Z

    is the structural factor augmented vector autoregressive (SFAVAR) model and the other is the structural factor vector autoregressive (SFVAR) model. Compared to the traditional vector autogression (VAR) model, both models incorporate far more information from...

  4. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    Oil Production in Venezuela and Mexico . . . . . . . . . .Oil Production and Productivity in Venezuela and Mexico . . . . . . . .2.6: Oil Production in Venezuela and Mexico 350 Productivity

  5. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    the Oil Industry . . . . . . . . . . . . . . . . . . . . . .in the Venezuelan Oil Industry . . . . . . . . . . . . .and Productivity: Evidence from the Oil Industry . .

  6. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01T23:59:59.000Z

    Oil Production . . . . . . . . . . . . . . . . . . . . . . . . . . .Oil Production in Venezuela and Mexico . . . . . . . . . .Oil Production and Productivity in Venezuela and

  7. Say's Law and modern macroeconomics

    E-Print Network [OSTI]

    Van Allen, Laurel Cameron

    2013-02-22T23:59:59.000Z

    Many economists have debated the interpretation of what is known as "Say's Law of markets"; it has been the subject of controversy for two centuries. Jean Baptiste Say describes Say's Law by noting that the "success of one branch of commerce...

  8. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  9. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  10. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  11. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  12. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  13. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  14. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  15. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  16. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  17. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  18. VARIABLE SPEED WIND TURBINE

    E-Print Network [OSTI]

    Chatinderpal Singh

    Wind energy is currently the fastest-growing renewable source of energy in India; India is a key market for the wind industry, presenting substantial opportunities for both the international and domestic players. In India the research is carried out on wind energy utilization on big ways.There are still many unsolved challenges in expanding wind power, and there are numerous problems of interest to systems and control researchers. In this paper we study the pitch control mechanism of wind turbine. The pitch control system is one of the most widely used control techniques to regulate the output power of a wind turbine generator. The pitch angle is controlled to keep the generator power at rated power by reducing the angle of the blades. By regulating, the angle of stalling, fast torque changes from the wind will be reutilized. It also describes the design of the pitch controller and discusses the response of the pitch-controlled system to wind velocity variations. The pitch control system is found to have a large output power variation and a large settling time.

  19. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  20. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  1. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  2. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  3. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  4. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  5. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  6. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  7. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  9. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  10. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  11. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  12. Towards the Light Front Variables for High Energy Production Processes

    E-Print Network [OSTI]

    N. S. Amaglobeli; S. M. Esakia; V. R. Garsevanishvili; G. O. Kuratashvili; N. K. Kutsidi; R. A. Kvatadze; Yu V. Tevzadze; T. P. Topuria

    1997-03-21T23:59:59.000Z

    Scale invariant presentation of inclusive spectra in terms of light front variables is proposed. The variables introduced go over to the well-known scaling variables x_F = 2p_z/sqrt(s) and x_T=2p_T/sqrt{s} in the high p_z and high p_T limits respectively. So Some surface is found in the phase space of produced pi-mesons in the inclusive reaction anti p p -> pi+- X at 22.4 GeV/c, which separates two groups of particles with significantly different characteristics. In one of these regions a naive statistical model seems to be in a good agreement with data, whereas it fails in the second region. Key words: Light front, inclusive, hadron-hadron, electron-positron, relativistic heavy ions, deep inelastic.

  13. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  14. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  15. Total water storage dynamics in response to climate variability and extremes: Inference from long-term terrestrial gravity

    E-Print Network [OSTI]

    Troch, Peter

    Total water storage dynamics in response to climate variability and extremes: Inference from long; published 27 April 2012. [1] Terrestrial water storage is a basic element of the hydrological cycle and a key state variable for land surface-atmosphere interaction. However, measuring water storage

  16. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  17. Envera Variable Compression Ratio Engine

    SciTech Connect (OSTI)

    Charles Mendler

    2011-03-15T23:59:59.000Z

    Aggressive engine downsizing, variable compression ratio and use of the Atkinson cycle are being combined to improve fuel economy by up to 40 percent relative to port fuel injected gasoline engines, while maintaining full engine power. Approach Engine downsizing is viewed by US and foreign automobile manufacturers as one of the best options for improving fuel economy. While this strategy has already demonstrated a degree of success, downsizing and fuel economy gains are currently limited. With new variable compression ratio technology however, the degree of engine downsizing and fuel economy improvement can be greatly increased. A small variable compression ratio (VCR) engine has the potential to return significantly higher vehicle fuel economy while also providing high power. Affordability and potential for near term commercialization are key attributes of the Envera VCR engine. VCR Technology To meet torque and power requirements, a smaller engine needs to do more work per stroke. This is typically accomplished by boosting the incoming charge with either a turbo or supercharger so that more energy is present in the cylinder per stroke to do the work. With current production engines the degree of engine boosting (which correlates to downsizing) is limited by detonation (combustion knock) at high boost levels. Additionally, the turbo or supercharger needs to be responsive and efficient while providing the needed boost. VCR technology eliminates the limitation of engine knock at high load levels by reducing compression ratio to {approx}9:1 (or whatever level is appropriate) when high boost pressures are needed. By reducing the compression ratio during high load demand periods there is increased volume in the cylinder at top dead center (TDC) which allows more charge (or energy) to be present in the cylinder without increasing the peak pressure. Cylinder pressure is thus kept below the level at which the engine would begin to knock. When loads on the engine are low the compression ratio can be raised (to as much as 18:1) providing high engine efficiency. It is important to recognize that for a well designed VCR engine cylinder pressure does not need to be higher than found in current production turbocharged engines. As such, there is no need for a stronger crankcase, bearings and other load bearing parts within the VCR engine. The Envera VCR mechanism uses an eccentric carrier approach to adjust engine compression ratio. The crankshaft main bearings are mounted in this eccentric carrier or 'crankshaft cradle' and pivoting the eccentric carrier 30 degrees adjusts compression ratio from 9:1 to 18:1. The eccentric carrier is made up of a casting that provides rigid support for the main bearings, and removable upper bearing caps. Oil feed to the main bearings transits through the bearing cap fastener sockets. The eccentric carrier design was chosen for its low cost and rigid support of the main bearings. A control shaft and connecting links are used to pivot the eccentric carrier. The control shaft mechanism features compression ratio lock-up at minimum and maximum compression ratio settings. The control shaft method of pivoting the eccentric carrier was selected due to its lock-up capability. The control shaft can be rotated by a hydraulic actuator or an electric motor. The engine shown in Figures 3 and 4 has a hydraulic actuator that was developed under the current program. In-line 4-cylinder engines are significantly less expensive than V engines because an entire cylinder head can be eliminated. The cost savings from eliminating cylinders and an entire cylinder head will notably offset the added cost of the VCR and supercharging. Replacing V6 and V8 engines with in-line VCR 4-cylinder engines will provide high fuel economy at low cost. Numerous enabling technologies exist which have the potential to increase engine efficiency. The greatest efficiency gains are realized when the right combination of advanced and new technologies are packaged together to provide the greatest gains at the least cost. Aggressive engine downsiz

  18. Variable rate CELP speech coding using widely variable parameter updates

    E-Print Network [OSTI]

    Moodie, Myron L.

    1995-01-01T23:59:59.000Z

    bit rates for a given quality level. This work develops new techniques, referred to as widely variable CELP parameter updates, which dynamically adapt the transmit frequency of the CELP spectral parameters to the characteristics of the input speech...

  19. Quantum information with modular variables

    E-Print Network [OSTI]

    A. Ketterer; S. P. Walborn; A. Keller; T. Coudreau; P. Milman

    2014-06-24T23:59:59.000Z

    We introduce a novel strategy, based on the use of modular variables, to encode and deterministically process quantum information using states described by continuous variables. Our formalism leads to a general recipe to adapt existing quantum information protocols, originally formulated for finite dimensional quantum systems, to infinite dimensional systems described by continuous variables. This is achieved by using non unitary and non-gaussian operators, obtained from the superposition of gaussian gates, together with adaptative manipulations in qubit systems defined in infinite dimensional Hilbert spaces. We describe in details the realization of single and two qubit gates and briefly discuss their implementation in a quantum optical set-up.

  20. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  1. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  2. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  3. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  4. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  5. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  6. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  7. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  8. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  9. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  10. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  11. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  12. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  13. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  14. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  15. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  16. Anyonic statistics with continuous variables

    E-Print Network [OSTI]

    Jing Zhang; Changde Xie; Kunchi Peng; Peter van Loock

    2008-10-30T23:59:59.000Z

    We describe a continuous-variable scheme for simulating the Kitaev lattice model and for detecting statistics of abelian anyons. The corresponding quantum optical implementation is solely based upon Gaussian resource states and Gaussian operations, hence allowing for a highly efficient creation, manipulation, and detection of anyons. This approach extends our understanding of the control and application of anyons and it leads to the possibility for experimental proof-of-principle demonstrations of anyonic statistics using continuous-variable systems.

  17. Variable metric conjugate gradient methods

    SciTech Connect (OSTI)

    Barth, T.; Manteuffel, T.

    1994-07-01T23:59:59.000Z

    1.1 Motivation. In this paper we present a framework that includes many well known iterative methods for the solution of nonsymmetric linear systems of equations, Ax = b. Section 2 begins with a brief review of the conjugate gradient method. Next, we describe a broader class of methods, known as projection methods, to which the conjugate gradient (CG) method and most conjugate gradient-like methods belong. The concept of a method having either a fixed or a variable metric is introduced. Methods that have a metric are referred to as either fixed or variable metric methods. Some relationships between projection methods and fixed (variable) metric methods are discussed. The main emphasis of the remainder of this paper is on variable metric methods. In Section 3 we show how the biconjugate gradient (BCG), and the quasi-minimal residual (QMR) methods fit into this framework as variable metric methods. By modifying the underlying Lanczos biorthogonalization process used in the implementation of BCG and QMR, we obtain other variable metric methods. These, we refer to as generalizations of BCG and QMR.

  18. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  19. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  20. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  1. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  2. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  3. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  4. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  5. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  6. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  7. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  8. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  9. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  10. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  11. Managing Variability throughout the Software Development Lifecycle

    E-Print Network [OSTI]

    Managing Variability throughout the Software Development Lifecycle Neil Loughran and Awais Rashid levels of the software development lifecycle, especially when new requirements arise. We believe of the software development lifecycle. Moreover, the effects of variability and, in particular, new variabilities

  12. Cell-to-cell variability and culture conditions during self-renewal reversibly affect subsequent differentiation of mouse embryonic stem cells

    E-Print Network [OSTI]

    Tan, Jit Hin

    2013-01-01T23:59:59.000Z

    Cell-to-cell variability in clonal populations is reflected in a distribution of mRNA and protein levels among individual cells, including those of key transcription factors governing embryonic stem cell (ESC) pluripotency ...

  13. A Preliminary Experimental Study on Haptic Teleoperation of Mobile Robot with Variable Force Feedback Gain

    E-Print Network [OSTI]

    Ryu, Jee-Hwan

    industrial constructions, etc. In all these application examples human-robot interfaces play the key role and its application for e-mail:ildar.info@gmail.com e-mail:jhryu@kut.ac.kr e-mail:robot@dgist.ac.kr O Y XA Preliminary Experimental Study on Haptic Teleoperation of Mobile Robot with Variable Force

  14. Variable selection using Adaptive Non-linear Interaction Structures in High dimensions

    E-Print Network [OSTI]

    Radchenko, Peter

    superior predictive performance over other approaches. Some key words: Non-Linear Regression; InteractionsVariable selection using Adaptive Non-linear Interaction Structures in High dimensions Peter a tra- ditional linear regression model in which the number of predictors, p, is large relative

  15. Weaving Aspect Configurations for Managing System Variability Brice Morin, Olivier Barais1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of the software lifecycle. 1 Introduction Variability management is a key concern in the software industry modeled. The Aspect-Oriented Software Development (AOSD) paradigm proposes to separate distinct concerns of the software life-cycle [4, 5, 8, 17, 28]: requirement, architecture, design, leading to the creation

  16. Sequential Thermo-Hydraulic Modeling of Variably Saturated Flow in High-Level Radioactive Waste Repository

    E-Print Network [OSTI]

    Boyer, Edmond

    Sequential Thermo-Hydraulic Modeling of Variably Saturated Flow in High-Level Radioactive Waste-Malabry, France Key words: waste repository, geological disposal, thermo- hydraulic modeling Introduction The most long-lived radioactive wastes must be managed in a safe way for human health and for the environment

  17. Abstract--A key component of the smart grid is the ability to enable dynamic residential pricing to incentivize the customer

    E-Print Network [OSTI]

    Sapatnekar, Sachin

    day-ahead variable peak pricing in order to minimize the customer's energy bill (and alsoAbstract-- A key component of the smart grid is the ability to enable dynamic residential pricing to incentivize the customer and the overall community to utilize energy more uniformly. However

  18. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  19. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  20. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  1. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  2. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  3. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  4. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  5. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  6. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  7. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  8. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  9. Renewable variable speed hybrid system 

    E-Print Network [OSTI]

    Stott, Paul Anthony

    2010-01-01T23:59:59.000Z

    generator island grids, these generators will be running at a fraction of maximum output for most of the time. A new variable speed diesel generator allows for a reduction in fuel consumption at part load compared to constant speed operation. Combining...

  10. Variable Structure Control of a

    E-Print Network [OSTI]

    Ge, Shuzhi Sam

    . INTRODUCTION Modelling and control of flexible link manipulators have been studied intensively controller for regulation of a flexible beam. Due to its simplicity and robustness to parametricVariable Structure Control of a Distributed-Parameter Flexible Beam S. S. Ge,* T. H. Lee, G. Zhu, F

  11. Operating Reserves and Variable Generation

    SciTech Connect (OSTI)

    Ela, E.; Milligan, M.; Kirby, B.

    2011-08-01T23:59:59.000Z

    This report tries to first generalize the requirements of the power system as it relates to the needs of operating reserves. It also includes a survey of operating reserves and how they are managed internationally in system operations today and then how new studies and research are proposing they may be managed in the future with higher penetrations of variable generation.

  12. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  13. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  14. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  15. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  16. The continental margin is a key source of iron to the HNLC North Pacific Ocean

    SciTech Connect (OSTI)

    Lam, P.J.; Bishop, J.K.B

    2008-01-15T23:59:59.000Z

    Here we show that labile particulate iron and manganese concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll (HNLC) region, have prominent subsurface maxima between 100-200 m, reaching 3 nM and 600 pM, respectively. The subsurface concentration maxima in particulate Fe are characterized by a more reduced oxidation state, suggesting a source from primary volcagenic minerals such as from the Kuril/Kamchatka margin. The systematics of these profiles suggest a consistently strong lateral advection of labile Mn and Fe from redox-mobilized labile sources at the continental shelf supplemented by a more variable source of Fe from the upper continental slope. This subsurface supply of iron from the continental margin is shallow enough to be accessible to the surface through winter upwelling and vertical mixing, and is likely a key source of bioavailable Fe to the HNLC North Pacific.

  17. Cranial Variability in Amazonian Marmosets

    E-Print Network [OSTI]

    Aguiar, John Marshall

    2011-02-22T23:59:59.000Z

    (Callithrix, Callitrichidae) have been discovered in recent years, as well as the exceptional dwarf marmoset Callibella humilis. Most of these species were described on the basis of their pelage and presumed separation by major rivers. I performed... analyses of craniometric variables by taxa and by river basins, in order to determine if there are significant cranial distinctions between taxa separated by rivers. I analyzed quantitative cranial and mandibular characters of Callibella humilis...

  18. Forecasting Economic and Financial Variables with Global VARs

    E-Print Network [OSTI]

    Pesaran, M Hashem; Schuermann, Til; Smith, L Vanessa

    City, June 24-27, 2007 and at the Bank of England Research Workshop on Dynamic Factor Models held at the Bank of England, 8-10 October 2007. We are grateful for comments by the discussants James Stock and Domenico Giannone as well as to Frank Diebold... and Weiner, PSW, (2004), and further developed in Dees, di Mauro, Pesaran and Smith, DdPS, (2007), for answering some of these questions. We do so recognising that macroeconomic policy analysis and risk management need to take into account the increasing...

  19. The HST Key Project on the Extragalactic Distance Scale XVII. The Cepheid Distance to NGC 4725

    E-Print Network [OSTI]

    Brad K. Gibson; Shaun M. G. Hughes; Peter B. Stetson; Wendy L. Freedman; Robert C. Kennicutt, Jr.; Jeremy R. Mould; Fabio Bresolin; Laura Ferrarese; Holland C. Ford; John A. Graham; Mingsheng Han; Paul Harding; John G. Hoessel; John P. Huchra; Garth D. Illingworth; Daniel D. Kelson; Lucas M. Macri; Barry F. Madore; Randy L. Phelps; Charles F. Prosser; Abhijit Saha; Shoko Sakai; Kim M. Sebo; Nancy A. Silbermann; Anne M. Turner

    1998-10-01T23:59:59.000Z

    The distance to NGC 4725 has been derived from Cepheid variables, as part of the Hubble Space Telescope Key Project on the Extragalactic Distance Scale. Thirteen F555W (V) and four F814W (I) epochs of cosmic-ray-split Wide Field and Planetary Camera 2 observations were obtained. Twenty Cepheids were discovered, with periods ranging from 12 to 49 days. Adopting a Large Magellanic Cloud distance modulus and extinction of 18.50+/-0.10 mag and E(V-I)=0.13 mag, respectively, a true reddening-corrected distance modulus (based on an analysis employing the ALLFRAME software package) of 30.50 +/- 0.16 (random) +/- 0.17 (systematic) mag was determined for NGC 4725. The corresponding of distance of 12.6 +/- 1.0 (random) +/- 1.0 (systematic) Mpc is in excellent agreement with that found with an independent analysis based upon the DoPHOT photometry package. With a foreground reddening of only E(V-I)=0.02, the inferred intrinsic reddening of this field in NGC 4725, E(V-I)=0.19, makes it one of the most highly-reddened, encountered by the HST Key Project, to date.

  20. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  1. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  2. Variable flexure-based fluid filter

    DOE Patents [OSTI]

    Brown, Steve B.; Colston Jr., Billy W.; Marshall, Graham; Wolcott, Duane

    2007-03-13T23:59:59.000Z

    An apparatus and method for filtering particles from a fluid comprises a fluid inlet, a fluid outlet, a variable size passage between the fluid inlet and the fluid outlet, and means for adjusting the size of the variable size passage for filtering the particles from the fluid. An inlet fluid flow stream is introduced to a fixture with a variable size passage. The size of the variable size passage is set so that the fluid passes through the variable size passage but the particles do not pass through the variable size passage.

  3. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  4. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  5. GEOCHEMICAL MODELING OF F AREA SEEPAGE BASIN COMPOSITION AND VARIABILITY

    SciTech Connect (OSTI)

    Millings, M.; Denham, M.; Looney, B.

    2012-05-08T23:59:59.000Z

    From the 1950s through 1989, the F Area Seepage Basins at the Savannah River Site (SRS) received low level radioactive wastes resulting from processing nuclear materials. Discharges of process wastes to the F Area Seepage Basins followed by subsequent mixing processes within the basins and eventual infiltration into the subsurface resulted in contamination of the underlying vadose zone and downgradient groundwater. For simulating contaminant behavior and subsurface transport, a quantitative understanding of the interrelated discharge-mixing-infiltration system along with the resulting chemistry of fluids entering the subsurface is needed. An example of this need emerged as the F Area Seepage Basins was selected as a key case study demonstration site for the Advanced Simulation Capability for Environmental Management (ASCEM) Program. This modeling evaluation explored the importance of the wide variability in bulk wastewater chemistry as it propagated through the basins. The results are intended to generally improve and refine the conceptualization of infiltration of chemical wastes from seepage basins receiving variable waste streams and to specifically support the ASCEM case study model for the F Area Seepage Basins. Specific goals of this work included: (1) develop a technically-based 'charge-balanced' nominal source term chemistry for water infiltrating into the subsurface during basin operations, (2) estimate the nature of short term and long term variability in infiltrating water to support scenario development for uncertainty quantification (i.e., UQ analysis), (3) identify key geochemical factors that control overall basin water chemistry and the projected variability/stability, and (4) link wastewater chemistry to the subsurface based on monitoring well data. Results from this study provide data and understanding that can be used in further modeling efforts of the F Area groundwater plume. As identified in this study, key geochemical factors affecting basin chemistry and variability included: (1) the nature or chemistry of the waste streams, (2) the open system of the basins, and (3) duration of discharge of the waste stream types. Mixing models of the archetype waste streams indicated that the overall basin system would likely remain acidic much of the time. Only an extended periods of predominantly alkaline waste discharge (e.g., >70% alkaline waste) would dramatically alter the average pH of wastewater entering the basins. Short term and long term variability were evaluated by performing multiple stepwise modeling runs to calculate the oscillation of bulk chemistry in the basins in response to short term variations in waste stream chemistry. Short term (1/2 month and 1 month) oscillations in the waste stream types only affected the chemistry in Basin 1; little variation was observed in Basin 2 and 3. As the largest basin, Basin 3 is considered the primary source to the groundwater. Modeling showed that the fluctuation in chemistry of the waste streams is not directly representative of the source term to the groundwater (i.e. Basin 3). The sequence of receiving basins and the large volume of water in Basin 3 'smooth' or nullify the short term variability in waste stream composition. As part of this study, a technically-based 'charge-balanced' nominal source term chemistry was developed for Basin 3 for a narrow range of pH (2.7 to 3.4). An example is also provided of how these data could be used to quantify uncertainty over the long term variations in waste stream chemistry and hence, Basin 3 chemistry.

  6. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10T23:59:59.000Z

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  7. Variable Temperature STM/AFM | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    STMAFM Variable Temperature STMAFM EMSL's ultra-high vacuum, variable-temperature scanning probe microscope system, or UHV VT SPM, is a state-of-the-art surface science tool...

  8. Interannual variability in tropospheric nitrous oxide

    E-Print Network [OSTI]

    Thompson, R. L.

    Observations of tropospheric N2O mixing ratio show significant variability on interannual timescales (0.2?ppb, 1 standard deviation). We found that interannual variability in N2O is weakly correlated with that in CFC-12 ...

  9. Thermoacoustic tomography, variable sound speed Plamen Stefanov

    E-Print Network [OSTI]

    Stefanov, Plamen

    Thermoacoustic tomography, variable sound speed Plamen Stefanov Purdue University Based on a joint work with Gunther Uhlmann Plamen Stefanov (Purdue University ) Thermoacoustic tomography, variable sound speed 1 / 18 #12;Formulation Main Problem Thermoacoustic Tomography In thermoacoustic tomography

  10. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  11. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  12. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  13. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  14. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  15. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  16. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  17. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  18. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  19. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  20. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  1. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  2. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  3. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  4. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  5. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  6. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  7. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  8. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  9. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  10. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  11. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  12. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  13. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  14. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  15. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  16. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  17. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  18. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  19. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  20. Variable frequency microwave furnace system

    DOE Patents [OSTI]

    Bible, Don W. (Clinton, TN); Lauf, Robert J. (Oak Ridge, TN)

    1994-01-01T23:59:59.000Z

    A variable frequency microwave furnace system (10) designed to allow modulation of the frequency of the microwaves introduced into a furnace cavity (34) for testing or other selected applications. The variable frequency microwave furnace system (10) includes a microwave signal generator (12) or microwave voltage-controlled oscillator (14) for generating a low-power microwave signal for input to the microwave furnace. A first amplifier (18) may be provided to amplify the magnitude of the signal output from the microwave signal generator (12) or the microwave voltage-controlled oscillator (14). A second amplifier (20) is provided for processing the signal output by the first amplifier (18). The second amplifier (20) outputs the microwave signal input to the furnace cavity (34). In the preferred embodiment, the second amplifier (20) is a traveling-wave tube (TWT). A power supply (22) is provided for operation of the second amplifier (20). A directional coupler (24) is provided for detecting the direction of a signal and further directing the signal depending on the detected direction. A first power meter (30) is provided for measuring the power delivered to the microwave furnace (32). A second power meter (26) detects the magnitude of reflected power. Reflected power is dissipated in the reflected power load (28).

  1. Variable frequency microwave furnace system

    DOE Patents [OSTI]

    Bible, D.W.; Lauf, R.J.

    1994-06-14T23:59:59.000Z

    A variable frequency microwave furnace system designed to allow modulation of the frequency of the microwaves introduced into a furnace cavity for testing or other selected applications. The variable frequency microwave furnace system includes a microwave signal generator or microwave voltage-controlled oscillator for generating a low-power microwave signal for input to the microwave furnace. A first amplifier may be provided to amplify the magnitude of the signal output from the microwave signal generator or the microwave voltage-controlled oscillator. A second amplifier is provided for processing the signal output by the first amplifier. The second amplifier outputs the microwave signal input to the furnace cavity. In the preferred embodiment, the second amplifier is a traveling-wave tube (TWT). A power supply is provided for operation of the second amplifier. A directional coupler is provided for detecting the direction of a signal and further directing the signal depending on the detected direction. A first power meter is provided for measuring the power delivered to the microwave furnace. A second power meter detects the magnitude of reflected power. Reflected power is dissipated in the reflected power load. 5 figs.

  2. A BIASED RANDOM-KEY GENETIC ALGORITHM FOR ROUTING ...

    E-Print Network [OSTI]

    Thiago

    Apr 4, 2010 ... Each link operates at a speed in the order of terabits per second, which is much faster than the ... ature [19, 20] due to the large number of variables and constraints in the integer ..... with different seeds for the random number generator [26]. ..... European Journal of Operational Research, 167:77–95, 2005.

  3. Variable residence time vortex combustor

    DOE Patents [OSTI]

    Melconian, Jerry O. (76 Beaver Rd., Reading, MA 01867)

    1987-01-01T23:59:59.000Z

    A variable residence time vortex combustor including a primary combustion chamber for containing a combustion vortex, and a plurality of louvres peripherally disposed about the primary combustion chamber and longitudinally distributed along its primary axis. The louvres are inclined to impel air about the primary combustion chamber to cool its interior surfaces and to impel air inwardly to assist in driving the combustion vortex in a first rotational direction and to feed combustion in the primary combustion chamber. The vortex combustor also includes a second combustion chamber having a secondary zone and a narrowed waist region in the primary combustion chamber interconnecting the output of the primary combustion chamber with the secondary zone for passing only lower density particles and trapping higher density particles in the combustion vortex in the primary combustion chamber for substantial combustion.

  4. Variable delivery, fixed displacement pump

    DOE Patents [OSTI]

    Sommars, Mark F. (Sparland, IL)

    2001-01-01T23:59:59.000Z

    A variable delivery, fixed displacement pump comprises a plurality of pistons reciprocated within corresponding cylinders in a cylinder block. The pistons are reciprocated by rotation of a fixed angle swash plate connected to the pistons. The pistons and cylinders cooperate to define a plurality of fluid compression chambers each have a delivery outlet. A vent port is provided from each fluid compression chamber to vent fluid therefrom during at least a portion of the reciprocal stroke of the piston. Each piston and cylinder combination cooperates to close the associated vent port during another portion of the reciprocal stroke so that fluid is then pumped through the associated delivery outlet. The delivery rate of the pump is varied by adjusting the axial position of the swash plate relative to the cylinder block, which varies the duration of the piston stroke during which the vent port is closed.

  5. Continuously variable focal length lens

    DOE Patents [OSTI]

    Adams, Bernhard W; Chollet, Matthieu C

    2013-12-17T23:59:59.000Z

    A material preferably in crystal form having a low atomic number such as beryllium (Z=4) provides for the focusing of x-rays in a continuously variable manner. The material is provided with plural spaced curvilinear, optically matched slots and/or recesses through which an x-ray beam is directed. The focal length of the material may be decreased or increased by increasing or decreasing, respectively, the number of slots (or recesses) through which the x-ray beam is directed, while fine tuning of the focal length is accomplished by rotation of the material so as to change the path length of the x-ray beam through the aligned cylindrical slows. X-ray analysis of a fixed point in a solid material may be performed by scanning the energy of the x-ray beam while rotating the material to maintain the beam's focal point at a fixed point in the specimen undergoing analysis.

  6. Variable ratio regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1981-12-15T23:59:59.000Z

    Disclosed is a regenerative braking device (10) for an automotive vehicle. The device includes an energy storage assembly (12) having a plurality of rubber rollers (26, 28) mounted for rotation between an input shaft (36) and an output shaft (42), clutches (38, 46) and brakes (40, 48) associated with each shaft, and a continuously variable transmission (22) connectable to a vehicle drivetrain and to the input and output shafts by the respective clutches. The rubber rollers are torsionally stressed to accumulate energy from the vehicle when the input shaft is clutched to the transmission while the brake on the output shaft is applied, and are torsionally relaxed to deliver energy to the vehicle when the output shaft is clutched to the transmission while the brake on the input shaft is applied. The transmission ratio is varied to control the rate of energy accumulation and delivery for a given rotational speed of the vehicle drivetrain.

  7. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  8. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  11. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  12. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  13. On the variability of I(7620 A )/I(5577 A ) in low altitude aurora E. J. Llewellyn1

    E-Print Network [OSTI]

    Boyer, Edmond

    On the variability of I(7620 AÃ? )/I(5577 AÃ? ) in low altitude aurora E. J. Llewellyn1 , R. L region. Key words. Atmospheric composition and structure (airglow and aurora) Introduction Ground-based observations of medium to bright inten- sity aurora by Gattinger and Vallance Jones (1974) indicate I(7620 AÃ?

  14. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  15. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  16. A Simple and Quick Chilled Water Loop Balancing for Variable Flow System

    E-Print Network [OSTI]

    Zhu, Y.; Batten, T.; Turner, W. D.; Claridge, D. E.; Liu, M.

    2000-01-01T23:59:59.000Z

    system is reduced by about 40%. Key words: chilled water, loop, riser, balancing, commissioning, cold deck, pump, energy consumption, EMCS. INTRODUCTION Variable flow pumping systems are becoming more prevalent in the chilled water loops or risers... the building owner, facility engineers or HVAC operators more opportunities to run the chilled water system more efficiently. Generally, the pump speeds are controlled by the EMCS or a stand-alone controller to maintain the differential pressure setpoints...

  17. Inference in Probabilistic Logic Programs with Continuous Random Variables

    E-Print Network [OSTI]

    Islam, Muhammad Asiful; Ramakrishnan, I V

    2011-01-01T23:59:59.000Z

    Probabilistic Logic Programming (PLP), exemplified by Sato and Kameya's PRISM, Poole's ICL, Raedt et al's ProbLog and Vennekens et al's LPAD, is aimed at combining statistical and logical knowledge representation and inference. A key characteristic of PLP frameworks is that they are conservative extensions to non-probabilistic logic programs which have been widely used for knowledge representation. PLP frameworks extend traditional logic programming semantics to a distribution semantics, where the semantics of a probabilistic logic program is given in terms of a distribution over possible models of the program. However, the inference techniques used in these works rely on enumerating sets of explanations for a query answer. Consequently, these languages permit very limited use of random variables with continuous distributions. In this paper, we present a symbolic inference procedure that uses constraints and represents sets of explanations without enumeration. This permits us to reason over PLPs with Gaussian...

  18. NERC Presentation: Accommodating High Levels of Variable Generation...

    Office of Environmental Management (EM)

    of variable electricity eneration. Variable resources are types of electric power generation that rely on an uncontrolled, "variable" fuel (e.g. wind, sunlight, waves, tidal...

  19. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01T23:59:59.000Z

    ~saon Automatic Variable Ventilation Control Systems Based79-3 Automatic variable ventilation control systems based onof automatic variable ventilation control systems, result in

  20. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  1. Liquid crystal variable retarders in atomic scattering

    SciTech Connect (OSTI)

    Furst, J.E.; Yu, D.H.; Hayes, P.A.; DSouza, C.M.; Williams, J.F. [Physics Department, Centre for Atomic, Molecular, and Surface Physics, The University of Western Australia, Nedlands. WA. 6907 (Australia)] [Physics Department, Centre for Atomic, Molecular, and Surface Physics, The University of Western Australia, Nedlands. WA. 6907 (Australia)

    1996-11-01T23:59:59.000Z

    The applications of liquid crystal variable retarders in the production of spin-polarized electrons and in the determination of the polarization of optical radiation from atoms excited by polarized electrons are discussed. The advantages of using liquid crystal variable retarders in the measurement of Stokes parameters are insensitivity to the incident photon direction, large transmission diameter, variable retardation over large wavelength range without mechanical movement, and {ital in} {ital situ} calibration. {copyright} {ital 1996 American Institute of Physics.}

  2. Eccentric crank variable compression ratio mechanism

    DOE Patents [OSTI]

    Lawrence, Keith Edward (Kobe, JP); Moser, William Elliott (Peoria, IL); Roozenboom, Stephan Donald (Washington, IL); Knox, Kevin Jay (Peoria, IL)

    2008-05-13T23:59:59.000Z

    A variable compression ratio mechanism for an internal combustion engine that has an engine block and a crankshaft is disclosed. The variable compression ratio mechanism has a plurality of eccentric disks configured to support the crankshaft. Each of the plurality of eccentric disks has at least one cylindrical portion annularly surrounded by the engine block. The variable compression ratio mechanism also has at least one actuator configured to rotate the plurality of eccentric disks.

  3. Variable-Period Undulators For Synchrotron Radiation

    DOE Patents [OSTI]

    Shenoy, Gopal (Naperville, IL); Lewellen, John (Plainfield, IL); Shu, Deming (Darien, IL); Vinokurov, Nikolai (Novosibirsk, RU)

    2005-02-22T23:59:59.000Z

    A new and improved undulator design is provided that enables a variable period length for the production of synchrotron radiation from both medium-energy and high-energy storage rings. The variable period length is achieved using a staggered array of pole pieces made up of high permeability material, permanent magnet material, or an electromagnetic structure. The pole pieces are separated by a variable width space. The sum of the variable width space and the pole width would therefore define the period of the undulator. Features and advantages of the invention include broad photon energy tunability, constant power operation and constant brilliance operation.

  4. Variable Temperature UHV STM/AFM | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature UHV STMAFM The Omicron variable temperature ultra-high vacuum (UHV) scanning tunneling microscope (VTSTM) is designed to study the structure of both clean and...

  5. Optimization Online - Global Optimization via Slack Variables

    E-Print Network [OSTI]

    Isaac Siwale

    2014-08-01T23:59:59.000Z

    Aug 1, 2014 ... Citation: Siwale, I. (2014). Global optimization via slack variables. Technical Report No. RD-16-2013, London: Apex Research Ltd. Download: ...

  6. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  7. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  8. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  9. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  10. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  11. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  12. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  13. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  14. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  15. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  16. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  17. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  18. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  2. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  3. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  4. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  5. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  6. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  7. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  8. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  9. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  10. Inherent variability in the kinetics of autocatalytic protein self-assembly

    E-Print Network [OSTI]

    Juraj Szavits-Nossan; Kym Eden; Ryan J. Morris; Cait E. MacPhee; Martin R. Evans; Rosalind J. Allen

    2014-08-11T23:59:59.000Z

    In small volumes, the kinetics of filamentous protein self-assembly is expected to show significant variability, arising from intrinsic molecular noise. This is not accounted for in existing deterministic models. We introduce a simple stochastic model including nucleation and autocatalytic growth via elongation and fragmentation, which allows us to predict the effects of molecular noise on the kinetics of autocatalytic self-assembly. We derive an analytic expression for the lag-time distribution, which agrees well with experimental results for the fibrillation of bovine insulin. Our expression decomposes the lag time variability into contributions from primary nucleation and autocatalytic growth and reveals how each of these scales with the key kinetic parameters. Our analysis shows that significant lag-time variability can arise from both primary nucleation and from autocatalytic growth, and should provide a way to extract mechanistic information on early-stage aggregation from small-volume experiments.

  11. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  12. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  13. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  14. Decreasing Cloudiness Over China: An Updated Analysis Examining Additional Variables

    SciTech Connect (OSTI)

    Kaiser, D.P.

    2000-01-14T23:59:59.000Z

    As preparation of the IPCC's Third Assessment Report takes place, one of the many observed climate variables of key interest is cloud amount. For several nations of the world, there exist records of surface-observed cloud amount dating back to the middle of the 20th Century or earlier, offering valuable information on variations and trends. Studies using such databases include Sun and Groisman (1999) and Kaiser and Razuvaev (1995) for the former Soviet Union, Angel1 et al. (1984) for the United States, Henderson-Sellers (1986) for Europe, Jones and Henderson-Sellers (1992) for Australia, and Kaiser (1998) for China. The findings of Kaiser (1998) differ from the other studies in that much of China appears to have experienced decreased cloudiness over recent decades (1954-1994), whereas the other land regions for the most part show evidence of increasing cloud cover. This paper expands on Kaiser (1998) by analyzing trends in additional meteorological variables for Chi na [station pressure (p), water vapor pressure (e), and relative humidity (rh)] and extending the total cloud amount (N) analysis an additional two years (through 1996).

  15. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  16. Variable Speed Pumping for Level Control 

    E-Print Network [OSTI]

    Vasel, M.

    1982-01-01T23:59:59.000Z

    The purpose of this paper is to describe an application of variable speed pumping to level control of an industrial process. Topics include a comparison of the process using control valves with a variable speed system, an energy savings and cost...

  17. THE MULTI-USE STEINEL VARIABLE TEMPERATURE

    E-Print Network [OSTI]

    Kleinfeld, David

    THE MULTI-USE STEINEL VARIABLE TEMPERATURE ELECTRONICALLY CONTROLLED HEAT GUNTEMPERATURE RANGE 212 at the outlet nozzle will bum flesh. Do not tum on Heat Gun with hand in front of nozzle. DO NOT USE NEAR equipment Specifications Temperature Variable from 212" F to 1100° F Watts 1500W Weight 1.5 lbs. Supply

  18. THE MULTI-USE STEINEL VARIABLE TEMPERATURE

    E-Print Network [OSTI]

    Kleinfeld, David

    THE MULTI-USE STEINEL VARIABLE TEMPERATURE ELECTRONICALLY CONTROLLED HEAT GUNTEMPERATURE RANGE 212 at the outlet nozzle will bum flesh. Do not tum on Heat Gun with hand in front of nozzle. DO NOT USE NEAR equipment Specifications Temperature Variable from 212° F to 1100° F Watts 1500W Weight 1.5 lbs. Supply

  19. Solar Dynamics Observatory/ Extreme Ultraviolet Variability Experiment

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    Solar Dynamics Observatory/ EVE Extreme Ultraviolet Variability Experiment Frequently Asked and model solar extreme ultraviolet irradiance variations due to solar flares, solar rotation, and solar and structure of the Sun. What is solar variability? Solar radiation varies on all time scales ranging from

  20. Boosting Search with Variable Elimination. ? Javier Larrosa

    E-Print Network [OSTI]

    Dechter, Rina

    Boosting Search with Variable Elimination. ? Javier Larrosa Dep. Llenguatges i Sistemes Inform#12ElimSearchS;k, a hybrid meta- algorithm that combines search and variable elimination. The param- eter S names from the constraint graph. We also provide experimental evidence that the hybrid algorithm can

  1. Boosting Search with Variable Elimination. ? Javier Larrosa

    E-Print Network [OSTI]

    Dechter, Rina

    Boosting Search with Variable Elimination. ? Javier Larrosa Dep. Llenguatges i Sistemes Inform of variables, reduces the search tree size. In this paper we introduce VarElimSearch(S;k), a hybrid meta the constraint graph. We also provide experimental evidence that the hybrid algorithm can outperform state

  2. Variable Speed Pumping for Level Control

    E-Print Network [OSTI]

    Vasel, M.

    1982-01-01T23:59:59.000Z

    The purpose of this paper is to describe an application of variable speed pumping to level control of an industrial process. Topics include a comparison of the process using control valves with a variable speed system, an energy savings and cost...

  3. The Hubble Space Telescope Extragalactic Distance Scale Key Project. X. The Cepheid Distance to NGC 7331

    E-Print Network [OSTI]

    H0 Key Project; :; Shaun M. G. Hughes; Mingsheng Han; John Hoessel; Wendy L. Freedman; Robert C. Kennicutt; Jeremy. R. Mould; Abi Saha; Peter B. Stetson; Barry F. Madore; Nancy A. Silbermann; Paul Harding; Laura Ferrarese; Holland Ford; Brad K. Gibson; John A. Graham; Robert Hill; John Huchra; Garth D. Illingworth; Randy Phelps; Shoko Sakai

    1998-02-13T23:59:59.000Z

    The distance to NGC 7331 has been derived from Cepheid variables observed with HST/WFPC2, as part of the Extragalactic Distance Scale Key Project. Multi-epoch exposures in F555W (V) and F814W (I), with photometry derived independently from DoPHOT and DAOPHOT/ALLFRAME programs, were used to detect a total of 13 reliable Cepheids, with periods between 11 and 42 days. The relative distance moduli between NGC 7331 and the LMC, imply an extinction to NGC 7331 of A_V = 0.47+-0.15 mag, and an extinction-corrected distance modulus to NGC 7331 of 30.89+-0.14(random) mag, equivalent to a distance of 15.1 Mpc. There are additional systematic uncertainties in the distance modulus of +-0.12 mag due to the calibration of the Cepheid Period-Luminosity relation, and a systematic offset of +0.05+-0.04 mag if we applied the metallicity correction inferred from the M101 results of Kennicutt et al 1998.

  4. Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-02-16T23:59:59.000Z

    In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

  5. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  6. Essays on Macroeconomics and International Finance

    E-Print Network [OSTI]

    Wang, Gewei

    2012-01-01T23:59:59.000Z

    investment flows. Journal of Finance 52(5):1851–80. Calvo,mutual funds. Journal of Finance 45(2):497–521. Dvo?r´ak,Indonesia. Journal of Finance 60(2):817–839. Eichenbaum,

  7. Essays in International Finance and Macroeconomics

    E-Print Network [OSTI]

    Maggiori, Matteo

    2012-01-01T23:59:59.000Z

    In that case, the Home SDF would also feature an additionaltwo stochastic discount factors (SDF), one for each country,1 R t+1 where ? t+1 is the US SDF, and R t+1 is any US asset

  8. Natural gas exports and macroeconomic performance

    SciTech Connect (OSTI)

    Naini, A. [Alberta Energy and Utilities Board, Calgary, Alberta (Canada). Economics and Policy Development

    1998-08-01T23:59:59.000Z

    Alberta, in volumetric terms, is Canada`s leading exporter of natural gas, crude oil, bitumen, and coal. Alberta natural gas shipments to other Canadian provinces and exports to the United States have developed into an increasingly important component of Alberta economy. This article attempts to measure the impact of gas production and exports on different sectors of the Alberta economy as the energy producing province of Canada.

  9. Macroeconomic Implications of the Zero Lower Bound

    E-Print Network [OSTI]

    Wieland, Johannes Friedrich

    2013-01-01T23:59:59.000Z

    A.10 Oil Shocks in Incomplete Markets . . . . . . . .shocks in the crude oil market,” The American Economicin the Global Market for Crude Oil,” 2011. Kim, Jinill and

  10. Essays on Macroeconomics and International Finance

    E-Print Network [OSTI]

    Wang, Gewei

    2012-01-01T23:59:59.000Z

    Production function, inventory, and goods demand . . .channel and inventory behavior . . . . . . . . . . . . . .inventories . . . . . . . . . . . . . . . . . . . . . . . . . . .

  11. Modelling macroeconomic flows related to large ensembles

    E-Print Network [OSTI]

    Schellekens, Michel P.

    , including, say, oil prices, interest rates, etc; dynamics of shares markets are governed by information)economics is in understanding quantitative relationships which govern flows of money, various commodities, goods and labours or filled by a water, and there is 3 #12;a price, measured in the universal physics currency, energy

  12. Essays on macroeconomics and international trade

    E-Print Network [OSTI]

    Mestieri, Martí (Mestieri Ferre)

    2011-01-01T23:59:59.000Z

    This thesis focuses on the study of different aspects of income inequality across and within countries. In the first chapter, I study how the optimal provision of human capital is distorted in the presence of borrowing ...

  13. Term Structure Dynamics with Macroeconomic Factors

    E-Print Network [OSTI]

    Park, Ha-Il

    2011-02-22T23:59:59.000Z

    (1985), researchers extended ATSMs to explain several important aspects of Treasury yields data. Recently, Dai and Singleton (2000), Du ee (2002), and Duarte (2004) reported that there exists a trade-o between improving forecast ability on future bond... be one way to resolve these issues. Along this line, Du ee (2002) and Duarte (2004) use alternative parameterizations of the market price of risk and report some success in increasing the predictive power of ATSMs, but they still have di culty...

  14. Essays on Macroeconomics and Information Economics

    E-Print Network [OSTI]

    Zambrano Riveros, Jorge Andres

    2012-01-01T23:59:59.000Z

    on-Hudson, NY: Levy Economics Institute, Bard College, 2010.Journal of Labor Economics, 7(3):281–302, 1989. [4] S.N.Quarterly Jour- nal of Economics, 109(3):659, 1994. [6] Y.

  15. Three Essays in Macroeconomics and Financial Economics

    E-Print Network [OSTI]

    Kacaribu, Febrio

    2014-05-31T23:59:59.000Z

    , the expected inflation and output are more consistent with the theory suggested by the model. Value at Risk (VaR) Based on GARCH-Type Estimated Volatility of 5 Stock Markets The Great Recession has stirred up debate about risk management practices. Value...

  16. Essays on frictions in financial macroeconomics

    E-Print Network [OSTI]

    Kay, Benjamin S.

    2012-01-01T23:59:59.000Z

    3.2.4 Multivariate GARCH . . . . . . . . . . . . . . . . .productivity: DCC-GARCH . . . . . . . 87 US conditionalquarterly growth volatility: GARCH(1,1) . . . . . . 85 Ratio

  17. Essays on frictions in financial macroeconomics

    E-Print Network [OSTI]

    Kay, Benjamin S.

    2012-01-01T23:59:59.000Z

    94 (1), Lucas, Robert E. , “Econometric Policy Evaluation: Aorder flow based econometric measurements of spread

  18. Three essays in finance and macroeconomics

    E-Print Network [OSTI]

    Panageas, Stavros

    2005-01-01T23:59:59.000Z

    In the first chapter I investigate whether firms' physical investments react to the speculative over-pricing of their securities. I introduce investment considerations in an infinite horizon continuous time model with short ...

  19. Essays on the macroeconomics of economic development

    E-Print Network [OSTI]

    Peters, Michael

    2012-01-01T23:59:59.000Z

    Chapter 1 contains a theory of misallocation. In contrast to a recent literature where misallocation stems from imperfect input markets, I study an economy with non-competitive output markets. This change of focus has two ...

  20. Essays in macroeconomics : information and financial markets

    E-Print Network [OSTI]

    Iovino, Luigi

    2012-01-01T23:59:59.000Z

    This thesis studies how information imperfections affect financial markets and the macroeconomy. Chapter 1 considers an economy where investors delegate their investment decisions to financial institutions that choose ...

  1. Alternative Measures of Welfare in Macroeconomic Models

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001)gasoline prices4 OilU.S. Offshore U.S.:7)

  2. Suppression of chaos at slow variables by rapidly mixing fast dynamics through linear energy-preserving coupling

    E-Print Network [OSTI]

    Rafail V. Abramov

    2011-08-14T23:59:59.000Z

    Chaotic multiscale dynamical systems are common in many areas of science, one of the examples being the interaction of the low-frequency dynamics in the atmosphere with the fast turbulent weather dynamics. One of the key questions about chaotic multiscale systems is how the fast dynamics affects chaos at the slow variables, and, therefore, impacts uncertainty and predictability of the slow dynamics. Here we demonstrate that the linear slow-fast coupling with the total energy conservation property promotes the suppression of chaos at the slow variables through the rapid mixing at the fast variables, both theoretically and through numerical simulations. A suitable mathematical framework is developed, connecting the slow dynamics on the tangent subspaces to the infinite-time linear response of the mean state to a constant external forcing at the fast variables. Additionally, it is shown that the uncoupled dynamics for the slow variables may remain chaotic while the complete multiscale system loses chaos and becomes completely predictable at the slow variables through increasing chaos and turbulence at the fast variables. This result contradicts the common sense intuition, where, naturally, one would think that coupling a slow weakly chaotic system with another much faster and much stronger mixing system would result in general increase of chaos at the slow variables.

  3. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  4. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  7. Dimensional variability of production steel castings

    SciTech Connect (OSTI)

    Peters, F.E.; Risteu, J.W.; Vaupel, W.G.; DeMeter, E.C.; Voigt, R.C.

    1994-12-31T23:59:59.000Z

    Work is ongoing to characterize the dimensional variability of steel casting features. Data are being collected from castings produced at representative Steel Founders` Society of America foundries. Initial results based on more than 12,500 production casting feature measurements are presented for carbon and low alloy steel castings produced in green sand, no-bake, and shell molds. A comprehensive database of casting, pattern, and feature variables has been developed so that the influence of the variables on dimensional variability can be determined. Measurement system analysis is conducted to insure that large measurement error is not reported as dimensional variability. Results indicate that the dimensional variability of production casting features is less than indicated in current US (SFSA) and international (ISO) standards. Feature length, casting weight, parting line and molding process all strongly influence dimensional variability. Corresponding pattern measurements indicate that the actual shrinkage amount for casting features varies considerably. This variation in shrinkage will strongly influence the ability of the foundry to satisfy customer dimensional requirements.

  8. Analysis of two basic variables of timeout 

    E-Print Network [OSTI]

    Zella, William Francis

    1974-01-01T23:59:59.000Z

    ANALYSIS OF TWO BASIC VARIABLES OF TIMEOUT A Thesis WILLIAM FRANCIS ZELLA Submitted to the Graduate College of Texas AaM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE August l974 Major Subjects... Psychology ANALYSI QF TWQ BASIC VARIABLES CF TINEQU '. A Thesis V/ILLIAM FRANCIS ZELLA Approved as to s+yle and content bye Chairman of Commi, ee Head of De artment) (Membe Member) Member ABSTRACT Analysis of Two Basic Variables of Timeout. (August...

  9. Water storage key factor in coalbed methane production

    SciTech Connect (OSTI)

    Luckianow, B.J. (Taurus Exploration Inc., Birmingham, AL (US)); Hall, W.L. (Dames and Moore, Atlanta, GA (US))

    1991-03-11T23:59:59.000Z

    Storage ponds provide a cost-effective means to temporarily retain water produced with coalbed methane and permit gas production during times when stream flow rates drop. Normally, water produced with the gas is run into nearby streams, with the dilution rate closely monitored and controlled by environmental agencies. During low stream flow in the Black Warrior basin, Ala., large volumes of produced water must be stored to prevent shut-in of coalbed methane fields. The authors discuss how they constructed such production water facilities for the Cedar Cove field to eliminate periodic field shut-ins as a result of excess water production. The effectiveness of such a storage approach is governed by receiving stream flow variability, production water flow characteristics, and the economics of storage pond construction.

  10. UselessVariable Elimination Olin Shivers

    E-Print Network [OSTI]

    Shivers, Olin

    flow analysis on the CPS inter­ mediate form. (I use a CPS representation essentially identical­passing style (CPS) intermediate representations, continuation variables are frequently passed around loops

  11. Continuously-Variable Series-Elastic Actuator

    E-Print Network [OSTI]

    Mooney, Luke M.

    Actuator efficiency is an important factor in the design of powered leg prostheses, orthoses, exoskeletons, and legged robots. A continuously-variable series-elastic actuator (CV-SEA) is presented as an efficient actuator ...

  12. Utility Variable Generation Integration Group Fall Technical...

    Broader source: Energy.gov (indexed) [DOE]

    15, 2014 9:00AM CDT to October 17, 2014 3:00PM CDT The Utility Variable Generation Integration Group (UVIG) Fall Technical Workshop in San Antonio, Texas will provide attendees...

  13. Variable volume architecture : expanding the boundary

    E-Print Network [OSTI]

    Saheba, Asheshh (Asheshh Mohit), 1972-

    2001-01-01T23:59:59.000Z

    Research into the creation of a Variable Volume Architecture is explored through a series of proposals and projects. An argument is established to develop the means and methods of achieving an architecture of transformation. ...

  14. The Cloud Computing and Other Variables

    E-Print Network [OSTI]

    Borjon-Kubota, Martha Estela

    2011-01-01T23:59:59.000Z

    12. Fragments in Six 13. Cloud Computing 14. Phase 15.Note 48. Devoured vi Cloud Computing and other Variables I.moment. Lasts hours. Cloud Computing Just there Over the

  15. Ashtekar's New Variables and Positive Energy

    E-Print Network [OSTI]

    James M. Nester; Roh-Suan Tung; Yuan Zhong Zhang

    1994-01-07T23:59:59.000Z

    We discuss earlier unsuccessful attempts to formulate a positive gravitational energy proof in terms of the New Variables of Ashtekar. We also point out the difficulties of a Witten spinor type proof. We then use the special orthonormal frame gauge conditions to obtain a locally positive expression for the New Variables Hamiltonian and thereby a ``localization'' of gravitational energy as well as a positive energy proof.

  16. HVAC's Variable Refrigerant Flow (VRF) Technology

    E-Print Network [OSTI]

    Jones, S.

    2012-01-01T23:59:59.000Z

    1 Comfort by Design Steve Jones Commercial Sales Manager for Mitsubishi Southwest Business Unit HVAC?s Variable Refrigerant Flow (VRF) Technology HVAC Industry Overview HVAC Market Dollar Volume $18 Billion Source:;NABH Research... Moveable Ductless 5 VRF Technology Overview 6 What is VRF Technology? Variable Refrigerant Flow More Comfort, Less Energy Usage 8 INVERTER-driven Compressor Time R oo m T em pe ra tur e ? Enables capacity operation as low as 4% ? Sizing...

  17. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  18. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  19. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  20. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  1. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  2. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  3. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  4. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  5. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  6. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  7. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  8. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  9. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  10. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  11. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  12. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  13. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  14. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  15. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  16. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  17. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  18. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  19. Cloud speed impact on solar variability scaling â?? Application to the wavelet variability model

    E-Print Network [OSTI]

    Lave, Matthew; Kleissl, Jan

    2013-01-01T23:59:59.000Z

    Kleissl, J. , 2013. Deriving cloud velocity from an array ofCloud Speed Impact on Solar Variability Scaling -this work, we determine from cloud speeds. Cloud simulator

  20. Production-Intent Lost-Motion Variable Valve Actuation Systems...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Production-Intent Lost-Motion Variable Valve Actuation Systems Production-Intent Lost-Motion Variable Valve Actuation Systems Variable valve actuation with onoff IEGR pre-bump is...

  1. Interannual variability of Caribbean rainfall, ENSO and the Atlantic Ocean

    E-Print Network [OSTI]

    Columbia University

    Interannual variability of Caribbean rainfall, ENSO and the Atlantic Ocean Alessandra Giannini variability of Caribbean-Central Americanrainfall are examined. The atmosphericcirculation over this region- ature (SST) variability associated with Caribbean rainfall, as selected by canonical correlation

  2. Overview of Variable Renewable Energy Regulatory Issues: A Clean Energy Regulators Initiative Report

    SciTech Connect (OSTI)

    Miller, M.; Cox, S.

    2014-05-01T23:59:59.000Z

    This CERI report aims to provide an introductory overview of key regulatory issues associated with the deployment of renewable energy -- particularly variable renewable energy (VRE) sources such wind and solar power. The report draws upon the research and experiences from various international contexts, and identifies key ideas that have emerged from the growing body of VRE deployment experience and regulatory knowledge. The report assumes basic familiarity with regulatory concepts, and although it is not written for a technical audience, directs the reader to further reading when available. VRE deployment generates various regulatory issues: substantive, procedural, and public interest issues, and the report aims to provide an empirical and technical grounding for all three types of questions as appropriate.

  3. Kepler and the long-period variables

    SciTech Connect (OSTI)

    Hartig, Erich; Lebzelter, Thomas [University of Vienna, Department of Astrophysics, Türkenschanzstrasse 17, A-1180 Vienna (Austria); Cash, Jennifer [Department of Biological and Physical Sciences, South Carolina State University, P.O. Box 7024, Orangeburg, SC 29117 (United States); Hinkle, Kenneth H.; Mighell, Kenneth J. [National Optical Astronomy Observatories, P.O. Box 26732, Tucson, AZ 85726 (United States); Walter, Donald K., E-mail: erich.hartig@univie.ac.at, E-mail: thomas.lebzelter@univie.ac.at, E-mail: jcash@physics.scsu.edu, E-mail: hinkle@noao.edu, E-mail: mighell@noao.edu, E-mail: dkw@physics.scsu.edu [Department of Biological and Physical Sciences, South Carolina State University, P.O. Box 7296, Orangeburg, SC 29117 (United States)

    2014-12-01T23:59:59.000Z

    High-precision Kepler photometry is used to explore the details of asymptotic giant branch (AGB) light curves. Since AGB variability has a typical timescale on the order of a year, we discuss at length the removal of long-term trends and quarterly changes in Kepler data. Photometry for a small sample of nine semi-regular (SR) AGB stars is examined using a 30 minute cadence over a period of 45 months. While undergoing long-period variations of many magnitudes, the light curves are shown to be smooth at the millimagnitude level over much shorter time intervals. No flares or other rapid events were detected on a sub-day timescale. The shortest AGB period detected is on the order of 100 days. All the SR variables in our sample are shown to have multiple modes. This is always the first overtone, typically combined with the fundamental. A second common characteristic of SR variables is shown to be the simultaneous excitation of multiple closely separated periods for the same overtone mode. Approximately half the sample had a much longer variation in the light curve, likely a long secondary period (LSP). The light curves were all well represented by a combination of sinusoids. However, the properties of the sinusoids are time variable, with irregular variations present at low levels. No non-radial pulsations were detected. It is argued that the LSP variation seen in many SR variables is intrinsic to the star and linked to multiple mode pulsation.

  4. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  5. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  6. MASe UCRL-15037 CONTINUOUSLY VARIABLE TRANSMISSIONS: THEORY AND...

    Office of Scientific and Technical Information (OSTI)

    transmission when operating in the power recirculation mode 20 Simple manual system to control the speed ratio of a variable V-belt continuously variable transmission 21 Schematic...

  7. Impact of subgrid-scale radiative heating variability on the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    subgrid-scale radiative heating variability on the stratocumulus-to-trade cumulus transition in climate models. Impact of subgrid-scale radiative heating variability on the...

  8. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01T23:59:59.000Z

    saon Automatic Variable Ventilation Control Systems Based onL Kusuda, "Control Ventilation to Conserve Energy While t·79-3 Automatic variable ventilation control systems based on

  9. Enabling High Efficiency Clean Combustion with Micro-Variable...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Combustion with Micro-Variable Circular-Orifice (MVCO) Fuel Injector and Adaptive PCCI Enabling High Efficiency Clean Combustion with Micro-Variable Circular-Orifice (MVCO) Fuel...

  10. Sources of Technical Variability in Quantitative LC-MS Proteomics...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sources of Technical Variability in Quantitative LC-MS Proteomics: Human Brain Tissue Sample Analysis. Sources of Technical Variability in Quantitative LC-MS Proteomics: Human...

  11. Microstructural Response of Variably Hydrated Ca-Rich Montmorillonite...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Microstructural Response of Variably Hydrated Ca-Rich Montmorillonite to Supercritical CO2. Microstructural Response of Variably Hydrated Ca-Rich Montmorillonite to Supercritical...

  12. Residential Cold Climate Heat Pump with Variable-Speed Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cold Climate Heat Pump with Variable-Speed Technology Residential Cold Climate Heat Pump with Variable-Speed Technology Purdue prototype system Purdue prototype system Unico...

  13. Compact, electro-hydraulic, variable valve actuation system providing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compact, electro-hydraulic, variable valve actuation system providing variable lift, timing and duration to enable high efficiency engine combustion control Compact,...

  14. Ocean color and atmospheric dimethyl sulfide: On their mesoscale variability

    E-Print Network [OSTI]

    Matrai, Patricia A; Balch, William M; Cooper, David J; Saltzman, Eric S

    1993-01-01T23:59:59.000Z

    periods of' time, covering mesoscale Campbell, J. W. and W.Dimethyl Sulfide' On Their Mesoscale Variability PATRICIA A.Miami, Miami, Florida The mesoscale variability of dimethyl

  15. Variable Speed Pumping: A Guide to Successful Applications -...

    Broader source: Energy.gov (indexed) [DOE]

    Variable Speed Pumping: A Guide to Successful Applications - Executive Summary Variable Speed Pumping: A Guide to Successful Applications - Executive Summary This document...

  16. Adaptation to Climate Variability and Change: A Guidance Manual...

    Open Energy Info (EERE)

    to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and...

  17. Demonstration of a Variable Phase Turbine Power System for Low...

    Broader source: Energy.gov (indexed) [DOE]

    Demonstration of a Variable Phase Turbine Power System for Low Temperature Geothermal Resources Demonstration of a Variable Phase Turbine Power System for Low Temperature...

  18. Measuring spatial variability in soil characteristics

    DOE Patents [OSTI]

    Hoskinson, Reed L. (Rigby, ID); Svoboda, John M. (Idaho Falls, ID); Sawyer, J. Wayne (Hampton, VA); Hess, John R. (Ashton, ID); Hess, J. Richard (Idaho Falls, ID)

    2002-01-01T23:59:59.000Z

    The present invention provides systems and methods for measuring a load force associated with pulling a farm implement through soil that is used to generate a spatially variable map that represents the spatial variability of the physical characteristics of the soil. An instrumented hitch pin configured to measure a load force is provided that measures the load force generated by a farm implement when the farm implement is connected with a tractor and pulled through or across soil. Each time a load force is measured, a global positioning system identifies the location of the measurement. This data is stored and analyzed to generate a spatially variable map of the soil. This map is representative of the physical characteristics of the soil, which are inferred from the magnitude of the load force.

  19. Variable energy constant current accelerator structure

    DOE Patents [OSTI]

    Anderson, O.A.

    1988-07-13T23:59:59.000Z

    A variable energy, constant current ion beam accelerator structure is disclosed comprising an ion source capable of providing the desired ions, a pre-accelerator for establishing an initial energy level, a matching/pumping module having means for focusing means for maintaining the beam current, and at least one main accelerator module for continuing beam focus, with means capable of variably imparting acceleration to the beam so that a constant beam output current is maintained independent of the variable output energy. In a preferred embodiment, quadrupole electrodes are provided in both the matching/pumping module and the one or more accelerator modules, and are formed using four opposing cylinder electrodes which extend parallel to the beam axis and are spaced around the beam at 90/degree/ intervals with opposing electrodes maintained at the same potential. 12 figs., 3 tabs.

  20. Pearle's Hidden-Variable Model Revisited

    E-Print Network [OSTI]

    Richard D. Gill

    2015-05-19T23:59:59.000Z

    Pearle (1970) gave an example of a local hidden variables model which exactly reproduced the singlet correlations of quantum theory, through the device of data-rejection: particles can fail to be detected in a way which depends on the hidden variables carried by the particles and on the measurement settings. If the experimenter computes correlations between measurement outcomes of particle pairs for which both particles are detected, he is actually looking at a subsample of particle pairs, determined by interaction involving both measurement settings and the hidden variables carried in the particles. We correct a mistake in Pearle's formulas (a normalization error) and more importantly show that the model is more simple than first appears. We illustrate with visualisations of the model and with a small simulation experiment, with code in the statistical programming language R included in the paper. Open problems are discussed.

  1. Variable pressure power cycle and control system

    DOE Patents [OSTI]

    Goldsberry, Fred L. (Spring, TX)

    1984-11-27T23:59:59.000Z

    A variable pressure power cycle and control system that is adjustable to a variable heat source is disclosed. The power cycle adjusts itself to the heat source so that a minimal temperature difference is maintained between the heat source fluid and the power cycle working fluid, thereby substantially matching the thermodynamic envelope of the power cycle to the thermodynamic envelope of the heat source. Adjustments are made by sensing the inlet temperature of the heat source fluid and then setting a superheated vapor temperature and pressure to achieve a minimum temperature difference between the heat source fluid and the working fluid.

  2. A new variable in flow analysis

    E-Print Network [OSTI]

    Q. H. Zhang; L. Huo; W. N. Zhang

    2006-06-20T23:59:59.000Z

    We have used a simple spectrum distribution which was derived from a hydrodynamical equation\\cite{Csorgo} to fit the data of the STAR group. It is found that it can fit the $v_2$ of STAR group very well. We have found that $v_2$ is sensitive to both the effective temperature of particles and the expanding velocity. We have suggested a new variable ${\\bf z}$ to be used in the flow analysis. This new variable will measure the correlation of particles momentum components. We have also shown that one of the $x$ or $y$ direction in the reaction plane is the direction which has the largest variance.

  3. ULTRACAM photometry of eclipsing cataclysmic variable stars

    E-Print Network [OSTI]

    William James Feline

    2008-06-04T23:59:59.000Z

    The accurate determination of the masses of cataclysmic variable stars is critical to our understanding of their origin, evolution and behaviour. Observations of cataclysmic variables also afford an excellent opportunity to constrain theoretical physical models of the accretion discs housed in these systems. In particular, the brightness distributions of the accretion discs of eclipsing systems can be mapped at a spatial resolution unachievable in any other astrophysical situation. This thesis addresses both of these important topics via the analysis of the light curves of six eclipsing dwarf novae, obtained using ULTRACAM, a novel high-speed imaging photometer.

  4. Integrating Variable Renewable Energy: Challenges and Solutions

    SciTech Connect (OSTI)

    Bird, L.; Milligan, M.; Lew, D.

    2013-09-01T23:59:59.000Z

    In the U.S., a number of utilities are adopting higher penetrations of renewables, driven in part by state policies. While power systems have been designed to handle the variable nature of loads, the additional supply-side variability and uncertainty can pose new challenges for utilities and system operators. However, a variety of operational and technical solutions exist to help integrate higher penetrations of wind and solar generation. This paper explores renewable energy integration challenges and mitigation strategies that have been implemented in the U.S. and internationally, including forecasting, demand response, flexible generation, larger balancing areas or balancing area cooperation, and operational practices such as fast scheduling and dispatch.

  5. Summary Leaf area index (LAI) is a key biophysical vari-able in most process-based forest-ecosystem models. How-

    E-Print Network [OSTI]

    Minnesota, University of

    the Ad- vanced Very High Resolution Radiometer (AVHRR) satel- lite-borne sensor of surface greenness). Because of the strong influence of leaf area on rates of canopy gas ex- change and energy balance, efforts

  6. Markovian feedback to control continuous variable entanglement

    E-Print Network [OSTI]

    Stefano Mancini

    2005-04-18T23:59:59.000Z

    We present a model to realize quantum feedback control of continuous variable entanglement. It consists of two interacting bosonic modes subject to amplitude damping and achieving entangled Gaussian steady state. The possibility to greatly improve the degree of entanglement by means of Markovian (direct) feedback is then shown.

  7. The Sun is an active, variable,

    E-Print Network [OSTI]

    Christian, Eric

    The Sun is an active, variable, magnetic star with oscillations on its surface and deep within its the physical processes of the Sun-Earth connection. Visit Us on the Web: Solar Terrestrial Probes Program: http://stp.gsfc.nasa.gov For More Information, See: Sun-Earth Connection: http://sec.gsfc.nasa.gov Living With a Star: http

  8. Original article Variability of digestibility criteria

    E-Print Network [OSTI]

    Boyer, Edmond

    Original article Variability of digestibility criteria in maize elite hybrids submitted of various in vitro digestibility criteria used to estimate genotypic variation in silage maize elite hybrids and in vitro digestibility of whole-plant and cell-walls were pre- dicted by near infra-red reflectance

  9. Solitary waves propagating over variable Roger Grimshaw

    E-Print Network [OSTI]

    Solitary waves propagating over variable topography Roger Grimshaw Loughborough University waves that can propagate steadily over long distances. They were first observed by Russell in 1837 in a now famous report [26] on his observations of a solitary wave propagating along a Scottish canal

  10. Climate Change and Variability Lake Ice, Fishes

    E-Print Network [OSTI]

    Sheridan, Jennifer

    #12;Climate Change and Variability Lake Ice, Fishes and Water Levels John J. Magnuson Center to everything else." #12;The Invisible Present The Invisible Place Magnuson 2006 #12;Ice-on Day 2007 Peter W. Schmitz Photo Local Lake Mendota #12;Ice Breakup 2010 Lake Mendota March 20 #12;March 21 Ice Breakup 2010

  11. Gowdy phenomenology in scale-invariant variables

    E-Print Network [OSTI]

    Lars Andersson; Henk van Elst; Claes Uggla

    2003-10-30T23:59:59.000Z

    The dynamics of Gowdy vacuum spacetimes is considered in terms of Hubble-normalized scale-invariant variables, using the timelike area temporal gauge. The resulting state space formulation provides for a simple mechanism for the formation of ``false'' and ``true spikes'' in the approach to the singularity, and a geometrical formulation for the local attractor.

  12. Hydrologically Sensitive Areas: Variable Source Area Hydrology

    E-Print Network [OSTI]

    Walter, M.Todd

    Hydrologically Sensitive Areas: Variable Source Area Hydrology Implications for Water Quality Risk hydrology was developed and applied to the New York City (NYC) water supply watersheds. According and are therefore hydrologically sensitive with respect to their potential to transport contaminants to perennial

  13. 3. Hydrogeomorphic Variability and River Restoration

    E-Print Network [OSTI]

    Montgomery, David R.

    . It is difficult to design effective stream and channel restoration measures, or evaluate project performance expansion of efforts in and expenditures for stream restoration. Increasingly, resto- ration efforts focus39 3. Hydrogeomorphic Variability and River Restoration D. R. MONTGOMERY1 AND S. M. BOLTON2

  14. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01T23:59:59.000Z

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  15. Variable Light-Cone Theory of Gravity

    E-Print Network [OSTI]

    I. T. Drummond

    1999-08-20T23:59:59.000Z

    We show how to reformulate Variable Speed of Light Theories (VSLT) in a covariant fashion as Variable Light-Cone Theories (VLCT) by introducing two vierbein bundles each associated with a distinct metric. The basic gravitational action relates to one bundle while matter propagates relative to the other in a conventional way. The variability of the speed of light is represented by the variability of the matter light-cone relative to the gravitational light-cone. The two bundles are related locally by an element M, of SL(4,R). The dynamics of the field M is that of a SL(4,R)-sigma model gauged with respect to local (orthochronous) Lorentz transformations on each of the bundles. Only the ``massless'' version of the model with a single new coupling, F, that has the same dimensions as Newton's constant $G_N$, is considered in this paper. When F vanishes the theory reduces to standard General Relativity. We verify that the modified Bianchi identities of the model are consistent with the standard conservation law for the matter energy-momentum tensor in its own background metric. The implications of the model for some simple applications are examined, the Newtonian limit, the flat FRW universe and the spherically symmetric static solution.

  16. The Variable Selection Problem Edward I. George

    E-Print Network [OSTI]

    George, Edward I.

    The Variable Selection Problem Edward I. George Journal of the American Statistical Association-1459%28200012%2995%3A452%3C1304%3ATVSP%3E2.0.CO%3B2-1 Journal of the American Statistical Association is currently published by American Statistical Association. Your use of the JSTOR archive indicates your acceptance

  17. Variable Length Path Coupling Thomas P. Hayes

    E-Print Network [OSTI]

    Hayes, Thomas

    length path coupling theorem, we im- prove the upper bound on the mixing time of the Glauber dynamics . By a "coupling" for this chain, we will mean a joint stochastic process (Xt, Yt) on × such that eachVariable Length Path Coupling Thomas P. Hayes Eric Vigoda July 17, 2006 Abstract We present a new

  18. Exploiting Variable Stiffness in Explosive Movement Tasks

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    robots. The proposed methodology is applied to a ball- throwing task where we demonstrate that: (i, with the motivation of (i) improving safety of robots and humans (by providing an intrinsic compliance) [26], (iiExploiting Variable Stiffness in Explosive Movement Tasks David J. Braun, Matthew Howard and Sethu

  19. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  20. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  1. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  2. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

    2008-12-10T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

  3. CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist and Entomologist

    E-Print Network [OSTI]

    Mukhtar, Saqib

    CORN DEVELOPMENT AND KEY GROWTH STAGES Brent Bean and Carl Patrick, Extension Agronomist to have the soil profile full of water prior to tas

  4. Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)

    SciTech Connect (OSTI)

    Bosco, N.

    2012-02-01T23:59:59.000Z

    This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

  5. Thermodynamics in variable speed of light theories

    E-Print Network [OSTI]

    Juan Racker; Pablo Sisterna; Hector Vucetich

    2009-11-30T23:59:59.000Z

    The perfect fluid in the context of a covariant variable speed of light theory proposed by J. Magueijo is studied. On the one hand the modified first law of thermodynamics together with a recipe to obtain equations of state are obtained. On the other hand the Newtonian limit is performed to obtain the nonrelativistic hydrostatic equilibrium equation for the theory. The results obtained are used to determine the time variation of the radius of Mercury induced by the variability of the speed of light ($c$), and the scalar contribution to the luminosity of white dwarfs. Using a bound for the change of that radius and combining it with an upper limit for the variation of the fine structure constant, a bound on the time variation of $c$ is set. An independent bound is obtained from luminosity estimates for Stein 2015B.

  6. Review of Variable Generation Integration Charges

    SciTech Connect (OSTI)

    Porter, K.; Fink, S.; Buckley, M.; Rogers, J.; Hodge, B. M.

    2013-03-01T23:59:59.000Z

    The growth of wind and solar generation in the United States, and the expectation of continued growth of these technologies, dictates that the future power system will be operated in a somewhat different manner because of increased variability and uncertainty. A small number of balancing authorities have attempted to determine an 'integration cost' to account for these changes to their current operating practices. Some balancing authorities directly charge wind and solar generators for integration charges, whereas others add integration charges to projected costs of wind and solar in integrated resource plans or in competitive solicitations for generation. This report reviews the balancing authorities that have calculated variable generation integration charges and broadly compares and contrasts the methodologies they used to determine their specific integration charges. The report also profiles each balancing authority and how they derived wind and solar integration charges.

  7. Variable metric methods for automatic history matching

    E-Print Network [OSTI]

    Armasu, Razvan

    1985-01-01T23:59:59.000Z

    . Automatic history matching codes presently in use employ steepest descent with optimal control, and although they were proven superior to others, their performance is not entirely satisfactory due to the poor rate of convergence as the performance index... rates of convergence when compared to the steepest descent They can be made to start out as steepest descent and end up as a second order algorithm, using functional and gradient information only, In this work several variable metric algorithms...

  8. Thermoacoustic tomography with variable sound speed

    E-Print Network [OSTI]

    Stefanov, Plamen

    2009-01-01T23:59:59.000Z

    We study the mathematical model of thermoacoustic tomography in media with a variable speed for a fixed time interval, greater than the diameter of the domain. In case of measurements on the whole boundary, we give an explicit solution in terms of a Neumann series expansion. We give necessary and sufficient conditions for uniqueness and stability when the measurements are taken on a part of the boundary.

  9. Thermoacoustic tomography with variable sound speed

    E-Print Network [OSTI]

    Plamen Stefanov; Gunther Uhlmann

    2009-05-30T23:59:59.000Z

    We study the mathematical model of thermoacoustic tomography in media with a variable speed for a fixed time interval, greater than the diameter of the domain. In case of measurements on the whole boundary, we give an explicit solution in terms of a Neumann series expansion. We give necessary and sufficient conditions for uniqueness and stability when the measurements are taken on a part of the boundary.

  10. Energy Savings of Variable Speed Motors

    E-Print Network [OSTI]

    Fishel, F. D.

    1979-01-01T23:59:59.000Z

    pump) The input horsepower from the electrical system can be calculated using Equation (3). static head + frictional head + control valve Input HP = ::"\\;;=~..l... motor, conduit, and wire. Motors in the 25-350 HP range are best suited to VFD Systems. As the cost of energy increases and the relative cost savings of variable speed systems increase, the application of these systems should be more widespread. 281...

  11. Intensive Variables & Nanostructuring in Magnetostructural Materials

    SciTech Connect (OSTI)

    Lewis, Laura

    2014-08-13T23:59:59.000Z

    Over the course of this project, fundamental inquiry was carried out to investigate, understand and predict the effects of intensive variables, including the structural scale, on magnetostructural phase transitions in the model system of equiatomic FeRh. These transitions comprise simultaneous magnetic and structural phase changes that have their origins in very strong orbital-lattice coupling and thus may be driven by a plurality of effects.

  12. On Efficient Bandwidth Allocation for Traffic Variability in Datacenters

    E-Print Network [OSTI]

    Lui, John C.S.

    and Technology. 2 Ministry of Education Key Laboratory for Earth System Modeling, and Center for Earth System

  13. Variable energy constant current accelerator structure

    DOE Patents [OSTI]

    Anderson, Oscar A. (Berkeley, CA)

    1990-01-01T23:59:59.000Z

    A variable energy, constant current ion beam accelerator structure is disclosed comprising an ion source capable of providing the desired ions, a pre-accelerator for establishing an initial energy level, a matching/pumping module having means for focusing means for maintaining the beam current, and at least one main accelerator module for continuing beam focus, with means capable of variably imparting acceleration to the beam so that a constant beam output current is maintained independent of the variable output energy. In a preferred embodiment, quadrupole electrodes are provided in both the matching/pumping module and the one or more accelerator modules, and are formed using four opposing cylinder electrodes which extend parallel to the beam axis and are spaced around the beam at 90.degree. intervals with opposing electrodes maintained at the same potential. Adjacent cylinder electrodes of the quadrupole structure are maintained at different potentials to thereby reshape the cross section of the charged particle beam to an ellipse in cross section at the mid point along each quadrupole electrode unit in the accelerator modules. The beam is maintained in focus by alternating the major axis of the ellipse along the x and y axis respectively at adjacent quadrupoles. In another embodiment, electrostatic ring electrodes may be utilized instead of the quadrupole electrodes.

  14. HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules

    E-Print Network [OSTI]

    Jeanjean, Louis

    HOUSING GUIDE FOR VISITING RESEARCHERS Keys to better understanding French rental rules Document written by the Housing Working Group of the association EURAXESS FRANCE #12;Housing guide Euraxess France................................................................................................................P.3 o Key Principles of House Renting in France...........................................P.4 o

  15. Using Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci

    E-Print Network [OSTI]

    Massacci, Fabio

    search [...]. Second, improvements in machine speed, memory size and implementations extended the rangeUsing Walk-SAT and Rel-SAT for Cryptographic Key Search Fabio Massacci Dip. di Informatica e of cryptographic algorithms. Thus, cryptographic key search is often THE search problem for many governments

  16. Fast DES Implementations for FPGAs and its Application to a Universal KeySearch Machine ?

    E-Print Network [OSTI]

    of DES with strong emphasis on high­speed performance. Techniques like pipelining and loop unrolling were, We designed a universal key­search machine and used a high speed DES implementation for FPGAsFast DES Implementations for FPGAs and its Application to a Universal Key­Search Machine ? Jens

  17. Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ?

    E-Print Network [OSTI]

    with strong emphasis on high-speed performance. Techniques like pipelining and loop unrolling were used designed a universal key-search machine and used a high speed DES implementation for FPGAs as an algorithmFast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine ? Jens

  18. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  19. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  20. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  1. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas portfolio of technology options that can provide abundant energy to power economic development and still

  2. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  3. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  4. Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb

    E-Print Network [OSTI]

    Sheffield, University of

    Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

  5. Key Benefits for the M.Sc. Students A monthly stipend of 10,000/-

    E-Print Network [OSTI]

    Rahman, A.K.M. Ashikur

    for app development 24-hours graduate lab facilities with air condition Key Benefits for the M with air condition Key Benefits for the Ph.D. Students (Full Time) A monthly stipend of 30,000/- Tuition for app development 24-hours graduate lab facilities with air condition Provision for research visit

  6. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  7. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  8. US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns

    E-Print Network [OSTI]

    Watson, Craig A.

    US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns For Contractors their return to popularity. Overview of the City of Key Wests' BPAS Ordinance and Green Building. By Allison Design, Inc., ARCSA AP The role of Green Sustainability Organizations and the potential "Tipping Point

  9. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  10. Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE

    E-Print Network [OSTI]

    Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

  11. Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    E-Print Network [OSTI]

    Kai Wen; Gui Lu Long

    2005-08-27T23:59:59.000Z

    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

  12. Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

    E-Print Network [OSTI]

    of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

  13. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  14. Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal

    E-Print Network [OSTI]

    Koksal, Can Emre

    Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal Department of Electrical and Computer Engineering The Ohio State University, Columbus, 43210 Abstract--We consider secret of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can

  15. Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Agreement over a Non-Coherent Block-Fading MIMO Wiretap Channel Mattias Andersson. Dept., Univ. of Toronto, Toronto, ON, Canada email: akhisti@comm.utoronto.ca Abstract--We study secret. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion

  16. Information-Theoretic Key Agreement of Multiple Terminals -Part II: Channel Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model Amin Aminzadeh the channel model. In the channel model, a set of two or more terminals wish to create a shared secret key that is information-theoretically secure from an eavesdropper. The first terminal can choose a sequence of inputs

  17. 100 km secure differential phase shift quantum key distribution with low jitter up-conversion detectors

    E-Print Network [OSTI]

    Eleni Diamanti; Hiroki Takesue; Carsten Langrock; M. M. Fejer; Yoshihisa Yamamoto

    2006-08-13T23:59:59.000Z

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 um single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  18. Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate

    E-Print Network [OSTI]

    Graeme Smith; Joseph M. Renes; John A. Smolin

    2008-04-28T23:59:59.000Z

    A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

  19. Secret Key Agreement Using Correlated Sources over the Generalized Multiple Access Channel

    E-Print Network [OSTI]

    Salimi, Somayeh

    2012-01-01T23:59:59.000Z

    A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup.

  20. Mass Market Demand Response and Variable Generation Integration Issues: A Scoping Study

    SciTech Connect (OSTI)

    Cappers, Peter; Mills, Andrew; Goldman, Charles; Wiser, Ryan; Eto, Joseph H.

    2011-09-10T23:59:59.000Z

    This scoping study focuses on the policy issues inherent in the claims made by some Smart Grid proponents that the demand response potential of mass market customers which is enabled by widespread implementation of Advanced Metering Infrastructure (AMI) through the Smart Grid could be the “silver bullet” for mitigating variable generation integration issues. In terms of approach, we will: identify key issues associated with integrating large amounts of variable generation into the bulk power system; identify demand response opportunities made more readily available to mass market customers through widespread deployment of AMI systems and how they can affect the bulk power system; assess the extent to which these mass market Demand Response (DR) opportunities can mitigate Variable Generation (VG) integration issues in the near-term and what electricity market structures and regulatory practices could be changed to further expand the ability for DR to mitigate VG integration issues over the long term; and provide a qualitative comparison of DR and other approaches to mitigate VG integration issues.