National Library of Energy BETA

Sample records for key macroeconomic variables

  1. Short-Term Energy Outlook Model Documentation: Macro Bridge Procedure to Update Regional Macroeconomic Forecasts with National Macroeconomic Forecasts

    Reports and Publications (EIA)

    2010-01-01

    The Regional Short-Term Energy Model (RSTEM) uses macroeconomic variables such as income, employment, industrial production and consumer prices at both the national and regional1 levels as explanatory variables in the generation of the Short-Term Energy Outlook (STEO). This documentation explains how national macroeconomic forecasts are used to update regional macroeconomic forecasts through the RSTEM Macro Bridge procedure.

  2. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  3. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  4. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  5. 1 INTRODUCTION The volumetric water content, V, is a key variable

    E-Print Network [OSTI]

    Zornberg, Jorge G.

    1 INTRODUCTION The volumetric water content, V, is a key variable in unsaturated soil mechanics of the dielectric permittivity of the soil, Ka, which is in turn related to the volumetric water content through

  6. A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2

    E-Print Network [OSTI]

    Bertini, Robert L.

    A Study of the Key Variables Affecting Bus Replacement Age Decisions and1 Total Costs2 3 Jesse operational3 and maintenance (O&M) per-mile costs increase as buses age. From a purely economic4 perspective, there is a cost tradeoff between the lower O&M costs of newer fleets and their5 higher initial capital costs

  7. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack

    E-Print Network [OSTI]

    Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2013-07-24

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

  8. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  9. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  10. Gaussian Quadrature Inference for Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2015-04-21

    We propose the Gaussian quadrature inference (GQI) method for multicarrier continuous-variable quantum key distribution (CVQKD). A multicarrier CVQKD protocol utilizes Gaussian subcarrier quantum continuous variables (CV) for information transmission. The GQI framework provides a minimal error estimate of the quadratures of the CV quantum states from the discrete, measured noisy subcarrier variables. GQI utilizes the fundamentals of regularization theory and statistical information processing. We characterize GQI for multicarrier CVQKD, and define a method for the statistical modeling and processing of noisy Gaussian subcarrier quadratures. We demonstrate the results through the adaptive multicarrier quadrature division (AMQD) scheme. We define direct GQI (DGQI), and prove that it achieves a theoretical minimal magnitude error. We introduce the terms statistical secret key rate and statistical private classical information, which quantities are derived purely by the statistical functions of GQI. We prove the secret key rate formulas for a multiple access multicarrier CVQKD via the AMQD-MQA (multiuser quadrature allocation) scheme. The GQI and DGQI frameworks can be established in an arbitrary CVQKD protocol and measurement setting, and are implementable by standard low-complexity statistical functions, which is particularly convenient for an experimental CVQKD scenario.

  11. Single photon continuous variable quantum key distribution based on energy-time uncertainty relation

    E-Print Network [OSTI]

    Bing Qi

    2006-02-20

    In previous quantum key distribution (QKD) protocols, information is encoded on either the discrete-variable of single-photon signal or continuous-variables of multi-photon signal. Here, we propose a new QKD protocol by encoding information on continuous-variables of a single photon. In this protocol, Alice randomly encodes her information on either the central frequency of a narrow-band single photon pulse or the time-delay of a broadband single photon pulse, while Bob randomly chooses to do either frequency measurement or time measurement. The security of this protocol rests on the energy-time uncertainty relation, which prevents Eve from simultaneously determining both frequency and time information with arbitrarily high resolution. In practice, this scheme may be more robust against various channel noises, such as polarization and phase fluctuations.

  12. Essays in open economy macroeconomics

    E-Print Network [OSTI]

    Ghosh, Indradeep, Ph. D. Massachusetts Institute of Technology

    2007-01-01

    This thesis is a collection of two essays on open economy macroeconomics. The first essay is on imperfect asset substitutability and current account dynamics. It is divided into four chapters. The first chapter in this ...

  13. Essays in macroeconomics and experiments

    E-Print Network [OSTI]

    Shurchkov, Olga

    2008-01-01

    This dissertation consists of four chapters on empirical and experimental macroeconomics and other experimental topics. Chapter 1 uses a laboratory experiment to test the predictions of a dynamic global game designed to ...

  14. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  15. Macroeconomic Activity Module - NEMS Documentation

    Reports and Publications (EIA)

    2014-01-01

    Documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Macroeconomic Activity Module (MAM) used to develop the Annual Energy Outlook for 2014 (AEO2014). The report catalogues and describes the module assumptions, computations, methodology, parameter estimation techniques, and mainframe source code

  16. Applications of Time Series in Finance and Macroeconomics 

    E-Print Network [OSTI]

    Ibarra Ramirez, Raul

    2011-08-08

    out-of-sample fore- casts for the in ation rate in Mexico. Factor models are useful to summarize the information contained in large datasets. We evaluate the role of using a wide range of macroeconomic variables to forecast in ation, with particular...-2006 : : : : 42 V Stochastic Dominance Test : : : : : : : : : : : : : : : : : : : : : : : 46 VI Forecasting Results: Headline In ation : : : : : : : : : : : : : : : : : 65 VII Forecasting Results: Core In ation : : : : : : : : : : : : : : : : : : : 66 VIII...

  17. Continuous variable quantum key distribution using polarization encoding and post selection

    E-Print Network [OSTI]

    Stefan Lorenz; Natalia Korolkova; Gerd Leuchs

    2004-03-08

    We present an experimental demonstration of a quantum key distribution protocol using coherent polarization states. Post selection is used to ensure a low error rate and security against beam splitting attacks even in the presence of high losses. Signal encoding and readout in polarization bases avoids the difficult task of sending a local oscillator with the quantum channel. This makes our setup robust and easy to implement. A shared key was established for losses up to 64%.

  18. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  19. Essays on macroeconomic risks and stock prices

    E-Print Network [OSTI]

    Duarte, Fernando Manuel

    2011-01-01

    In this thesis, I study the relationship between macroeconomic risks and asset prices. In the first chapter, I establish that inflation risk is priced in the cross-section of stock returns: stocks that have low returns ...

  20. Essays on political institutions and macroeconomics

    E-Print Network [OSTI]

    Yared, Pierre

    2007-01-01

    This dissertation consists of three chapters on the interaction of political institutions and macroeconomic activity in dynamic environments. Chapter 1 studies the optimal management of taxes and debt in a framework which ...

  1. Macroeconomics: A Survey of Laboratory Research Department of Economics

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    to laboratory experiments involving human subjects but rather to computational experiments using calibrated Welcome Abstract This chapter surveys laboratory experiments addressing macroeconomic phenomena. The first and mechanisms for resolving these problems. Part three looks at experiments in specific macroeconomic sectors

  2. A Java Agent-based MacroEconomic Laboratory

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Agent-based MacroEconomic Laboratory Pascal Seppecher May 2, 2012 Abstract This paper as a Java application (Jamel: Java Agent-based MacroEconomic Laboratory). This application, together

  3. Macroeconomics and Health: Investing in Health for

    E-Print Network [OSTI]

    Macroeconomics and Health: Investing in Health for Economic Development #12;Information concerning be obtained from: World Health Organization Marketing and Dissemination 1211 Geneva 27, Switzerland tel: (41 clear and strong on the central task of raising the health of the poor. I can be `realistic

  4. 14.02 Principles of Macroeconomics, Fall 2002

    E-Print Network [OSTI]

    Schaller, Huntley

    This course will provide an overview of macroeconomic issues: the determination of output, employment, unemployment, interest rates, and inflation. Monetary and fiscal policies are discussed, as are the public debt and ...

  5. 14.02 Principles of Macroeconomics, Fall 2009

    E-Print Network [OSTI]

    Guerrieri, Veronica

    This course is designed to introduce classic macroeconomic issues such as growth, inflation, unemployment, interest rates, exchange rates, technological progress, and budget deficits. The course will provide a unified ...

  6. 14.452 Macroeconomic Theory II, Spring 2005

    E-Print Network [OSTI]

    Blanchard, Olivier (Olivier J.)

    The basic machines of macroeconomics. Ramsey, Solow, Samuelson-Diamond, RBCs, ISLM, Mundell-Fleming, Fischer-Taylor. How they work, what shortcuts they take, and how they can be used. Half-term subject. From the course ...

  7. 14.454 Macroeconomic Theory IV, Fall 2004

    E-Print Network [OSTI]

    Caballero, Ricardo

    This half-term course covers the macroeconomic implications of imperfections in labor markets, goods markets, credit and financial markets. The role of nominal rigidities is also an area of focus.

  8. Asset liability management throughout macroeconomic cycle in financial institutions

    E-Print Network [OSTI]

    Yan, Jingsi

    2013-01-01

    In this thesis, we are going to study asset liability management throughout the macroeconomic cycle in financial institutions. There are two important problems in financial institutions. The first is that asset and liability ...

  9. Essays on informational frictions in macroeconomics and finance

    E-Print Network [OSTI]

    La'O, Jennifer

    2010-01-01

    This dissertation consists of four chapters analyzing the effects of heterogeneous and asymmetric information in macroeconomic and financial settings, with an emphasis on short-run fluctuations. Within these chapters, I ...

  10. Three essays on empirical macroeconomics and financial markets

    E-Print Network [OSTI]

    Chen, Lili

    2012-08-21

    This dissertation consists of three essays on empirical macroeconomics and financial markets in the United States. Although they can be considered as three independent essays, their findings are connected with each other ...

  11. 14.452 Macroeconomic Theory II, Spring 2002

    E-Print Network [OSTI]

    Blanchard, Olivier (Olivier J.)

    The basic machines of macroeconomics. Ramsey, Solow, Samuelson-Diamond, RBCs, ISLM, Mundell-Fleming, Fischer-Taylor. How they work, what shortcuts they take, and how they can be used. Half-term subject. From the course ...

  12. Petroleum Data, Natural Gas Data, Coal Data, Macroeconomic Data, Petroleum Import Data

    SciTech Connect (OSTI)

    2009-01-18

    Supplemental tables to the Annual Energy Outlook (AEO) 2006 for petroleum, natural gas, coal, macroeconomic, and import data

  13. Assumption to the Annual Energy Outlook 2014 - Macroeconomic Activity Module

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (BillionProved Reserves (BillionTechnical InformationDecade Year-0 2Market Module ThisMacroeconomic

  14. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  15. Macroeconomic Impacts of the California Global Warming Solutions Act on the

    E-Print Network [OSTI]

    California at Davis, University of

    101 Macroeconomic Impacts of the California Global Warming Solutions Act on the Southern California California Assembly Bill 32 (AB32), the California Global Warming Solutions Act, calls for the cutback

  16. Macroeconomics after the Crisis: Time to Deal with the Pretense-of-Knowledge Syndrome

    E-Print Network [OSTI]

    Caballero, Ricardo J.

    2010-01-01

    The recent financial crisis has damaged the reputation of macroeconomics, largely for its inability to predict the impending financial and economic crisis. To be honest, this inability to predict does not concern me much. ...

  17. The macroeconomic module of the Energy Policy Evaluation Model of Guatemala

    SciTech Connect (OSTI)

    Booth, S.R. (Los Alamos National Lab., NM (USA)); Cancino, R. (Direccion General de Planificacion y Desarrollo Energetico, Guatemala City (Guatemala))

    1991-08-01

    This report describes the methodology and results of the macroeconomic module of the Energy Policy Evaluation Model of Guatemala (MEPEG). This effort was conducted jointly by the Ministry of Energy and Mines of Guatemala and Los Alamos National Laboratory under the Central American Energy and Resources Project of Los Alamos, funded by the US Agency for International Development. The data, theory, empirical specification, and simulation results of the macroeconomic module are described. 10 refs., 2 figs., 6 tabs.

  18. Methodology for the Assessment of the Macroeconomic Impacts of Stricter CAFE Standards - Addendum

    Reports and Publications (EIA)

    2002-01-01

    This assessment of the economic impacts of Corporate Average Fuel Economy (CAFÉ) standards marks the first time the Energy Information Administration has used the new direct linkage of the DRI-WEFA Macroeconomic Model to the National Energy Modeling System (NEMS) in a policy setting. This methodology assures an internally consistent solution between the energy market concepts forecast by NEMS and the aggregate economy as forecast by the DRI-WEFA Macroeconomic Model of the U.S. Economy.

  19. Macroeconomic Study of Construction Firm's Profitability Using Cluster Analysis 

    E-Print Network [OSTI]

    Arora, Parth

    2012-10-19

    on the independent variables and gross margin, all the states were divided into three clusters. Subsequently, a prediction model was developed for each cluster using step-wise backward elimination, thus, eliminating non-significant variables. Results of Model 1 gave...

  20. Macroeconomics after the Crisis: Time to Deal with the Pretense-of-Knowledge Syndrome

    E-Print Network [OSTI]

    Caballero, Ricardo

    2010-09-27

    In this paper I argue that the current core of macroeconomics—by which I mainly mean the so-called dynamic stochastic general equilibrium approach—has become so mesmerized with its own internal logic that it has began to ...

  1. The macroeconomic effects of oil price shocks : why are the 2000s so different from the 1920s?

    E-Print Network [OSTI]

    Blanchard, Olivier

    2007-01-01

    We characterize the macroeconomic performance of a set of industrialized economies in the aftermath of the oil price shocks of the 1970s and of the last decade, focusing on the differences across episodes. We examine four ...

  2. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  3. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  4. Approved Module Information for BS3365, 2014/5 Module Title/Name: Macroeconomics Policy Module Code: BS3365

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    on macroeconomic policies 3 Oil and the macroeconomy ? Causes of oil price changes ? Oil prices; investment and depreciation ? Steady state ? Numerical examples 5 Economic Growth 2 ? Savings and investment Direct Investment and Policy (Professor Nigel Driffield) ? Benefits of FDI ? Aspects to FDI Policy

  5. Model documentation report: Macroeconomic Activity Module (MAM) of the National Energy Modeling System

    SciTech Connect (OSTI)

    NONE

    1997-02-01

    This report documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Macroeconomic Activity Module (MAM) used to develop the Annual Energy Outlook for 1997 (AEO 97). The report catalogues and describes the module assumptions, computations, methodology, parameter estimation techniques, and mainframe source code. This document serves three purposes. First it is a reference document providing a detailed description of the NEMS MAM used for the AEO 1997 production runs for model analysts, users, and the public. Second, this report meets the legal requirement of the Energy Information Administration (EIA) to provide adequate documentation in support of its models. Third, it facilitates continuity in model development by providing documentation from which energy analysts can undertake model enhancements, data updates, and parameter refinements as future projects.

  6. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  7. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  8. Integrating Variable Renewable Energy Into the Grid: Key Issues...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets motivate flexibility through incentives and market design mechanisms, such as sub-hourly dispatch, ancillary services markets, and price-responsive demand. PLANNING FOR A...

  9. Self-Referenced Continuous-Variable Quantum Key Distribution...

    Office of Scientific and Technical Information (OSTI)

    2160-3308 Publisher: American Physical Society Sponsoring Org: USDOE National Nuclear Security Administration (NNSA) Country of Publication: United States Language: English...

  10. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail. (Conference) |Janka,Ferrara U./INFN,TaÅŸ,Superconductors (Conference)Selfthe

  11. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  13. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  14. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  15. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  16. Enabling High Efficiency Clean Combustion with Micro-Variable...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (MVCO) Fuel Injector and Adaptive PCCI Key characteristics of variable orifice fuel injector are described that will extend the operation maps of early PCCI combustion...

  17. A review of Hurricane Variability

    E-Print Network [OSTI]

    Nadiga, Balasubramanya T. "Balu"

    A review of Hurricane Variability Balu Nadiga, COSIM, LANL, Jun 2006 #12;#12;Key Sources · Kerry Emanuel · Webster 2005 · Elsner 1996 · NASA, NOAA, NCAR · Others #12;Hurricanes, Typhoons, Tropical (because rotation important) #12;Hurricanes: A few Comments · Acts as a heat engine, but with crucial fluid

  18. Cataclysmic Variables

    E-Print Network [OSTI]

    Robert Connon Smith

    2007-01-23

    Cataclysmic variables are binary stars in which a relatively normal star is transferring mass to its compact companion. This interaction gives rise to a rich range of behaviour, of which the most noticeable are the outbursts that give the class its name. Novae belong to the class, as do the less well known dwarf novae and magnetic systems. Novae draw their energy from nuclear reactions, while dwarf novae rely on gravity to power their smaller eruptions. All the different classes of cataclysmic variable can be accommodated within a single framework and this article will describe the framework, review the properties of the main types of system and discuss models of the outbursts and of the long-term evolution.

  19. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  20. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  1. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  2. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  3. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  4. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  5. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  6. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  7. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  8. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  9. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  10. Debt dependency, debt relief, and macroeconomic policies: how does the structure of external and domestic debt affect the well being of a country?s citizenry? 

    E-Print Network [OSTI]

    Burns, Jackie Rene

    2005-02-17

    -1 DEBT DEPENDENCY, DEBT RELIEF, AND MACROECONOMIC POLICIES: HOW DOES THE STRUCTURE OF EXTERNAL AND DOMESTIC DEBT AFFECT THE WELL BEING OF A COUNTRY?S CITIZENRY? A Dissertation by JACKIE R. BURNS Submitted to the Office of Graduate Studies... THE STRUCTURE OF EXTERNAL AND DOMESTIC DEBT AFFECT THE WELL BEING OF A COUNTRY?S CITIZENRY? A Dissertation by JACKIE R. BURNS Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree...

  11. Variability Aware Network Utility Maximization

    E-Print Network [OSTI]

    Joseph, Vinay

    2011-01-01

    Network Utility Maximization (NUM) provides the key conceptual framework to study resource allocation amongst a collection of users/entities across disciplines as diverse as economics, law and engineering. In network engineering, this framework has been particularly insightful towards understanding how Internet protocols allocate bandwidth, and motivated diverse research on distributed mechanisms to maximize network utility while incorporating new relevant constraints, on energy/power, storage, stability, etc., for systems ranging from communication networks to the smart-grid. However when the available resources and/or users' utilities vary over time, a user's allocations will tend to vary, which in turn may have a detrimental impact on the users' utility or quality of experience. This paper introduces a generalized NUM framework which explicitly incorporates the detrimental impact of temporal variability in a user's allocated rewards. It explicitly incorporates tradeoffs amongst the mean and variability in ...

  12. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  13. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  14. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  15. Variable Frequency Pump Drives 

    E-Print Network [OSTI]

    Karassik, I. J.; Petraccaro, L. L.; McGuire, J. T.

    1986-01-01

    variable flow operation, Fig. 2 variable system head, the objective of the latter being to maintain pump flow within an optimum range while accommodating a wide variation in system head. VARYING OPERATING CAPACITY OPERATING CAPACITY? N, RANGE HEAD...-rotor motors and variable speed devices have slip losses that significantly reduce the savings that accrue by operating pumps at variable speed. Steam turbine drives may not always be the most practical or economic solution. The variable frequency...

  16. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  17. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  18. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  19. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  20. Essays on Macroeconomics

    E-Print Network [OSTI]

    Ji, Ting

    2015-01-01

    rates and the Altham statistics for India in the previousMoreover, India shows very high Altham statistics inSection 2.1, India shows very high Altham statistics, while

  1. Essays on Macroeconomics

    E-Print Network [OSTI]

    Ji, Ting

    2015-01-01

    Pro- cess versus Product Innovation. Edward ElgarMeschede, M. (2001). Product Innovation, Process Innovation,of Process and Product Innovation. Journal of Economic

  2. Essays in Macroeconomic Analysis

    E-Print Network [OSTI]

    Valcarcel, Victor J.

    2008-07-31

    ON PRIVATE SPENDING: A NEW KEYNESIAN APPROACH. This chapter promotes a structural model based on first principles of an economy populated by two types of consumer, with different saving behaviors, and two types of firms which produce either durable... or non-durable goods in the presence of sticky prices. While the micro-foundations of this model, when fully specified, allow for price staggering and consumer myopia in the New Keynesian tradition, a Real Business Cycle (RBC) view is nested as well...

  3. Three essays on macroeconomics

    E-Print Network [OSTI]

    Pruitt, Seth James

    2008-01-01

    value; ( 2) the ?nal productivity measurement that the ?rmpreliminary measurement of log-productivity Z 0 it is theget a new measurement of time t log-productivity, Z 1 . I t+

  4. Essays on Macroeconomics

    E-Print Network [OSTI]

    Llosa, Luis Gonzalo

    2012-01-01

    A Microfounded Business Cycle Model . . . . . . . . . . .A Real Business Cycle Model . . . . . . . . . . . .A Real Business Cycle Model . . . . .

  5. Three essays in macroeconomics

    E-Print Network [OSTI]

    Auer, Raphael Anton Maximilian Peter Gabriel

    2006-01-01

    This thesis is a collection of three essays on international trade and economic growth. Chapter 1 analyzes the dynamic gains from trade in a Hecksher-Ohlin economy with endogenous factor accumulation. In a framework where ...

  6. Macroeconomic Activity Module

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)DecadeYear Jan Feb Mar Apr 2012 2013(MillionYear5,020CubicCubic(Million::

  7. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  8. Continuous variable entanglement on a chip

    E-Print Network [OSTI]

    Genta Masada; Kazunori Miyata; Alberto Politi; Toshikazu Hashimoto; Jeremy L. O'Brien; Akira Furusawa

    2015-05-29

    Encoding quantum information in continuous variables (CV)---as the quadrature of electromagnetic fields---is a powerful approach to quantum information science and technology. CV entanglement---light beams in Einstein-Podolsky-Rosen (EPR) states---is a key resource for quantum information protocols; and enables hybridisation between CV and single photon discrete variable (DV) qubit systems. However, CV systems are currently limited by their implementation in free-space optical networks: increased complexity, low loss, high-precision alignment and stability, as well as hybridisation, demand an alternative approach. Here we show an integrated photonic implementation of the key capabilities for CV quantum technologies---generation and characterisation of EPR beams in a photonic chip. Combined with integrated squeezing and non-Gaussian operation, these results open the way to universal quantum information processing with light.

  9. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  10. Ashtekar's variables without spin

    E-Print Network [OSTI]

    Thomas Schucker

    2009-06-26

    Ashtekar's variables are shown to arise naturally from a 3+1 split of general relativity in the Einstein-Cartan formulation. Thereby spinors are exorcised.

  11. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  12. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  13. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  14. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  15. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  16. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  17. Variable Renewable Energy: a Regulatory Roadmap (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-10-01

    There is not a one-size-fits-all approach to the regulation of variable renewable energy (VRE), but international experience reveals many approaches that are proving successful. Drawing upon research and experiences from various international contexts, the 21st Century Power Partnership in conjunction with the Clean Energy Solutions Center and Clean Energy Regulators Initiative identified key issues and ideas that have emerged as variable deployment has grown. The Power Partnership research, published in 2014, identified four broad categories of regulatory issues.

  18. Understanding Biomass Feedstock Variability

    SciTech Connect (OSTI)

    Kevin L. Kenney; William A. Smith; Garold L. Gresham; Tyler L. Westover

    2013-01-01

    If the singular goal of biomass logistics and the design of biomass feedstock supply systems is to reduce the per ton supply cost of biomass, these systems may very well develop with ultimate unintended consequences of highly variable and reduced quality biomass feedstocks. This paper demonstrates that due to inherent species variabilities, production conditions, and differing harvest, collection, and storage practices, this is a very real scenario that biomass producers and suppliers as well as conversion developers should be aware of. Biomass feedstock attributes of ash, carbohydrates, moisture, and particle morphology will be discussed. We will also discuss specifications for these attributes, inherent variability of these attributes in biomass feedstocks, and approaches and solutions for reducing variability for improving feedstock quality.

  19. Understanding Biomass Feedstock Variability

    SciTech Connect (OSTI)

    Kevin L. Kenney; Garold L. Gresham; William A. Smith; Tyler L. Westover

    2013-01-01

    If the singular goal of biomass logistics and the design of biomass feedstock supply systems is to reduce the per-ton supply cost of biomass, these systems may very well develop with ultimate unintended consequences of highly variable and reduced quality biomass feedstocks. This paper demonstrates that, due to inherent species variabilities, production conditions and differing harvest, collection and storage practices, this is a very real scenario that biomass producers and suppliers as well as conversion developers should be aware of. Biomass feedstock attributes of ash, carbohydrates, moisture and particle morphology will be discussed. We will also discuss specifications for these attributes, inherent variability of these attributes in biomass feedstocks, and approaches and solutions for reducing variability for improving feedstock quality.

  20. Variable frequency photonic crystals

    E-Print Network [OSTI]

    Wu, Xiang-Yao; Liu, Xiao-Jing; Yang, Jing-Hai; Li, Hong; Chen, Wan-Jin

    2015-01-01

    In this paper, we have firstly proposed a new one-dimensional variable frequency photonic crystals (VFPCs), and calculated the transmissivity and the electronic field distribution of VFPCs with and without defect layer, and considered the effect of defect layer and variable frequency function on the transmissivity and the electronic field distribution. We have obtained some new characteristics for the VFPCs, which should be help to design a new type optical devices.

  1. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  2. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  3. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  4. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  5. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  6. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  7. Variable Refrigerant Flow HVAC 

    E-Print Network [OSTI]

    Jones, S.

    2013-01-01

    Variable refrigerant flow technology HVAC CATEE 2013 San Antonio, TX ESL-KT-13-12-33 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 What is the acronym VRF? ? Variable Refrigerant Flow Operates like a... heat pump utilizing VFD Inverter Compressors and LEV’s Unlike conventional commercial and residential HVAC systems in the USA The predominate method of cooling and heating in the world ESL-KT-13-12-33 CATEE 2013: Clean Air Through Energy Efficiency...

  8. Geometric Characterization of Series-Parallel Variable Resistor Networks

    E-Print Network [OSTI]

    Tygar, Doug

    simultaneously by an algorithm of complexity O(nk). Key Words: Worst case analysis, linear circuits, series-parallel networks, projective geometry. 1. Introduction The task of worst case circuit analysis [7] involves a method for performing a worst case analysis of a variable linear resistor network by casting

  9. Economic plantwide control: Automated controlled variable selection for

    E-Print Network [OSTI]

    Skogestad, Sigurd

    Economic plantwide control: Automated controlled variable selection for a reactor an optimal control structure for a complete chemical plant based on steady state plant economics, also known as economic plantwide control. In this work, we automated a key step of this procedure, which is the selection

  10. Variable thrust cartridge

    DOE Patents [OSTI]

    Taleyarkhan, Rusi P. (Knoxville, TN)

    2000-11-07

    The present invention is a variable thrust cartridge comprising a water-molten aluminum reaction chamber from which a slug is propelled. The cartridge comprises a firing system that initiates a controlled explosion from the reaction chamber. The explosive force provides a thrust to a slug, preferably contained within the cartridge.

  11. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  12. Variable depth core sampler

    DOE Patents [OSTI]

    Bourgeois, P.M.; Reger, R.J.

    1996-02-20

    A variable depth core sampler apparatus is described comprising a first circular hole saw member, having longitudinal sections that collapses to form a point and capture a sample, and a second circular hole saw member residing inside said first hole saw member to support the longitudinal sections of said first hole saw member and prevent them from collapsing to form a point. The second hole saw member may be raised and lowered inside said first hole saw member. 7 figs.

  13. Variable laser attenuator

    DOE Patents [OSTI]

    Foltyn, S.R.

    1987-05-29

    The disclosure relates to low loss, high power variable attenuators comprising one or more transmissive and/or reflective multilayer dielectric filters. The attenuator is particularly suitable to use with unpolarized lasers such as excimer lasers. Beam attenuation is a function of beam polarization and the angle of incidence between the beam and the filter and is controlled by adjusting the angle of incidence the beam makes to the filter or filters. Filters are selected in accordance with beam wavelength. 9 figs.

  14. Variable depth core sampler

    DOE Patents [OSTI]

    Bourgeois, Peter M. (Hamburg, NY); Reger, Robert J. (Grand Island, NY)

    1996-01-01

    A variable depth core sampler apparatus comprising a first circular hole saw member, having longitudinal sections that collapses to form a point and capture a sample, and a second circular hole saw member residing inside said first hole saw member to support the longitudinal sections of said first hole saw member and prevent them from collapsing to form a point. The second hole saw member may be raised and lowered inside said first hole saw member.

  15. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  16. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  17. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  18. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  19. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  20. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  1. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  2. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  3. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  4. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  5. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  6. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  7. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  8. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  9. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  10. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  11. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  12. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  13. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  14. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  15. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  16. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  17. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  18. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  19. Variable Valve Actuation

    SciTech Connect (OSTI)

    Jeffrey Gutterman; A. J. Lasley

    2008-08-31

    Many approaches exist to enable advanced mode, low temperature combustion systems for diesel engines - such as premixed charge compression ignition (PCCI), Homogeneous Charge Compression Ignition (HCCI) or other HCCI-like combustion modes. The fuel properties and the quantity, distribution and temperature profile of air, fuel and residual fraction in the cylinder can have a marked effect on the heat release rate and combustion phasing. Figure 1 shows that a systems approach is required for HCCI-like combustion. While the exact requirements remain unclear (and will vary depending on fuel, engine size and application), some form of substantially variable valve actuation is a likely element in such a system. Variable valve actuation, for both intake and exhaust valve events, is a potent tool for controlling the parameters that are critical to HCCI-like combustion and expanding its operational range. Additionally, VVA can be used to optimize the combustion process as well as exhaust temperatures and impact the after treatment system requirements and its associated cost. Delphi Corporation has major manufacturing and product development and applied R&D expertise in the valve train area. Historical R&D experience includes the development of fully variable electro-hydraulic valve train on research engines as well as several generations of mechanical VVA for gasoline systems. This experience has enabled us to evaluate various implementations and determine the strengths and weaknesses of each. While a fully variable electro-hydraulic valve train system might be the 'ideal' solution technically for maximum flexibility in the timing and control of the valve events, its complexity, associated costs, and high power consumption make its implementation on low cost high volume applications unlikely. Conversely, a simple mechanical system might be a low cost solution but not deliver the flexibility required for HCCI operation. After modeling more than 200 variations of the mechanism it was determined that the single cam design did not have enough flexibility to satisfy three critical OEM requirements simultaneously, (maximum valve lift variation, intake valve opening timing and valve closing duration), and a new approach would be necessary. After numerous internal design reviews including several with the OEM a dual cam design was developed that had the flexibility to meet all motion requirements. The second cam added complexity to the mechanism however the cost was offset by the deletion of the electric motor required in the previous design. New patent applications including detailed drawings and potential valve motion profiles were generated and alternate two cam designs were proposed and evaluated for function, cost, reliability and durability. Hardware was designed and built and testing of sample hardware was successfully completed on an engine test stand. The mechanism developed during the course of this investigation can be applied by Original Equipment Manufacturers, (OEM), to their advanced diesel engines with the ultimate goal of reducing emissions and improving fuel economy. The objectives are: (1) Develop an optimal, cost effective, variable valve actuation (VVA) system for advanced low temperature diesel combustion processes. (2) Design and model alternative mechanical approaches and down-select for optimum design. (3) Build and demonstrate a mechanism capable of application on running engines.

  20. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  1. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  2. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  3. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  4. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  5. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  6. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  7. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  8. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  9. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  10. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  11. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  12. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  13. Understanding Spatio-Temporal Variability and Associated Physical Controls of Near-Surface Soil Moisture in Different Hydro-Climates 

    E-Print Network [OSTI]

    Joshi, Champa

    2013-05-06

    Near-surface soil moisture is a key state variable of the hydrologic cycle and plays a significant role in the global water and energy balance by affecting several hydrological, ecological, meteorological, geomorphologic, ...

  14. Enabling High Efficiency Clean Combustion with Micro-Variable Circular-Orifice (MVCO) Fuel Injector and Adaptive PCCI

    Broader source: Energy.gov [DOE]

    Key characteristics of variable orifice fuel injector are described that will extend the operation maps of early PCCI combustion and enable dual-mode combustion over full operating maps.

  15. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    Oil Production . . . . . . . . . . . . . . . . . . . . . . . . . . .Oil Production in Venezuela and Mexico . . . . . . . . . .Oil Production and Productivity in Venezuela and

  16. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    is described below. Data Crude oil production data is fromproductivity measure is crude oil production per worker, andwhich is measured as crude oil production per worker, is

  17. Say's Law and modern macroeconomics 

    E-Print Network [OSTI]

    Van Allen, Laurel Cameron

    2013-02-22

    Many economists have debated the interpretation of what is known as "Say's Law of markets"; it has been the subject of controversy for two centuries. Jean Baptiste Say describes Say's Law by noting that the "success of ...

  18. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    the Oil Industry . . . . . . . . . . . . . . . . . . . . . .in the Venezuelan Oil Industry . . . . . . . . . . . . .and Productivity: Evidence from the Oil Industry . .

  19. Essays in Macroeconomics and Finance

    E-Print Network [OSTI]

    Khramov, Vadim

    2013-01-01

    economies. ” Journal of Finance 39, pages 77-92. Vasicek,Interest Rate. ” Journal of Finance, Vol. 47, No. 3 Chernov,of Economics. B.A. (Finance), Higher School of Economics.

  20. Essays on finance and macroeconomics

    E-Print Network [OSTI]

    Di Tella, Sebastian T. (Sebastian Tariacuri)

    2013-01-01

    This thesis studies the role of the financial system in the amplification and propagation of business cycles. Chapter 1 studies the origin and propagation of balance sheet recessions. I first show that in standard models ...

  1. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    application to Productivity Measurement in the US Automobileand Mevlyn A. Fuss, ”Productivity Measurement Using Capitalprofitability productivity growth measurement: an integrated

  2. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    Oil Production in Venezuela and Mexico . . . . . . . . . .and Productivity in Venezuela and Mexico . . . . . . . . OilEllner, ”Organized Labor in Venezuela 1958-1991: Behavior

  3. Essays on Macroeconomics and Oil

    E-Print Network [OSTI]

    CAKIR, NIDA

    2013-01-01

    Venezuelan Oil Industry Total Wells Drilled and InvestmentWells Drilled and Investment in the Venezuelan Oil Industryopenness of the oil sector to foreign investment contributes

  4. A simple hidden variable experiment

    E-Print Network [OSTI]

    Arnold Neumaier

    2007-06-22

    An experiment is described which proves, using single photons only, that the standard hidden variables assumptions (commonly used to derive Bell inequalities) are inconsistent with quantum mechanics. The analysis is very simple and transparent. In particular, it demonstrates that a classical wave model for quantum mechanics is not ruled out by experiments demonstrating the violation of the traditional hidden variable assumptions.

  5. Envera Variable Compression Ratio Engine

    SciTech Connect (OSTI)

    Charles Mendler

    2011-03-15

    Aggressive engine downsizing, variable compression ratio and use of the Atkinson cycle are being combined to improve fuel economy by up to 40 percent relative to port fuel injected gasoline engines, while maintaining full engine power. Approach Engine downsizing is viewed by US and foreign automobile manufacturers as one of the best options for improving fuel economy. While this strategy has already demonstrated a degree of success, downsizing and fuel economy gains are currently limited. With new variable compression ratio technology however, the degree of engine downsizing and fuel economy improvement can be greatly increased. A small variable compression ratio (VCR) engine has the potential to return significantly higher vehicle fuel economy while also providing high power. Affordability and potential for near term commercialization are key attributes of the Envera VCR engine. VCR Technology To meet torque and power requirements, a smaller engine needs to do more work per stroke. This is typically accomplished by boosting the incoming charge with either a turbo or supercharger so that more energy is present in the cylinder per stroke to do the work. With current production engines the degree of engine boosting (which correlates to downsizing) is limited by detonation (combustion knock) at high boost levels. Additionally, the turbo or supercharger needs to be responsive and efficient while providing the needed boost. VCR technology eliminates the limitation of engine knock at high load levels by reducing compression ratio to {approx}9:1 (or whatever level is appropriate) when high boost pressures are needed. By reducing the compression ratio during high load demand periods there is increased volume in the cylinder at top dead center (TDC) which allows more charge (or energy) to be present in the cylinder without increasing the peak pressure. Cylinder pressure is thus kept below the level at which the engine would begin to knock. When loads on the engine are low the compression ratio can be raised (to as much as 18:1) providing high engine efficiency. It is important to recognize that for a well designed VCR engine cylinder pressure does not need to be higher than found in current production turbocharged engines. As such, there is no need for a stronger crankcase, bearings and other load bearing parts within the VCR engine. The Envera VCR mechanism uses an eccentric carrier approach to adjust engine compression ratio. The crankshaft main bearings are mounted in this eccentric carrier or 'crankshaft cradle' and pivoting the eccentric carrier 30 degrees adjusts compression ratio from 9:1 to 18:1. The eccentric carrier is made up of a casting that provides rigid support for the main bearings, and removable upper bearing caps. Oil feed to the main bearings transits through the bearing cap fastener sockets. The eccentric carrier design was chosen for its low cost and rigid support of the main bearings. A control shaft and connecting links are used to pivot the eccentric carrier. The control shaft mechanism features compression ratio lock-up at minimum and maximum compression ratio settings. The control shaft method of pivoting the eccentric carrier was selected due to its lock-up capability. The control shaft can be rotated by a hydraulic actuator or an electric motor. The engine shown in Figures 3 and 4 has a hydraulic actuator that was developed under the current program. In-line 4-cylinder engines are significantly less expensive than V engines because an entire cylinder head can be eliminated. The cost savings from eliminating cylinders and an entire cylinder head will notably offset the added cost of the VCR and supercharging. Replacing V6 and V8 engines with in-line VCR 4-cylinder engines will provide high fuel economy at low cost. Numerous enabling technologies exist which have the potential to increase engine efficiency. The greatest efficiency gains are realized when the right combination of advanced and new technologies are packaged together to provide the greatest gains at the least cost. Aggressive engine downsiz

  6. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  7. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  8. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  9. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  10. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  11. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  12. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  13. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  14. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  15. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  16. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  17. Variable rate CELP speech coding using widely variable parameter updates 

    E-Print Network [OSTI]

    Moodie, Myron L.

    1995-01-01

    Code-excited, linear prediction (CELP) has become an accepted method for low bit rate, high quality coding of digital speech. The success of fixed rate CELP schemes has led to increased interest in variable rate techniques ...

  18. Control of entity interactions in a hierarchical variable resolution simulation

    SciTech Connect (OSTI)

    Powell, D.R.

    1997-08-01

    There has long been interest in variable resolution modeling to support military analysis for a broad range of interest areas. Despite the ever-present desire for models of greater fidelity at the expense of analysis and computation resources, models of moderate to low fidelity are still required at many levels of decision-making. Problems can arise due to the issue of consistency among the family of models used for analysis. To address this and other problems, models of variable resolution have been suggested. However, such variable resolution architectures inherently carry their own set of issues which must be resolved in order to be useful. First, what are the structural requirements for a variable resolution model; and second, how are interactions between entities governed, especially when the entities have different resolutions? This paper addresses these issues and discusses key mechanisms needed to develop a variable resolution combat simulation that meets several core requirements for such models: seamless aggregation/disaggregation, appropriate interactions between entities of differing resolution, and control of the aggregation/disaggregation process.

  19. Control of entity interactions in a hierarchical variable resolution simulation

    SciTech Connect (OSTI)

    Powell, D.R.

    1997-10-01

    There has long been interest in variable resolution modeling to support military analysis for a broad range of interest areas. Despite the ever-present desire for models of greater fidelity at the expense of analysis and computation resources, models of moderate to low fidelity are still required at many levels of decision-making. Problems can arise due to the issue of consistency among the family of models used for analysis. To address this and other problems, models of variable resolution have been suggested. However, such variable resolution architectures inherently carry their own set of issues which must be resolved in order to be useful. First, what are the structural requirements for a variable resolution model; and second, how are interactions between entities governed, especially when the entities have different resolutions? This paper addresses these issues and discusses key mechanisms needed to develop a variable resolution combat simulation that meets several core requirements for such models: seamless aggregation/disaggregation, appropriate interactions between entities of differing resolution, and control of the aggregation/disaggregation process.

  20. Anyonic statistics with continuous variables

    E-Print Network [OSTI]

    Jing Zhang; Changde Xie; Kunchi Peng; Peter van Loock

    2008-10-30

    We describe a continuous-variable scheme for simulating the Kitaev lattice model and for detecting statistics of abelian anyons. The corresponding quantum optical implementation is solely based upon Gaussian resource states and Gaussian operations, hence allowing for a highly efficient creation, manipulation, and detection of anyons. This approach extends our understanding of the control and application of anyons and it leads to the possibility for experimental proof-of-principle demonstrations of anyonic statistics using continuous-variable systems.

  1. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  2. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  3. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  4. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  5. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  6. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  7. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  8. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Variable focal length deformable mirror

    SciTech Connect (OSTI)

    Headley, Daniel (Albuquerque, NM); Ramsey, Marc (Albuquerque, NM); Schwarz, Jens (Albuquerque, NM)

    2007-06-12

    A variable focal length deformable mirror has an inner ring and an outer ring that simply support and push axially on opposite sides of a mirror plate. The resulting variable clamping force deforms the mirror plate to provide a parabolic mirror shape. The rings are parallel planar sections of a single paraboloid and can provide an on-axis focus, if the rings are circular, or an off-axis focus, if the rings are elliptical. The focal length of the deformable mirror can be varied by changing the variable clamping force. The deformable mirror can generally be used in any application requiring the focusing or defocusing of light, including with both coherent and incoherent light sources.

  12. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  13. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  14. Cell-to-cell variability and culture conditions during self-renewal reversibly affect subsequent differentiation of mouse embryonic stem cells

    E-Print Network [OSTI]

    Tan, Jit Hin

    2013-01-01

    Cell-to-cell variability in clonal populations is reflected in a distribution of mRNA and protein levels among individual cells, including those of key transcription factors governing embryonic stem cell (ESC) pluripotency ...

  15. Sequential Thermo-Hydraulic Modeling of Variably Saturated Flow in High-Level Radioactive Waste Repository

    E-Print Network [OSTI]

    Boyer, Edmond

    Sequential Thermo-Hydraulic Modeling of Variably Saturated Flow in High-Level Radioactive Waste-Malabry, France Key words: waste repository, geological disposal, thermo- hydraulic modeling Introduction The most developed a sequential model to predict the coupled thermo-hydraulic processes at a cell-scale radioactive

  16. Spatial variability within a single parautochthonous Paratethyan tidal flat deposit (Karpatian, Lower Miocene Kleinebersdorf, Lower Austria)

    E-Print Network [OSTI]

    Zuschin, Martin

    Spatial variability within a single parautochthonous Paratethyan tidal flat deposit (Karpatian and Diplodonta rotundata points to a low-energy coastal setting with at least partly nutrient-rich sediment the interpretation of a parautochthonous to slightly transported tidal flat deposit. Key words: tidal flat, diversity

  17. Estimation of confidence levels for physiology variables measured by a vital signs detection system

    E-Print Network [OSTI]

    Estimation of confidence levels for physiology variables measured by a vital signs detection system Quantifying the accuracy of physiological data measured by a Vital Signs Detection System (VSDS) plays a key,2 The Vital Signs Detection System (VSDS) tested by the U.S. Army Research Institute of Environmental Medicine

  18. Phenotypic variability: underlying mechanisms and

    E-Print Network [OSTI]

    Mencuccini, Maurizio

    constraints on growth allocation between tree parts, which affects both primary production (through allocation to transpiring foliage) and net ecosystem production (through allocation to short- lived, easily decomposed fine is reflected in the huge variability in tree form and function across scales. It has been suggested

  19. Operating Reserves and Variable Generation

    SciTech Connect (OSTI)

    Ela, E.; Milligan, M.; Kirby, B.

    2011-08-01

    This report tries to first generalize the requirements of the power system as it relates to the needs of operating reserves. It also includes a survey of operating reserves and how they are managed internationally in system operations today and then how new studies and research are proposing they may be managed in the future with higher penetrations of variable generation.

  20. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  1. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  2. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  3. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  4. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  5. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  6. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  7. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  8. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  9. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  10. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  11. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  12. 'Energy Matters' greening the campus Reducing energy use across the UW System is among the key goals of Governor's Executive Order

    E-Print Network [OSTI]

    Saldin, Dilano

    undergone energy-efficiency upgrades and renovations. Upgrades include occupancy and variable'Energy Matters' greening the campus Reducing energy use across the UW System is among the key with the near completion of its $10 million Energy Matters: Phase One initiative. Since that initiative kicked

  13. Variable frequency microwave heating apparatus

    DOE Patents [OSTI]

    Bible, Don W. (Clinton, TN); Lauf, Robert J. (Oak Ridge, TN); Johnson, Arvid C. (Lake in the Hills, IL); Thigpen, Larry T. (Angier, NC)

    1999-01-01

    A variable frequency microwave heating apparatus (10) designed to allow modulation of the frequency of the microwaves introduced into a multi-mode microwave cavity (34) for testing or other selected applications. The variable frequency microwave heating apparatus (10) includes a microwave signal generator (12) and a high-power microwave amplifier (20) or a high-power microwave oscillator (14). A power supply (22) is provided for operation of the high-power microwave oscillator (14) or microwave amplifier (20). A directional coupler (24) is provided for detecting the direction and amplitude of signals incident upon and reflected from the microwave cavity (34). A first power meter (30) is provided for measuring the power delivered to the microwave furnace (32). A second power meter (26) detects the magnitude of reflected power. Reflected power is dissipated in the reflected power load (28).

  14. Massive Variability Surveys from Venezuela

    E-Print Network [OSTI]

    Cesar Briceno

    2003-04-03

    At the Venezuela National Astronomical Observatory we are carrying out variability surveys spanning many hundreds of square degrees near the celestial equator, using an 8k x 8k CCD Mosaic Camera optimized for drift-scanning on a 1m Schmidt telescope. Among the initial efforts was a project to obtain the first moderately deep, homogeneous sample of young stars over an area of ~180sqr.deg. encompassing the entire Orion OB1 association, one of the nearest and most active regions of star formation. The results show that variability is a powerful technique to identify pre-main sequence populations, specially in sparse areas devoid of gas and dust. We are currently developing a massive database, equipped with web-based data mining tools, that will make our data and results available to the astronomical community.

  15. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  16. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  17. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  18. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  19. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  20. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  1. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  2. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  3. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  4. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  5. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  6. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  7. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  8. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  9. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  10. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  11. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  12. Definition of a Random Variable Distribution Functions Properties of Distribution Functions Random Variables and Distribution Functions

    E-Print Network [OSTI]

    Watkins, Joseph C.

    Definition of a Random Variable Distribution Functions Properties of Distribution Functions Topic 7 Random Variables and Distribution Functions Distribution Functions 1 / 11 #12;Definition of a Random Variable Distribution Functions Properties of Distribution Functions Outline Definition of a Random

  13. GEOCHEMICAL MODELING OF F AREA SEEPAGE BASIN COMPOSITION AND VARIABILITY

    SciTech Connect (OSTI)

    Millings, M.; Denham, M.; Looney, B.

    2012-05-08

    From the 1950s through 1989, the F Area Seepage Basins at the Savannah River Site (SRS) received low level radioactive wastes resulting from processing nuclear materials. Discharges of process wastes to the F Area Seepage Basins followed by subsequent mixing processes within the basins and eventual infiltration into the subsurface resulted in contamination of the underlying vadose zone and downgradient groundwater. For simulating contaminant behavior and subsurface transport, a quantitative understanding of the interrelated discharge-mixing-infiltration system along with the resulting chemistry of fluids entering the subsurface is needed. An example of this need emerged as the F Area Seepage Basins was selected as a key case study demonstration site for the Advanced Simulation Capability for Environmental Management (ASCEM) Program. This modeling evaluation explored the importance of the wide variability in bulk wastewater chemistry as it propagated through the basins. The results are intended to generally improve and refine the conceptualization of infiltration of chemical wastes from seepage basins receiving variable waste streams and to specifically support the ASCEM case study model for the F Area Seepage Basins. Specific goals of this work included: (1) develop a technically-based 'charge-balanced' nominal source term chemistry for water infiltrating into the subsurface during basin operations, (2) estimate the nature of short term and long term variability in infiltrating water to support scenario development for uncertainty quantification (i.e., UQ analysis), (3) identify key geochemical factors that control overall basin water chemistry and the projected variability/stability, and (4) link wastewater chemistry to the subsurface based on monitoring well data. Results from this study provide data and understanding that can be used in further modeling efforts of the F Area groundwater plume. As identified in this study, key geochemical factors affecting basin chemistry and variability included: (1) the nature or chemistry of the waste streams, (2) the open system of the basins, and (3) duration of discharge of the waste stream types. Mixing models of the archetype waste streams indicated that the overall basin system would likely remain acidic much of the time. Only an extended periods of predominantly alkaline waste discharge (e.g., >70% alkaline waste) would dramatically alter the average pH of wastewater entering the basins. Short term and long term variability were evaluated by performing multiple stepwise modeling runs to calculate the oscillation of bulk chemistry in the basins in response to short term variations in waste stream chemistry. Short term (1/2 month and 1 month) oscillations in the waste stream types only affected the chemistry in Basin 1; little variation was observed in Basin 2 and 3. As the largest basin, Basin 3 is considered the primary source to the groundwater. Modeling showed that the fluctuation in chemistry of the waste streams is not directly representative of the source term to the groundwater (i.e. Basin 3). The sequence of receiving basins and the large volume of water in Basin 3 'smooth' or nullify the short term variability in waste stream composition. As part of this study, a technically-based 'charge-balanced' nominal source term chemistry was developed for Basin 3 for a narrow range of pH (2.7 to 3.4). An example is also provided of how these data could be used to quantify uncertainty over the long term variations in waste stream chemistry and hence, Basin 3 chemistry.

  14. The Cloud Computing and Other Variables

    E-Print Network [OSTI]

    Borjon-Kubota, Martha Estela

    2011-01-01

    12. Fragments in Six 13. Cloud Computing 14. Phase 15.Note 48. Devoured vi Cloud Computing and other Variables I.CALIFORNIA RIVERSIDE Cloud Computing and Other Variables A

  15. Thermoacoustic and Photoacoustic Tomography with a variable ...

    E-Print Network [OSTI]

    Plamen Stefanov

    2010-11-09

    ... a joint work with. Jianliang Qian, Gunther Uhlmann and Hongkai Zhao. Plamen Stefanov (Purdue University ). Thermoacoustic Tomography, Variable Speed.

  16. Variable frequency microwave furnace system

    DOE Patents [OSTI]

    Bible, D.W.; Lauf, R.J.

    1994-06-14

    A variable frequency microwave furnace system designed to allow modulation of the frequency of the microwaves introduced into a furnace cavity for testing or other selected applications. The variable frequency microwave furnace system includes a microwave signal generator or microwave voltage-controlled oscillator for generating a low-power microwave signal for input to the microwave furnace. A first amplifier may be provided to amplify the magnitude of the signal output from the microwave signal generator or the microwave voltage-controlled oscillator. A second amplifier is provided for processing the signal output by the first amplifier. The second amplifier outputs the microwave signal input to the furnace cavity. In the preferred embodiment, the second amplifier is a traveling-wave tube (TWT). A power supply is provided for operation of the second amplifier. A directional coupler is provided for detecting the direction of a signal and further directing the signal depending on the detected direction. A first power meter is provided for measuring the power delivered to the microwave furnace. A second power meter detects the magnitude of reflected power. Reflected power is dissipated in the reflected power load. 5 figs.

  17. Variable frequency microwave furnace system

    DOE Patents [OSTI]

    Bible, Don W. (Clinton, TN); Lauf, Robert J. (Oak Ridge, TN)

    1994-01-01

    A variable frequency microwave furnace system (10) designed to allow modulation of the frequency of the microwaves introduced into a furnace cavity (34) for testing or other selected applications. The variable frequency microwave furnace system (10) includes a microwave signal generator (12) or microwave voltage-controlled oscillator (14) for generating a low-power microwave signal for input to the microwave furnace. A first amplifier (18) may be provided to amplify the magnitude of the signal output from the microwave signal generator (12) or the microwave voltage-controlled oscillator (14). A second amplifier (20) is provided for processing the signal output by the first amplifier (18). The second amplifier (20) outputs the microwave signal input to the furnace cavity (34). In the preferred embodiment, the second amplifier (20) is a traveling-wave tube (TWT). A power supply (22) is provided for operation of the second amplifier (20). A directional coupler (24) is provided for detecting the direction of a signal and further directing the signal depending on the detected direction. A first power meter (30) is provided for measuring the power delivered to the microwave furnace (32). A second power meter (26) detects the magnitude of reflected power. Reflected power is dissipated in the reflected power load (28).

  18. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  19. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  20. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  1. Continuous Variable Quantum Information Processing

    E-Print Network [OSTI]

    Ulrik L. Andersen; Gerd Leuchs; Christine Silberhorn

    2010-08-20

    Observables of quantum systems can posses either a discrete or a continuous spectrum. For example, upon measurements of the photon number of a light state, discrete outcomes will result whereas measurements of the light's quadrature amplitudes result in continuous outcomes. If one uses the continuous degree of freedom of a quantum system either for encoding, processing or detecting information, one enters the field of continuous variable (CV) quantum information processing. In this paper we review the basic principles of CV quantum information processing with main focus on recent developments in the field. We will be addressing the three main stages of a quantum informational system; the preparation stage where quantum information is encoded into CVs of coherent states and single photon states, the processing stage where CV information is manipulated to carry out a specified protocol and a detection stage where CV information is measured using homodyne detection or photon counting.

  2. Variable delivery, fixed displacement pump

    DOE Patents [OSTI]

    Sommars, Mark F. (Sparland, IL)

    2001-01-01

    A variable delivery, fixed displacement pump comprises a plurality of pistons reciprocated within corresponding cylinders in a cylinder block. The pistons are reciprocated by rotation of a fixed angle swash plate connected to the pistons. The pistons and cylinders cooperate to define a plurality of fluid compression chambers each have a delivery outlet. A vent port is provided from each fluid compression chamber to vent fluid therefrom during at least a portion of the reciprocal stroke of the piston. Each piston and cylinder combination cooperates to close the associated vent port during another portion of the reciprocal stroke so that fluid is then pumped through the associated delivery outlet. The delivery rate of the pump is varied by adjusting the axial position of the swash plate relative to the cylinder block, which varies the duration of the piston stroke during which the vent port is closed.

  3. Continuously variable focal length lens

    DOE Patents [OSTI]

    Adams, Bernhard W; Chollet, Matthieu C

    2013-12-17

    A material preferably in crystal form having a low atomic number such as beryllium (Z=4) provides for the focusing of x-rays in a continuously variable manner. The material is provided with plural spaced curvilinear, optically matched slots and/or recesses through which an x-ray beam is directed. The focal length of the material may be decreased or increased by increasing or decreasing, respectively, the number of slots (or recesses) through which the x-ray beam is directed, while fine tuning of the focal length is accomplished by rotation of the material so as to change the path length of the x-ray beam through the aligned cylindrical slows. X-ray analysis of a fixed point in a solid material may be performed by scanning the energy of the x-ray beam while rotating the material to maintain the beam's focal point at a fixed point in the specimen undergoing analysis.

  4. Microlensing induced absorption line variability

    E-Print Network [OSTI]

    Geraint F. Lewis; Rodrigo A. Ibata

    2002-12-02

    Gravitational microlensing has proven to be a powerful probe of both the structure at the heart of quasars and the mass function of compact objects in foreground lenses. This paper examines the potential of gravitational microlensing in probing the scale of structure in absorbing material within the lensing galaxy. We find that, in this high optical depth regime, significant variations in the equivalent width of absorption features can be induced, although the details of these are dependent upon the scale of structure of the absorbing material. The paper concludes with an examination of the absorption line variability observed in the gravitationally lensed quasar PKS1830-211, demonstrating how this may indicate the presence of small scale structure in the cold molecular gas present within the lensing galaxy.

  5. Variable ratio regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1981-12-15

    Disclosed is a regenerative braking device (10) for an automotive vehicle. The device includes an energy storage assembly (12) having a plurality of rubber rollers (26, 28) mounted for rotation between an input shaft (36) and an output shaft (42), clutches (38, 46) and brakes (40, 48) associated with each shaft, and a continuously variable transmission (22) connectable to a vehicle drivetrain and to the input and output shafts by the respective clutches. The rubber rollers are torsionally stressed to accumulate energy from the vehicle when the input shaft is clutched to the transmission while the brake on the output shaft is applied, and are torsionally relaxed to deliver energy to the vehicle when the output shaft is clutched to the transmission while the brake on the input shaft is applied. The transmission ratio is varied to control the rate of energy accumulation and delivery for a given rotational speed of the vehicle drivetrain.

  6. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  7. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  9. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  10. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  11. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  12. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  13. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  14. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  15. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  16. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  17. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  18. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  19. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  20. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  1. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  2. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  3. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  4. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  5. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  6. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  7. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  8. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  9. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  10. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  11. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  12. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  13. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  14. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  15. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  16. Variable path length spectrophotometric probe

    DOE Patents [OSTI]

    O'Rourke, Patrick E. (157 Greenwood Dr., Martiney, GA 30907); McCarty, Jerry E. (104 Recreation Dr., Aiken, SC 29803); Haggard, Ricky A. (1144 Thornwood Drive, North Augusta, SC 29891)

    1992-01-01

    A compact, variable pathlength, fiber optic probe for spectrophotometric measurements of fluids in situ. The probe comprises a probe body with a shaft having a polished end penetrating one side of the probe, a pair of optic fibers, parallel and coterminous, entering the probe opposite the reflecting shaft, and a collimating lens to direct light from one of the fibers to the reflecting surface of the shaft and to direct the reflected light to the second optic fiber. The probe body has an inlet and an outlet port to allow the liquid to enter the probe body and pass between the lens and the reflecting surface of the shaft. A linear stepper motor is connected to the shaft to cause the shaft to advance toward or away from the lens in increments so that absorption measurements can be made at each of the incremental steps. The shaft is sealed to the probe body by a bellows seal to allow freedom of movement of the shaft and yet avoid leakage from the interior of the probe.

  17. Eccentric crank variable compression ratio mechanism

    DOE Patents [OSTI]

    Lawrence, Keith Edward (Kobe, JP); Moser, William Elliott (Peoria, IL); Roozenboom, Stephan Donald (Washington, IL); Knox, Kevin Jay (Peoria, IL)

    2008-05-13

    A variable compression ratio mechanism for an internal combustion engine that has an engine block and a crankshaft is disclosed. The variable compression ratio mechanism has a plurality of eccentric disks configured to support the crankshaft. Each of the plurality of eccentric disks has at least one cylindrical portion annularly surrounded by the engine block. The variable compression ratio mechanism also has at least one actuator configured to rotate the plurality of eccentric disks.

  18. Variable-Period Undulators For Synchrotron Radiation

    DOE Patents [OSTI]

    Shenoy, Gopal (Naperville, IL); Lewellen, John (Plainfield, IL); Shu, Deming (Darien, IL); Vinokurov, Nikolai (Novosibirsk, RU)

    2005-02-22

    A new and improved undulator design is provided that enables a variable period length for the production of synchrotron radiation from both medium-energy and high-energy storage rings. The variable period length is achieved using a staggered array of pole pieces made up of high permeability material, permanent magnet material, or an electromagnetic structure. The pole pieces are separated by a variable width space. The sum of the variable width space and the pole width would therefore define the period of the undulator. Features and advantages of the invention include broad photon energy tunability, constant power operation and constant brilliance operation.

  19. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  20. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  1. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  6. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  7. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  8. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  9. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  10. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  11. The Taiwanese-American occultation survey project stellar variability. III. Detection of 58 new variable stars

    SciTech Connect (OSTI)

    Ishioka, R.; Wang, S.-Y.; Zhang, Z.-W.; Lehner, M. J.; Cook, K. H.; King, S.-K.; Lee, T.; Marshall, S. L.; Schwamb, M. E.; Wang, J.-H.; Wen, C.-Y.; Alcock, C.; Protopapas, P.; Axelrod, T.; Bianco, F. B.; Byun, Y.-I.; Chen, W. P.; Ngeow, C.-C.; Kim, D.-W.; Rice, J. A.

    2014-04-01

    The Taiwanese-American Occultation Survey project is designed for the detection of stellar occultations by small-size Kuiper Belt Objects, and it has monitored selected fields along the ecliptic plane by using four telescopes with a 3 deg{sup 2} field of view on the sky since 2005. We have analyzed data accumulated during 2005-2012 to detect variable stars. Sixteen fields with observations of more than 100 epochs were examined. We recovered 85 variables among a total of 158 known variable stars in these 16 fields. Most of the unrecovered variables are located in the fields observed less frequently. We also detected 58 variable stars which are not listed in the International Variable Star Index of the American Association of Variable Star Observers. These variable stars are classified as 3 RR Lyrae, 4 Cepheid, 1 ? Scuti, 5 Mira, 15 semi-regular, and 27 eclipsing binaries based on the periodicity and the profile of the light curves.

  12. Search for Variable Stars in the WTS

    E-Print Network [OSTI]

    Pinfield, David J.

    Search for Variable Stars in the WTS Database Hristo Stoev Laboratory of Stellar Astrophysics of January 2010 at LAEX in Madrid, Spain #12;WTS Survey Release 0.1 Search for variable stars in the FOV Narrow down my selection only to one of the detectors ­ 15000 light curves #12;WTS Survey Release 0

  13. Variable orifice using an iris shutter

    DOE Patents [OSTI]

    Beeman, Raymond (El Cerrito, CA); Brajkovich, Steven J. (Fremont, CA)

    1978-01-01

    A variable orifice forming mechanism utilizing an iris shutter arrangement adapted to control gas flow, conductance in vacuum systems, as a heat shield for furnace windows, as a beam shutter in sputtering operations, and in any other application requiring periodic or continuously-variable control of material, gas, or fluid flow.

  14. Boosting Search with Variable Elimination. ? Javier Larrosa

    E-Print Network [OSTI]

    Dechter, Rina

    Boosting Search with Variable Elimination. ? Javier Larrosa Dep. Llenguatges i Sistemes Inform#12ElimSearchS;k, a hybrid meta- algorithm that combines search and variable elimination. The param- eter S names from the constraint graph. We also provide experimental evidence that the hybrid algorithm can

  15. Boosting Search with Variable Elimination. ? Javier Larrosa

    E-Print Network [OSTI]

    Dechter, Rina

    Boosting Search with Variable Elimination. ? Javier Larrosa Dep. Llenguatges i Sistemes Inform of variables, reduces the search tree size. In this paper we introduce VarElimSearch(S;k), a hybrid meta the constraint graph. We also provide experimental evidence that the hybrid algorithm can outperform state

  16. Solar Dynamics Observatory/ Extreme Ultraviolet Variability Experiment

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    Solar Dynamics Observatory/ EVE Extreme Ultraviolet Variability Experiment Frequently Asked and model solar extreme ultraviolet irradiance variations due to solar flares, solar rotation, and solar and structure of the Sun. What is solar variability? Solar radiation varies on all time scales ranging from

  17. Property Variability Stochastic Multiscale Analysis and Design

    E-Print Network [OSTI]

    Zabaras, Nicholas J.

    Property Variability Stochastic Multiscale Analysis and Design of Engine Disks N. Zabaras, B. Wen in nickel-based superalloy turbine disks. Issues: Property variability of turbine disk due to high-dimensional multiscale sources Rolls-Royce RB211- 535 turbofan Nickel-base superalloy turbine disk Superalloy

  18. WIND VARIABILITY IN BZ CAMELOPARDALIS

    SciTech Connect (OSTI)

    Honeycutt, R. K.; Kafka, S.; Robertson, J. W. E-mail: skafka@dtm.ciw.edu

    2013-02-01

    Sequences of spectra of the nova-like cataclysmic variable (CV) BZ Cam were acquired on nine nights in 2005-2006 in order to study the time development of episodes of wind activity known to occur frequently in this star. We confirm the results of Ringwald and Naylor that the P-Cygni absorption components of the lines mostly evolve from higher expansion velocity to lower velocity as an episode progresses. We also commonly find blueshifted emission components in the H{alpha} line profile, whose velocities and durations strongly suggest that they are also due to the wind. Curiously, Ringwald and Naylor reported common occurrences of redshifted H{alpha} emission components in their BZ Cam spectra. We have attributed these emission components in H{alpha} to occasions when gas concentrations in the bipolar wind (both front side and back side) become manifested as emission lines as they move beyond the disk's outer edge. We also suggest, based on changes in the P-Cygni profiles during an episode, that the progression from larger to smaller expansion velocities is due to the higher velocity portions of a wind concentration moving beyond the edge of the continuum light of the disk first, leaving a net redward shift of the remaining absorption profile. We derive a new orbital ephemeris for BZ Cam, using the radial velocity of the core of the He I {lambda}5876 line, finding P = 0.15353(4). Using this period, the wind episodes in BZ Cam are found to be concentrated near the inferior conjunction of the emission line source. This result helps confirm that the winds in nova-like CVs are often phase dependent, in spite of the puzzling implication that such winds lack axisymmetry. We argue that the radiation-driven wind in BZ Cam receives an initial boost by acting on gas that has been lifted above the disk by the interaction of the accretion stream with the disk, thereby imposing flickering timescales onto the wind events, as well as leading to an orbital modulation of the wind due to the non-axisymmetric nature of the stream/disk interaction. Simultaneous photometry and spectroscopy were acquired on three nights in order to test the possible connection between flickering continuum light and the strength of the front-side wind. We found strong agreement on one night, some agreement on another, and no agreement on the third. We suggest that some flickering events lead to only back-side winds which will not have associated P-Cygni profiles.

  19. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  20. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  1. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  2. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  3. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  4. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  5. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  6. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  7. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  8. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  9. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  10. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  11. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  12. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  13. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  14. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  15. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  16. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  17. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  18. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  19. The "mean king's problem" with continuous variables

    E-Print Network [OSTI]

    Alonso Botero; Yakir Aharonov

    2007-10-16

    We present the solution to the "mean king's problem" in the continuous variable setting. We show that in this setting, the outcome of a randomly-selected projective measurement of any linear combination of the canonical variables x and p can be ascertained with arbitrary precision. Moreover, we show that the solution is in turn a solution to an associated "conjunctive" version of the problem, unique to continuous variables, where the inference task is to ascertain all the joint outcomes of a simultaneous measurement of any number of linear combinations of x and p.

  20. Numerical study of variable lung ventilation strategies

    E-Print Network [OSTI]

    Yadav, Reena; Hiremath, Kirankumar; Bagler, Ganesh

    2015-01-01

    Mechanical ventilation is used for patients with a variety of lung diseases. Traditionally, ventilators have been designed to monotonously deliver equal sized breaths. While it may seem intuitive that lungs may benefit from unvarying and stable ventilation pressure strategy, recently it has been reported that variable lung ventilation is advantageous. In this study, we analyze the mean tidal volume in response to different `variable ventilation pressure' strategies. We found that uniformly distributed variability in pressure gives the best tidal volume as compared to that of normal, scale- free, log normal and linear distributions.

  1. Analysis of two basic variables of timeout 

    E-Print Network [OSTI]

    Zella, William Francis

    1974-01-01

    ANALYSIS OF TWO BASIC VARIABLES OF TIMEOUT A Thesis WILLIAM FRANCIS ZELLA Submitted to the Graduate College of Texas AaM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE August l974 Major Subjects... Psychology ANALYSI QF TWQ BASIC VARIABLES CF TINEQU '. A Thesis V/ILLIAM FRANCIS ZELLA Approved as to s+yle and content bye Chairman of Commi, ee Head of De artment) (Membe Member) Member ABSTRACT Analysis of Two Basic Variables of Timeout. (August...

  2. Essays on Macroeconomics and International Finance

    E-Print Network [OSTI]

    Wang, Gewei

    2012-01-01

    equity investment also sheds light on home equity bias inhelps to shed light on the cause of home equity bias. Table

  3. Essays on frictions in financial macroeconomics

    E-Print Network [OSTI]

    Kay, Benjamin S.

    2012-01-01

    the US equity market Exxon Mobil and General Electric worthStoneridge Inc. Small XOM Exxon Mobil Corp. Large December

  4. Essays on the macroeconomics of economic development

    E-Print Network [OSTI]

    Peters, Michael

    2012-01-01

    Chapter 1 contains a theory of misallocation. In contrast to a recent literature where misallocation stems from imperfect input markets, I study an economy with non-competitive output markets. This change of focus has two ...

  5. Essays on Macroeconomics and International Finance

    E-Print Network [OSTI]

    Wang, Gewei

    2012-01-01

    investment flows. Journal of Finance 52(5):1851–80. Calvo,mutual funds. Journal of Finance 45(2):497–521. Dvo?r´ak,Indonesia. Journal of Finance 60(2):817–839. Eichenbaum,

  6. Essays on Macroeconomics and Information Economics

    E-Print Network [OSTI]

    Zambrano Riveros, Jorge Andres

    2012-01-01

    on-Hudson, NY: Levy Economics Institute, Bard College, 2010.Journal of Labor Economics, 7(3):281–302, 1989. [4] S.N.Quarterly Jour- nal of Economics, 109(3):659, 1994. [6] Y.

  7. Macroeconomic Implications of the Zero Lower Bound

    E-Print Network [OSTI]

    Wieland, Johannes Friedrich

    2013-01-01

    and supply shocks in the crude oil market,” The Americanin the Global Market for Crude Oil,” 2011. Kim, Jinill and

  8. Natural gas exports and macroeconomic performance

    SciTech Connect (OSTI)

    Naini, A. [Alberta Energy and Utilities Board, Calgary, Alberta (Canada). Economics and Policy Development

    1998-08-01

    Alberta, in volumetric terms, is Canada`s leading exporter of natural gas, crude oil, bitumen, and coal. Alberta natural gas shipments to other Canadian provinces and exports to the United States have developed into an increasingly important component of Alberta economy. This article attempts to measure the impact of gas production and exports on different sectors of the Alberta economy as the energy producing province of Canada.

  9. Term Structure Dynamics with Macroeconomic Factors 

    E-Print Network [OSTI]

    Park, Ha-Il

    2011-02-22

    that this considerably reduces the statistical tension between matching the rst and second moments of interest rates. In terms of forecasting yields, the models with the velocity of money outperform among the ATSMs examined, including those with in ation and real... rate into an a ne term structure model by imposing cross-equation restrictions from no-arbitrage using daily data. In doing so, I identify the high- frequency monetary policy rule that describes the central bank?s reaction to expected in ation and real...

  10. Essays in International Macroeconomics and Forecasting 

    E-Print Network [OSTI]

    Bejarano Rojas, Jesus Antonio

    2012-10-19

    the industrialized countries’ in ation even though their cross-country correlation in money growth rate is negligible. The structure of this model generates cross-country correlations of in ation, output and consumption that appear to closely correspond... to the data. Additionally, this model can explain the internal correlation between in ation and output observed in the data. The second essay presents two important results. First, gains from monetary policy cooperation are di erent from zero when...

  11. Essays on macroeconomics and international trade

    E-Print Network [OSTI]

    Mestieri, Martí (Mestieri Ferre)

    2011-01-01

    This thesis focuses on the study of different aspects of income inequality across and within countries. In the first chapter, I study how the optimal provision of human capital is distorted in the presence of borrowing ...

  12. Macroeconomic Impacts of Climate Policies in California

    E-Print Network [OSTI]

    California at Davis, University of

    ") pollutants ­ decrease in energy use & hence improved energy security ­ "double in its forecasAng ability ­ Generates forecast on an annual basis ­ Has finely-grained sectoring details (169-sectoral scheme) ­ Five major blocks: · Output and Demand

  13. Essays on frictions in financial macroeconomics

    E-Print Network [OSTI]

    Kay, Benjamin S.

    2012-01-01

    Percent Bid-Offer Spread with Estimate and Surprise Data IVDof volume and bid-offer spreads. However, as the data aboveof the bid-offer spread. To calculate the data from December

  14. Microsoft Word - macroeconomic_aeo2012.docx

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)DecadeYear Jan Feb Mar Apr 2012DecadeTotal19 15 15 20118)The Electricity

  15. Alternative Measures of Welfare in Macroeconomic Models

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry NaturalPrices1 Table 1.10 CoolingNotesShale natural2)

  16. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  17. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  18. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  19. Variable reality : interacting with the virtual book

    E-Print Network [OSTI]

    Yang, Hye Soo

    2015-01-01

    This thesis presents Variable Reality, a wearable augmented reality-based system focused on creating a unique on-the-go reading experience that combines the readily accessible nature of digital books with the favorable ...

  20. Variable Speed Pumping for Level Control 

    E-Print Network [OSTI]

    Vasel, M.

    1982-01-01

    analysis, and a brief discussion of variable frequency drive design considerations. Energy savings figures are based upon actual electricity costs at the plant involved. Process duty cycle and energy requirement levels were verified by a wattmeter...

  1. Variable-Rate State Gasoline Taxes

    E-Print Network [OSTI]

    Ang-Olson, Jeffrey; Wachs, Martin; Taylor, Brian D.

    2000-01-01

    J Bradshaw, "SLate ’F~es’ Gasoline Tax So ~t Wdl Rise," TheVarlable-Rate State Gasoline Taxers Jeffrey Ang-Olson MartinVariable-Rate State Gasoline Taxes Jeffrey Ang-Olson

  2. Inserting Group Variables into Fluid Mechanics

    E-Print Network [OSTI]

    R. Jackiw

    2004-10-28

    A fluid, like a quark-gluon plasma, may possess degrees of freedom indexed by a group variable, which retains its identity even in the fluid/continuum description. Conventional Eulerian fluid mechanics is extended to encompass this possibility.

  3. Continuously-Variable Series-Elastic Actuator

    E-Print Network [OSTI]

    Mooney, Luke M.

    Actuator efficiency is an important factor in the design of powered leg prostheses, orthoses, exoskeletons, and legged robots. A continuously-variable series-elastic actuator (CV-SEA) is presented as an efficient actuator ...

  4. PV output variability modeling using satellite imagery.

    SciTech Connect (OSTI)

    Stein, Joshua S.; Ellis, Abraham; Reno, Matthew J.

    2010-11-01

    High frequency irradiance variability measured on the ground is caused by the formation, dissipation, and passage of clouds in the sky. If we can identify and associate different cloud types/patterns from satellite imagery, we may be able to predict irradiance variability in areas lacking sensors. With satellite imagery covering the entire U.S., this allows for more accurate integration planning and power flow modeling over wide areas. Satellite imagery from southern Nevada was analyzed at 15 minute intervals over a year. Methods for image stabilization, cloud detection, and textural classification of clouds were developed and tested. High Performance Computing parallel processing algorithms were also investigated and tested. Artificial Neural Networks using imagery as inputs were trained on ground-based measurements of irradiance to model the variability and were tested to show some promise as a means for predicting irradiance variability.

  5. Investigation of Variables Associated with Vaccine Acceptance

    E-Print Network [OSTI]

    Black, Lora L.

    2011-12-31

    Abstract The current study investigated the relationship between the Health Belief Model (HBM) framework, social variables, personality factors, and H1N1 flu vaccine acceptance. Four hundred thirty two undergraduate students completed online...

  6. Exploiting Variable Stiffness in Explosive Movement Tasks

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    with variable physical compliance, our methodology is able to exploit the energy storage capabilities of existing actuators (e.g., by exploiting the energy storage capabilities of such devices) [5]. Due

  7. Variable volume architecture : expanding the boundary

    E-Print Network [OSTI]

    Saheba, Asheshh (Asheshh Mohit), 1972-

    2001-01-01

    Research into the creation of a Variable Volume Architecture is explored through a series of proposals and projects. An argument is established to develop the means and methods of achieving an architecture of transformation. ...

  8. Bit Commitment with Quantum Continuous Variables

    E-Print Network [OSTI]

    Vallette, Bruno

    protocol -Basic Unit 9 A B 1,0 1,0 B Unveil Phase 1,0 A 1,0 B 1,0 A 0 0 22' 1,0 22' 1,0 CommitBit Commitment with Quantum Continuous Variables Aikaterini Mandilara* 1 Paris 11 Paris 7 #12;Bit Commitment with Quantum Continuous Variables (a) with entanglement (b) or without 2 (a) A. Mandilara and N

  9. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  10. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  11. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  12. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  13. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  14. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  15. Cloud speed impact on solar variability scaling â?? Application to the wavelet variability model

    E-Print Network [OSTI]

    Lave, Matthew; Kleissl, Jan

    2013-01-01

    index: Analysis and statistics. Solar Energy. 81, 195-206.Proc. of International Solar Energy World Congress, Kassel,irradiance variability. Solar Energy. 85, 1343-1353. Perez,

  16. Cloud speed impact on solar variability scaling â?? Application to the wavelet variability model

    E-Print Network [OSTI]

    Lave, Matthew; Kleissl, Jan

    2013-01-01

    Kleissl, J. , 2013. Deriving cloud velocity from an array ofCloud Speed Impact on Solar Variability Scaling -this work, we determine from cloud speeds. Cloud simulator

  17. Software Enabled Virtually Variable Displacement Pumps -Theoretical and Experimental Studies

    E-Print Network [OSTI]

    Li, Perry Y.

    Software Enabled Virtually Variable Displacement Pumps - Theoretical and Experimental Studies the functional equivalent of a variable displacement pump. This approach combines a fixed displacement pump valve control, without many of the shortcomings of commercially available variable displacement pumps

  18. Arc Reversals in Hybrid Bayesian Networks with Deterministic Variables

    E-Print Network [OSTI]

    Cinicioglu, Esma N.; Shenoy, Prakash P.

    2009-05-01

    This article discusses arc reversals in hybrid Bayesian networks with deterministic variables. Hybrid Bayesian networks contain a mix of discrete and continuous chance variables. In a Bayesian network representation, a continuous chance variable...

  19. The use of 'race' as a variable in biomedical research

    E-Print Network [OSTI]

    Efstathiou, Sophia

    2009-01-01

    be used as a variable in biomedical research but mainly toRace’ as a Variable in Biomedical Research A dissertationRace’ as a Variable in Biomedical Research…………. Manifest,

  20. Production-Intent Lost-Motion Variable Valve Actuation Systems...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Production-Intent Lost-Motion Variable Valve Actuation Systems Production-Intent Lost-Motion Variable Valve Actuation Systems Variable valve actuation with onoff IEGR pre-bump is...

  1. Kepler and the long-period variables

    SciTech Connect (OSTI)

    Hartig, Erich; Lebzelter, Thomas [University of Vienna, Department of Astrophysics, Türkenschanzstrasse 17, A-1180 Vienna (Austria); Cash, Jennifer [Department of Biological and Physical Sciences, South Carolina State University, P.O. Box 7024, Orangeburg, SC 29117 (United States); Hinkle, Kenneth H.; Mighell, Kenneth J. [National Optical Astronomy Observatories, P.O. Box 26732, Tucson, AZ 85726 (United States); Walter, Donald K., E-mail: erich.hartig@univie.ac.at, E-mail: thomas.lebzelter@univie.ac.at, E-mail: jcash@physics.scsu.edu, E-mail: hinkle@noao.edu, E-mail: mighell@noao.edu, E-mail: dkw@physics.scsu.edu [Department of Biological and Physical Sciences, South Carolina State University, P.O. Box 7296, Orangeburg, SC 29117 (United States)

    2014-12-01

    High-precision Kepler photometry is used to explore the details of asymptotic giant branch (AGB) light curves. Since AGB variability has a typical timescale on the order of a year, we discuss at length the removal of long-term trends and quarterly changes in Kepler data. Photometry for a small sample of nine semi-regular (SR) AGB stars is examined using a 30 minute cadence over a period of 45 months. While undergoing long-period variations of many magnitudes, the light curves are shown to be smooth at the millimagnitude level over much shorter time intervals. No flares or other rapid events were detected on a sub-day timescale. The shortest AGB period detected is on the order of 100 days. All the SR variables in our sample are shown to have multiple modes. This is always the first overtone, typically combined with the fundamental. A second common characteristic of SR variables is shown to be the simultaneous excitation of multiple closely separated periods for the same overtone mode. Approximately half the sample had a much longer variation in the light curve, likely a long secondary period (LSP). The light curves were all well represented by a combination of sinusoids. However, the properties of the sinusoids are time variable, with irregular variations present at low levels. No non-radial pulsations were detected. It is argued that the LSP variation seen in many SR variables is intrinsic to the star and linked to multiple mode pulsation.

  2. Performance Analysis of Air-Source Variable Speed Heat Pumps...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Analysis of Air-Source Variable Speed Heat Pumps and Various Electric Water Heating Options Performance Analysis of Air-Source Variable Speed Heat Pumps and Various...

  3. Control Strategies for Centrifugal Pumps with Variable Flow Rate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control Strategies for Centrifugal Pumps with Variable Flow Rate Requirements Control Strategies for Centrifugal Pumps with Variable Flow Rate Requirements This tip sheet discusses...

  4. Radiograph and passive data analysis using mixed variable optimization...

    Office of Scientific and Technical Information (OSTI)

    Patent: Radiograph and passive data analysis using mixed variable optimization Citation Details In-Document Search Title: Radiograph and passive data analysis using mixed variable...

  5. Demonstration of a Variable Phase Turbine Power System for Low...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Demonstration of a Variable Phase Turbine Power System for Low Temperature Geothermal Resources Demonstration of a Variable Phase Turbine Power System for Low Temperature...

  6. Ocean color and atmospheric dimethyl sulfide: On their mesoscale variability

    E-Print Network [OSTI]

    Matrai, Patricia A; Balch, William M; Cooper, David J; Saltzman, Eric S

    1993-01-01

    periods of' time, covering mesoscale Campbell, J. W. and W.Dimethyl Sulfide' On Their Mesoscale Variability PATRICIA A.Miami, Miami, Florida The mesoscale variability of dimethyl

  7. Compact, electro-hydraulic, variable valve actuation system providing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compact, electro-hydraulic, variable valve actuation system providing variable lift, timing and duration to enable high efficiency engine combustion control Compact,...

  8. Hydrogen-Assisted Fracture: Materials Testing and Variables Governing...

    Office of Environmental Management (EM)

    Hydrogen-Assisted Fracture: Materials Testing and Variables Governing Fracture Hydrogen-Assisted Fracture: Materials Testing and Variables Governing Fracture SNL has 40+ years...

  9. Advanced Variable Speed Air-Source Integrated Heat Pump 2013...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Advanced Variable Speed Air-Source Integrated Heat Pump 2013 Peer Review Advanced Variable Speed Air-Source Integrated Heat Pump 2013 Peer Review Emerging Technologies Project for...

  10. Residential Cold Climate Heat Pump with Variable-Speed Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Residential Cold Climate Heat Pump with Variable-Speed Technology Residential Cold Climate Heat Pump with Variable-Speed Technology Purdue prototype system Purdue prototype system...

  11. Simulation of the intraseasonal variability over the Eastern...

    Office of Scientific and Technical Information (OSTI)

    Simulation of the intraseasonal variability over the Eastern Pacific ITCZ in climate models Citation Details In-Document Search Title: Simulation of the intraseasonal variability...

  12. AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION

    E-Print Network [OSTI]

    Turiel, Isaac

    2011-01-01

    U"'"'''"'" - e "'~saon Automatic Variable Ventilation1979) LBL~8893 EEB Vent 79-3 Automatic variable ventilationmeasurement capabilities o Automatic operation o Low

  13. Variable energy constant current accelerator structure

    DOE Patents [OSTI]

    Anderson, O.A.

    1988-07-13

    A variable energy, constant current ion beam accelerator structure is disclosed comprising an ion source capable of providing the desired ions, a pre-accelerator for establishing an initial energy level, a matching/pumping module having means for focusing means for maintaining the beam current, and at least one main accelerator module for continuing beam focus, with means capable of variably imparting acceleration to the beam so that a constant beam output current is maintained independent of the variable output energy. In a preferred embodiment, quadrupole electrodes are provided in both the matching/pumping module and the one or more accelerator modules, and are formed using four opposing cylinder electrodes which extend parallel to the beam axis and are spaced around the beam at 90/degree/ intervals with opposing electrodes maintained at the same potential. 12 figs., 3 tabs.

  14. Pearle's Hidden-Variable Model Revisited

    E-Print Network [OSTI]

    Richard D. Gill

    2015-05-19

    Pearle (1970) gave an example of a local hidden variables model which exactly reproduced the singlet correlations of quantum theory, through the device of data-rejection: particles can fail to be detected in a way which depends on the hidden variables carried by the particles and on the measurement settings. If the experimenter computes correlations between measurement outcomes of particle pairs for which both particles are detected, he is actually looking at a subsample of particle pairs, determined by interaction involving both measurement settings and the hidden variables carried in the particles. We correct a mistake in Pearle's formulas (a normalization error) and more importantly show that the model is more simple than first appears. We illustrate with visualisations of the model and with a small simulation experiment, with code in the statistical programming language R included in the paper. Open problems are discussed.

  15. Measuring spatial variability in soil characteristics

    DOE Patents [OSTI]

    Hoskinson, Reed L. (Rigby, ID); Svoboda, John M. (Idaho Falls, ID); Sawyer, J. Wayne (Hampton, VA); Hess, John R. (Ashton, ID); Hess, J. Richard (Idaho Falls, ID)

    2002-01-01

    The present invention provides systems and methods for measuring a load force associated with pulling a farm implement through soil that is used to generate a spatially variable map that represents the spatial variability of the physical characteristics of the soil. An instrumented hitch pin configured to measure a load force is provided that measures the load force generated by a farm implement when the farm implement is connected with a tractor and pulled through or across soil. Each time a load force is measured, a global positioning system identifies the location of the measurement. This data is stored and analyzed to generate a spatially variable map of the soil. This map is representative of the physical characteristics of the soil, which are inferred from the magnitude of the load force.

  16. Overview of Variable Renewable Energy Regulatory Issues: A Clean Energy Regulators Initiative Report

    SciTech Connect (OSTI)

    Miller, M.; Cox, S.

    2014-05-01

    This CERI report aims to provide an introductory overview of key regulatory issues associated with the deployment of renewable energy -- particularly variable renewable energy (VRE) sources such wind and solar power. The report draws upon the research and experiences from various international contexts, and identifies key ideas that have emerged from the growing body of VRE deployment experience and regulatory knowledge. The report assumes basic familiarity with regulatory concepts, and although it is not written for a technical audience, directs the reader to further reading when available. VRE deployment generates various regulatory issues: substantive, procedural, and public interest issues, and the report aims to provide an empirical and technical grounding for all three types of questions as appropriate.

  17. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  18. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  19. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  20. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  1. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  2. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  3. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  4. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  5. Variable pressure power cycle and control system

    DOE Patents [OSTI]

    Goldsberry, Fred L. (Spring, TX)

    1984-11-27

    A variable pressure power cycle and control system that is adjustable to a variable heat source is disclosed. The power cycle adjusts itself to the heat source so that a minimal temperature difference is maintained between the heat source fluid and the power cycle working fluid, thereby substantially matching the thermodynamic envelope of the power cycle to the thermodynamic envelope of the heat source. Adjustments are made by sensing the inlet temperature of the heat source fluid and then setting a superheated vapor temperature and pressure to achieve a minimum temperature difference between the heat source fluid and the working fluid.

  6. Integrating Variable Renewable Energy: Challenges and Solutions

    SciTech Connect (OSTI)

    Bird, L.; Milligan, M.; Lew, D.

    2013-09-01

    In the U.S., a number of utilities are adopting higher penetrations of renewables, driven in part by state policies. While power systems have been designed to handle the variable nature of loads, the additional supply-side variability and uncertainty can pose new challenges for utilities and system operators. However, a variety of operational and technical solutions exist to help integrate higher penetrations of wind and solar generation. This paper explores renewable energy integration challenges and mitigation strategies that have been implemented in the U.S. and internationally, including forecasting, demand response, flexible generation, larger balancing areas or balancing area cooperation, and operational practices such as fast scheduling and dispatch.

  7. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  8. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  9. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  10. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  11. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  12. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  13. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  14. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  15. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  16. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  17. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  18. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  19. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  20. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  1. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  2. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  3. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  4. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  5. Group Work: Global warming & natural variability

    E-Print Network [OSTI]

    Allan, Richard P.

    Group Work: Global warming & natural variability Left: Global annual temperature departure from://skepticalscience.com/foster-and-rahmstorf-measure-global-warming-signal.html 2013 2012 2011 #12;: 1963-1964, 1982-83, 1991-93 1. How do these events affect the global annual temperature and can you

  6. Variable Light-Cone Theory of Gravity

    E-Print Network [OSTI]

    I. T. Drummond

    1999-08-20

    We show how to reformulate Variable Speed of Light Theories (VSLT) in a covariant fashion as Variable Light-Cone Theories (VLCT) by introducing two vierbein bundles each associated with a distinct metric. The basic gravitational action relates to one bundle while matter propagates relative to the other in a conventional way. The variability of the speed of light is represented by the variability of the matter light-cone relative to the gravitational light-cone. The two bundles are related locally by an element M, of SL(4,R). The dynamics of the field M is that of a SL(4,R)-sigma model gauged with respect to local (orthochronous) Lorentz transformations on each of the bundles. Only the ``massless'' version of the model with a single new coupling, F, that has the same dimensions as Newton's constant $G_N$, is considered in this paper. When F vanishes the theory reduces to standard General Relativity. We verify that the modified Bianchi identities of the model are consistent with the standard conservation law for the matter energy-momentum tensor in its own background metric. The implications of the model for some simple applications are examined, the Newtonian limit, the flat FRW universe and the spherically symmetric static solution.

  7. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect (OSTI)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  8. TimeVariable Photo-Evaporation of

    E-Print Network [OSTI]

    Throop, Henry

    TimeVariable Photo-Evaporation of Protoplanetary Disks Henry Throop (SwRI) John Bally (U. Colorado) #12;Takeaway: Photo-evaporation alters the disk structure in essentially unpredictable ways, because for disks formed at the same time in the same cluster. #12;30 Doradus: 100+ O/B stars Photo

  9. TimeVariable Photo-Evaporation of

    E-Print Network [OSTI]

    Throop, Henry

    TimeVariable Photo-Evaporation of Protoplanetary Disks Henry Throop (PSI) DDA Meeting Mt. Hood clusters. #12;Work we have done involves ... ­ UV photo-evaporation from massive stars ­ Interaction; Moeckel & Throop 2009; Throop & Bally 2010; Pichardo et al 2010; Throop 2011. #12;Photo

  10. The variable sky of deep synoptic surveys

    SciTech Connect (OSTI)

    Ridgway, Stephen T.; Matheson, Thomas; Mighell, Kenneth J.; Olsen, Knut A. [National Optical Astronomy Observatory, Tucson, AZ 85725 (United States); Howell, Steve B., E-mail: ridgway@noao.edu [NASA Ames Research Center, P.O. Box 1, M/S 244-30, Moffett Field, CA 94035 (United States)

    2014-11-20

    The discovery of variable and transient sources is an essential product of synoptic surveys. The alert stream will require filtering for personalized criteria—a process managed by a functionality commonly described as a Broker. In order to understand quantitatively the magnitude of the alert generation and Broker tasks, we have undertaken an analysis of the most numerous types of variable targets in the sky—Galactic stars, quasi-stellar objects (QSOs), active galactic nuclei (AGNs), and asteroids. It is found that the Large Synoptic Survey Telescope (LSST) will be capable of discovering ?10{sup 5} high latitude (|b| > 20°) variable stars per night at the beginning of the survey. (The corresponding number for |b| < 20° is orders of magnitude larger, but subject to caveats concerning extinction and crowding.) However, the number of new discoveries may well drop below 100 per night within less than one year. The same analysis applied to GAIA clarifies the complementarity of the GAIA and LSST surveys. Discovery of AGNs and QSOs are each predicted to begin at ?3000 per night and decrease by 50 times over four years. Supernovae are expected at ?1100 per night, and after several survey years will dominate the new variable discovery rate. LSST asteroid discoveries will start at >10{sup 5} per night, and if orbital determination has a 50% success rate per epoch, they will drop below 1000 per night within two years.

  11. EXPERIMENTAL CONTROL OF VARIABLE CAM TIMING ACTUATORS

    E-Print Network [OSTI]

    . This dilution of the mixture in the cylinder re- duces HC and NOx feedgas emissions. Neverthe- less, retarding al., 1998). Table 1 illus- trates the sought after NOx emission reduction when the Variable Cam conditions (1500rpm, 30Nm). NOx pollutant emissions are lowered by retarding the cam timing. ically

  12. Model solution State variable model: differential equation

    E-Print Network [OSTI]

    Limburg, Karin E.

    2/26/2014 1 Model solution State variable model: differential equation Models a rate of change equation General solution: the antiderivative Particular solution: require initial and boundary conditions up the general solution to a differential equation in a book Solve for initial and boundary

  13. CLIMATE VARIABILITY, CLIMATE CHANGE, AND WESTERN

    E-Print Network [OSTI]

    Keeton, William S.

    CHAPTER 13 CLIMATE VARIABILITY, CLIMATE CHANGE, AND WESTERN WILDFIRE WITH IMPLICATIONS FOR THE URBAN­WILDLAND INTERFACE William S. Keeton, Philip W. Mote and Jerry F. Franklin ABSTRACT Climate change hazards by the warmer, drier summers projected for much of the western U.S. by climate models would

  14. Galactic Variable Sky with EGRET and GLAST

    SciTech Connect (OSTI)

    Digel, S.W.; /SLAC

    2006-11-28

    The characteristics of the largely-unidentified Galactic sources of gamma rays that were detected by EGRET are reviewed. Proposed source populations that may have the correct spatial, spectral, luminosity, and variability properties to be the origins of the EGRET sources are also presented. Finally, the prospects for studying Galactic gamma-ray sources with the GLAST LAT are reviewed.

  15. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  16. Photometric Stellar Variability in the Galactic Center

    E-Print Network [OSTI]

    M. Rafelski; A. M. Ghez; S. D. Hornstein; J. R. Lu; M. Morris

    2007-01-04

    We report the results of a diffraction-limited, photometric variability study of the central 5"x5" of the Galaxy conducted over the past 10 years using speckle imaging techniques on the W. M. Keck I 10 m telescope. Within our limiting magnitude of mK < 16 mag for images made from a single night of data, we find a minimum of 15 K[2.2 micron]-band variable stars out of 131 monitored stars. The only periodic source in our sample is the previously identified variable IRS 16SW, for which we measure an orbital period of 19.448 +- 0.002 days. In contrast to recent results, our data on IRS 16SW show an asymmetric phased light curve with a much steeper fall-time than rise-time, which may be due to tidal deformations caused by the proximity of the stars in their orbits. We also identify a possible wind colliding binary (IRS 29N) based on its photometric variation over a few year time-scale which is likely due to episodic dust production. None of the 4 LBV candidates in our sample show the characteristic large increase or decrease in luminosity, however, our time baseline is too short to rule them out as LBVs. Among the remaining variable stars, the majority are early-type stars and three are possibly variable due to line of sight extinction variations. For the 7 OB stars at the center of our field of view that have well-determined 3-dimensional orbits, we see no evidence of flares or dimming of their light, which limits the possibility of a cold, geometrically-thin inactive accretion disk around the supermassive black hole, Sgr A*.

  17. Impact of Variable Valve Timing on Low Temperature Combustion

    Broader source: Energy.gov [DOE]

    Documents effects of variable valve actuation in implementing low temperature combustion in production engine platform.

  18. Review of Variable Generation Integration Charges

    SciTech Connect (OSTI)

    Porter, K.; Fink, S.; Buckley, M.; Rogers, J.; Hodge, B. M.

    2013-03-01

    The growth of wind and solar generation in the United States, and the expectation of continued growth of these technologies, dictates that the future power system will be operated in a somewhat different manner because of increased variability and uncertainty. A small number of balancing authorities have attempted to determine an 'integration cost' to account for these changes to their current operating practices. Some balancing authorities directly charge wind and solar generators for integration charges, whereas others add integration charges to projected costs of wind and solar in integrated resource plans or in competitive solicitations for generation. This report reviews the balancing authorities that have calculated variable generation integration charges and broadly compares and contrasts the methodologies they used to determine their specific integration charges. The report also profiles each balancing authority and how they derived wind and solar integration charges.

  19. Thermodynamics in variable speed of light theories

    SciTech Connect (OSTI)

    Racker, Juan [CONICET, Centro Atomico Bariloche, Avenida Bustillo 9500 (8400), San Carlos De Bariloche (Argentina); Facultad de Ciencias Astronomicas y Geofisicas, Universidad Nacional de La Plata, Paseo del Bosque S/N (1900), La Plata (Argentina); Sisterna, Pablo [Facultad de Ciencias Exactas y Naturales, Universidad Nacional de Mar del Plata, Funes 3350 (7600), Mar del Plata (Argentina); Vucetich, Hector [Facultad de Ciencias Astronomicas y Geofisicas, Universidad Nacional de La Plata, Paseo del Bosque S/N (1900), La Plata (Argentina)

    2009-10-15

    The perfect fluid in the context of a covariant variable speed of light theory proposed by J. Magueijo is studied. On the one hand the modified first law of thermodynamics together with a recipe to obtain equations of state are obtained. On the other hand the Newtonian limit is performed to obtain the nonrelativistic hydrostatic equilibrium equation for the theory. The results obtained are used to determine the time variation of the radius of Mercury induced by the variability of the speed of light (c), and the scalar contribution to the luminosity of white dwarfs. Using a bound for the change of that radius and combining it with an upper limit for the variation of the fine structure constant, a bound on the time variation of c is set. An independent bound is obtained from luminosity estimates for Stein 2015B.

  20. Thermodynamics in variable speed of light theories

    E-Print Network [OSTI]

    Juan Racker; Pablo Sisterna; Hector Vucetich

    2009-11-30

    The perfect fluid in the context of a covariant variable speed of light theory proposed by J. Magueijo is studied. On the one hand the modified first law of thermodynamics together with a recipe to obtain equations of state are obtained. On the other hand the Newtonian limit is performed to obtain the nonrelativistic hydrostatic equilibrium equation for the theory. The results obtained are used to determine the time variation of the radius of Mercury induced by the variability of the speed of light ($c$), and the scalar contribution to the luminosity of white dwarfs. Using a bound for the change of that radius and combining it with an upper limit for the variation of the fine structure constant, a bound on the time variation of $c$ is set. An independent bound is obtained from luminosity estimates for Stein 2015B.

  1. Teleportation using continuous variable quantum cloning machine

    E-Print Network [OSTI]

    Satyabrata Adhikari

    2008-02-15

    We show that an unknown quantum state in phase space can be teleported via three-mode entanglement generated by continuous variable quantum cloning machine (transformation). Further, proceeding with our teleportation protocol we are able to improve the fidelity of teleportation obtained by Loock et.al. [Phys.Rev.Lett. 84, 3482(2000)]. Also we study here the entanglement between the two output copies from cloning machine.

  2. Thermoacoustic tomography with variable sound speed

    E-Print Network [OSTI]

    Plamen Stefanov; Gunther Uhlmann

    2009-05-30

    We study the mathematical model of thermoacoustic tomography in media with a variable speed for a fixed time interval, greater than the diameter of the domain. In case of measurements on the whole boundary, we give an explicit solution in terms of a Neumann series expansion. We give necessary and sufficient conditions for uniqueness and stability when the measurements are taken on a part of the boundary.

  3. Thermoacoustic tomography with variable sound speed

    E-Print Network [OSTI]

    Stefanov, Plamen

    2009-01-01

    We study the mathematical model of thermoacoustic tomography in media with a variable speed for a fixed time interval, greater than the diameter of the domain. In case of measurements on the whole boundary, we give an explicit solution in terms of a Neumann series expansion. We give necessary and sufficient conditions for uniqueness and stability when the measurements are taken on a part of the boundary.

  4. Intensive Variables & Nanostructuring in Magnetostructural Materials

    SciTech Connect (OSTI)

    Lewis, Laura

    2014-08-13

    Over the course of this project, fundamental inquiry was carried out to investigate, understand and predict the effects of intensive variables, including the structural scale, on magnetostructural phase transitions in the model system of equiatomic FeRh. These transitions comprise simultaneous magnetic and structural phase changes that have their origins in very strong orbital-lattice coupling and thus may be driven by a plurality of effects.

  5. Variable Compression Ratio Engine | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-SavingofCode |DepartmentVampire PowerVariable

  6. Variability of QSOs with variable regions in broad absorption troughs from the Sloan Digital Sky Survey

    E-Print Network [OSTI]

    He, Zhi-Cheng; Jiang, Xiao-Lei; Ge, Xue

    2015-01-01

    The variability of broad absorption lines is investigated for a sample of 188 broad-absorption-line (BAL) quasars (QSOs) ($z > 1.7$) with at least two-epoch observations from the Sloan Digital Sky Survey Data Release 7 (SDSS DR7), covering a time-scale of about 0.001 -- 3 years in the rest frame. Considering only the longest time-scale between epochs for each QSO, 73 variable regions in the \\civ BAL troughs are detected for 43 BAL QSOs. The proportion of BAL QSOs showing variable regions increases with longer time-interval than about 1 year in the rest frame. The velocity width of variable regions is narrow compared to the BAL-trough outflow velocity. For 43 BAL QSOs with variable regions, it is found that there is a medium strong correlation between the variation of the continuum luminosity at 1500 \\AA\\ and the variation of the spectral index. With respect to the total 188 QSOs, larger proportion of BAL QSOs with variable regions appears bluer during their brighter phases, which implies that the origin of BA...

  7. Fossil fleet transition with fuel changes and large scale variable renewable integration

    SciTech Connect (OSTI)

    James, Revis; Hesler, Stephen; Bistline, John

    2015-03-31

    Variability in demand as seen by grid-connected dispatchable generators can increase due to factors such as greater production from variable generation assets (for example, wind and solar), increased reliance on demand response or customer-driven automation, and aggregation of loads. This variability results a need for these generators to operate in a range of different modes, collectively referred to as “flexible operations.” This study is designed to inform power companies, researchers, and policymakers of the scope and trends in increasing levels of flexible operations as well as reliability challenges and impacts for dispatchable assets. Background Because there is rarely a direct monetization of the value of operational flexibility, the decision to provide such flexibility is typically dependent on unit- and region-specific decisions made by asset owners. It is very likely that much greater and more widespread flexible operations capabilities will be needed due to increased variability in demand seen by grid-connected generators, uncertainty regarding investment in new units to provide adequate operational flexibility, and the retirement of older, uncontrolled sub-critical pulverized coal units. Objective To enhance understanding of the technical challenges and operational impacts associated with dispatchable assets needed to increase operational flexibility and support variable demand. Approach The study approach consists of three elements: a literature review of relevant prior studies, analysis of detailed scenarios for evolution of the future fleet over the next 35 years, and engineering assessment of the degree and scope of technical challenges associated with transformation to the future fleet. The study approach integrated two key elements rarely brought together in a single analysis—1) long-term capacity planning, which enables modeling of unit retirements and new asset investments, and 2) unit commitment analysis, which permits examination of hourly unit dispatch while considering operational limitations relevant to flexible operations capabilities.

  8. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  9. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  10. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  11. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  12. Variability in continuous traffic monitoring data

    SciTech Connect (OSTI)

    Wright, T.; Hu, P.S.; Young, J.

    1996-07-01

    Each state in the United States can be viewed as a universe of road segments. For each road segment in each state, it is desired to know various traffic characteristics based on count data, classification count data, and weigh-in-motion data. These data are absolutely essential for highway design, maintenance, safety, and planning. Given no cost constraints, each road segment would be continuously monitored every day of the year. However, in practice, a few road segments are monitored continuously every day of the year to produce annual characteristics of traffic flow. The remaining road segments are monitored for one or two days each year, and this resulting data are `adjusted` (using factors based on data collected from the continuously monitored road segments) to produce estimates of annual characteristics. With this general approach, each state strives to provide estimates of annual characteristics for each road segment within its jurisdiction. In 1985, the Federal Highway Administration (FHWA) published the Traffic Monitoring Guide to assist states in achieving this end. As with almost any data collection effort, the monitoring data suffers from errors from many sources. In this paper, we report some empirical findings in a research project sponsored by the FHWA. This research project studied the variability in the traffic data from the continuously monitored road segments from state(s) and, the extent to which this variability is transferred to and affects the precision of the data produced from the road segments which are monitored only one or two days each year. The ultimate hope is that states will eventually be able to not only publish an estimate of a characteristic such as Average Annual Daily Traffic (AADT) for each road segment, but also that each estimate will be accompanied by a statement expressing how good the estimate is in terms of its estimated variability or precision, which will likely be expressed as a coefficient of variation.

  13. VARIABLE SPEED INTEGRATED INTELLIGENT HVAC BLOWER

    SciTech Connect (OSTI)

    Shixiao Wang; Herman Wiegman; Wilson Wu; John Down; Luana Iorio; Asha Devarajan; Jing Wang; Ralph Carl; Charlie Stephens; Jeannine Jones; Paul Szczesny

    2001-11-14

    This comprehensive topical report discusses the key findings in the development of a intelligent integrated blower for HVAC applications. The benefits of rearward inclined blades over that of traditional forward inclined blades is well documented and a prototype blower design is presented. A comparison of the proposed blower to that of three typical units from the industry is presented. The design of the blower housing is also addressed and the impact of size limitations on static efficiency is discussed. Issues of air flow controllability in the rearward inclined blower is addressed and a solution to this problem is proposed. Several motor design options are discussed including inside-out radial flux designs and novel axial flux designs, all are focused on the various blower needs. The control of the motor-blower and airflow through the use of a high density inverter stage and modern digital signal processor is presented. The key technical challenges of the approach are discussed. The use of the motor as a sensor in the larger heating/ventilating system is also discussed. Diagnostic results for both the motor itself and the blower system are presented.

  14. Long-Term Wind Power Variability

    SciTech Connect (OSTI)

    Wan, Y. H.

    2012-01-01

    The National Renewable Energy Laboratory started collecting wind power data from large commercial wind power plants (WPPs) in southwest Minnesota with dedicated dataloggers and communication links in the spring of 2000. Over the years, additional WPPs in other areas were added to and removed from the data collection effort. The longest data stream of actual wind plant output is more than 10 years. The resulting data have been used to analyze wind power fluctuations, frequency distribution of changes, the effects of spatial diversity, and wind power ancillary services. This report uses the multi-year wind power data to examine long-term wind power variability.

  15. Time-resolved photometry of cataclysmic variables

    E-Print Network [OSTI]

    C. Papadaki; H. M. J. Boffin; J. Cuypers; V. Stanishev; Z. Kraicheva; V. Genkov

    2003-12-18

    We present time-resolved photometry of two cataclysmic variables whose CCD photometric observations were obtained with the 1m telescope at the South African Astronomical Observatory in October 2002 and August 2003 and with the 1m telescope at Hoher List in Germany. Concerning MCT 2347-3144 we detect for the first time a period of 6.65h. For V1193 Ori the 3.96 h periodicity has for the first time been confirmed through time-resolved photometry.

  16. Crystal diffraction lens with variable focal length

    DOE Patents [OSTI]

    Smither, Robert K. (Hinsdale, IL)

    1991-01-01

    A method and apparatus for altering the focal length of a focusing element o one of a plurality of pre-determined focal lengths by changing heat transfer within selected portions of the element by controlled quantities. Control over heat transfer is accomplished by manipulating one or more of a number of variables, including: the amount of heat or cold applied to surfaces; type of fluids pumped through channels for heating and cooling; temperatures, directions of flow and rates of flow of fluids; and placement of channels.

  17. Crystal diffraction lens with variable focal length

    DOE Patents [OSTI]

    Smither, R.K.

    1991-04-02

    A method and apparatus for altering the focal length of a focusing element of one of a plurality of pre-determined focal lengths by changing heat transfer within selected portions of the element by controlled quantities is disclosed. Control over heat transfer is accomplished by manipulating one or more of a number of variables, including: the amount of heat or cold applied to surfaces; type of fluids pumped through channels for heating and cooling; temperatures, directions of flow and rates of flow of fluids; and placement of channels. 19 figures.

  18. Adhesive bonding using variable frequency microwave energy

    DOE Patents [OSTI]

    Lauf, R.J.; McMillan, A.D.; Paulauskas, F.L.; Fathi, Z.; Wei, J.

    1998-08-25

    Methods of facilitating the adhesive bonding of various components with variable frequency microwave energy are disclosed. The time required to cure a polymeric adhesive is decreased by placing components to be bonded via the adhesive in a microwave heating apparatus having a multimode cavity and irradiated with microwaves of varying frequencies. Methods of uniformly heating various articles having conductive fibers disposed therein are provided. Microwave energy may be selectively oriented to enter an edge portion of an article having conductive fibers therein. An edge portion of an article having conductive fibers therein may be selectively shielded from microwave energy. 26 figs.

  19. Adhesive bonding using variable frequency microwave energy

    DOE Patents [OSTI]

    Lauf, R.J.; McMillan, A.D.; Paulauskas, F.L.; Fathi, Z.; Wei, J.

    1998-09-08

    Methods of facilitating the adhesive bonding of various components with variable frequency microwave energy are disclosed. The time required to cure a polymeric adhesive is decreased by placing components to be bonded via the adhesive in a microwave heating apparatus having a multimode cavity and irradiated with microwaves of varying frequencies. Methods of uniformly heating various articles having conductive fibers disposed therein are provided. Microwave energy may be selectively oriented to enter an edge portion of an article having conductive fibers therein. An edge portion of an article having conductive fibers therein may be selectively shielded from microwave energy. 26 figs.

  20. Adhesive bonding using variable frequency microwave energy

    DOE Patents [OSTI]

    Lauf, Robert J. (Oak Ridge, TN); McMillan, April D. (Knoxville, TN); Paulauskas, Felix L. (Oak Ridge, TN); Fathi, Zakaryae (Cary, NC); Wei, Jianghua (Raleigh, NC)

    1998-01-01

    Methods of facilitating the adhesive bonding of various components with variable frequency microwave energy are disclosed. The time required to cure a polymeric adhesive is decreased by placing components to be bonded via the adhesive in a microwave heating apparatus having a multimode cavity and irradiated with microwaves of varying frequencies. Methods of uniformly heating various articles having conductive fibers disposed therein are provided. Microwave energy may be selectively oriented to enter an edge portion of an article having conductive fibers therein. An edge portion of an article having conductive fibers therein may be selectively shielded from microwave energy.

  1. Understanding cirrus ice crystal number variability for different heterogeneous ice nucleation spectra

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sullivan, S. C.; Morales Betancourt, R.; Barahona, D.; Nenes, A.

    2015-08-11

    Along with minimizing parameter uncertainty, understanding the cause of temporal and spatial variability of nucleated ice crystal number, Ni, is key to improving the representation of cirrus clouds in climate models. To this end, sensitivities of Ni to input variables like aerosol number and diameter provide valuable information about nucleation regime and efficiency for a given model formulation. Here we use the adjoint model of the Barahona and Nenes cirrus formation parameterization to understand Ni variability for various ice-nucleating particle (INP) spectra. Inputs are generated with the Community Atmosphere Model version 5, and simulations are done with a theoretically-derived spectrum,more »a lab-based empirical spectrum, and two field-based empirical spectra that differ in the nucleation threshold for black carbon aerosol and in the active site density for dust. The magnitude and sign of Ni sensitivity to insoluble aerosol number can be directly linked to nucleation regime and efficiency of various INP. The lab-based spectrum calculates much higher INP efficiencies than field-based ones, which reveals a disparity in aerosol surface properties. Ni sensitivity to temperature tends to be low, due to the compensating effects of temperature on INP spectrum parameters; this low temperature sensitivity regime has been experimentally reported before but never unraveled as done here.« less

  2. Mass Market Demand Response and Variable Generation Integration Issues: A Scoping Study

    SciTech Connect (OSTI)

    Cappers, Peter; Mills, Andrew; Goldman, Charles; Wiser, Ryan; Eto, Joseph H.

    2011-09-10

    This scoping study focuses on the policy issues inherent in the claims made by some Smart Grid proponents that the demand response potential of mass market customers which is enabled by widespread implementation of Advanced Metering Infrastructure (AMI) through the Smart Grid could be the “silver bullet” for mitigating variable generation integration issues. In terms of approach, we will: identify key issues associated with integrating large amounts of variable generation into the bulk power system; identify demand response opportunities made more readily available to mass market customers through widespread deployment of AMI systems and how they can affect the bulk power system; assess the extent to which these mass market Demand Response (DR) opportunities can mitigate Variable Generation (VG) integration issues in the near-term and what electricity market structures and regulatory practices could be changed to further expand the ability for DR to mitigate VG integration issues over the long term; and provide a qualitative comparison of DR and other approaches to mitigate VG integration issues.

  3. OPTIMUM DUCT DESIGN FOR VARIABLE AIR VOLUME SYSTEMS

    E-Print Network [OSTI]

    OPTIMUM DUCT DESIGN FOR VARIABLE AIR VOLUME SYSTEMS By TAECHEOL KIM Master of Science Oklahoma May, 2001 #12;ii OPTIMUM DUCT DESIGN FOR VARIABLE AIR VOLUME SYSTEMS Thesis Approved Volume Systems ............................................. 5 1.2.2. Duct Design Methods

  4. 15 Internal Regulatory Variables and the Design of Human Motivation

    E-Print Network [OSTI]

    Cosmides, Leda

    251 15 Internal Regulatory Variables and the Design of Human Motivation: A Computational The Next Cognitive Revolution: The Adaptationist Integration of Motivation and Cognition ............252 Internal Regulatory Variables and Motivation

  5. Role of Smarter Grids in Variable Renewable Resource Integration (Presentation)

    SciTech Connect (OSTI)

    Miller, M.

    2012-07-01

    This presentation discusses the role of smarter grids in variable renewable resource integration and references material from a forthcoming ISGAN issue paper: Smart Grid Contributions to Variable Renewable Resource Integration, co-written by the presenter and currently in review.

  6. Benchmarking Variable Cost Performance in an Industrial Power Plant 

    E-Print Network [OSTI]

    Kane, J. F.; Bailey, W. F.

    1998-01-01

    One of the most perplexing problems for industrial power plants committed to improving competitiveness is measuring variable cost performance over time. Because variable costs like fuel and electricity represent the overwhelming majority of power...

  7. Advanced Variable Speed Air-Source Integrated Heat Pump | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Advanced variable-speed Air Source Integrated Heat Pump prototype system and field test site near Knoxville, TN Credit: Oak Ridge National Lab Advanced variable-speed Air Source...

  8. Snowpack spatial variability: towards understanding its effect on remote sensing

    E-Print Network [OSTI]

    Marshall, Hans-Peter

    Snowpack spatial variability: towards understanding its effect on remote sensing measurements spatial variability: towards understanding its effect on remote sensing mea- surements and snow slope large errors in these basin estimates. Remote sensing measurements offer a promising alternative, due

  9. Wave spectral energy variability in the northeast Peter D. Bromirski

    E-Print Network [OSTI]

    Bromirski, Peter D.

    Wave spectral energy variability in the northeast Pacific Peter D. Bromirski Integrative January 2005; published 8 March 2005. [1] The dominant characteristics of wave energy variability] s wave spectral energy components are considered separately. Empirical orthogonal function (EOF) analyses

  10. Long run changes in driver behavior due to variable tolls 

    E-Print Network [OSTI]

    Konduru, Karun K.

    2004-09-30

    As many variable pricing projects are still in the implementation stage, long-run driver responses to the variable tolls are largely unknown. This research examined the long-run changes in driver behavior in an existing ...

  11. VARIABILITY OF KD VALUES IN CEMENTITIOUS MATERIALS AND SEDIMENTS

    SciTech Connect (OSTI)

    Almond, P.; Kaplan, D.; Shine, E.

    2012-02-02

    Measured distribution coefficients (K{sub d} values) for environmental contaminants provide input data for performance assessments (PA) that evaluate physical and chemical phenomena for release of radionuclides from wasteforms, degradation of engineered components and subsequent transport of radionuclides through environmental media. Research efforts at SRNL to study the effects of formulation and curing variability on the physiochemical properties of the saltstone wasteform produced at the Saltstone Disposal Facility (SDF) are ongoing and provide information for the PA and Saltstone Operations. Furthermore, the range and distribution of plutonium K{sub d} values in soils is not known. Knowledge of these parameters is needed to provide guidance for stochastic modeling in the PA. Under the current SRS liquid waste processing system, supernate from F & H Tank Farm tanks is processed to remove actinides and fission products, resulting in a low-curie Decontaminated Salt Solution (DSS). At the Saltstone Production Facility (SPF), DSS is mixed with premix, comprised of blast furnace slag (BFS), Class F fly ash (FA), and portland cement (OPC) to form a grout mixture. The fresh grout is subsequently placed in SDF vaults where it cures through hydration reactions to produce saltstone, a hardened monolithic waste form. Variation in saltstone composition and cure conditions of grout can affect the saltstone's physiochemical properties. Variations in properties may originate from variables in DSS, premix, and water to premix ratio, grout mixing, placing, and curing conditions including time and temperature (Harbour et al. 2007; Harbour et al. 2009). There are no previous studies reported in the literature regarding the range and distribution of K{sub d} values in cementitious materials. Presently, the Savannah River Site (SRS) estimate ranges and distributions of K{sub d} values based on measurements of K{sub d} values made in sandy SRS sediments (Kaplan 2010). The actual cementitious material K{sub d} values and solubility values differ from the sandy sediments. The K{sub d} value range and distribution currently used in the PA are estimated to range between 0.25*K{sub d} and 1.75*K{sub d}, where the minimum and maximum values of the ranges reflect the 95% confidence level for the mean K{sub d} value (Kaplan 2010). The objective of the research with cementitious materials was to measure the range and distribution of a monovalent (Cs) and I{sup -} (anion), divalent (Sr), and trivalent (Eu) ions for a variety of laboratory-prepared saltstone surrogate samples to establish a K{sub d} range other than that which is presently used in the PA. It has been observed in laboratory samples that cure temperature profiles can affect properties such as heat of hydration, permeability, porosity, compressive strength, and set time (Harbour et al. 2009). The intent was to identify a range and distribution that could be used by stochastic modelers for the PA. Furthermore, the intent was to replace the arbitrarily selected distributions based on geological sandy sediments and to base it on actual cementitious materials. The scope of this study did not include understanding saltstone sorption mechanisms responsible for increasing or decreasing sorption. Similar to the work with cementitious materials, the purpose of the Pu sediment K{sub d} dataset was not to attempt to understand through statistics how to better understand Pu sorption to sediments or to lower Pu K{sub d} variance. The sediment Pu K{sub d} data is included in this study because it is a key risk driver for the PAs on the SRS, and there is presently no direct studies of Pu variability in SRS soils. Instead the distribution of Pu sediment K{sub d} values was assumed to be similar to other cations, as presented by Kaplan (2010).

  12. Nonparametric estimation of econometric models with categorical variables 

    E-Print Network [OSTI]

    Ouyang, Desheng

    2006-10-30

    shows that regression model with only discrete vari- ables differs significantly from the mixed discrete and continuous variables case. In the mixed variable case with at least one relevant continuous regressor, the irrele- vant variables can be smoothed... CV-based estimator has a high probability of smoothing out the irrele- vant variable, hence it leads to a more efficient (in finite samples) estimation result than the frequency estimator. It is interesting to observe that our nonparametric CV...

  13. Optical and Radio Variability of BL Lacertae

    E-Print Network [OSTI]

    Gaur, Haritma; Bachev, R; Strigachev, A; Semkov, E; Wiita, Paul J; Volvach, A E; Gu, Minfeng; Agarwal, A; Agudo, I; Aller, M F; Aller, H D; Kurtanidze, O M; Kurtanidze, S O; Lahteenmaki, A; Peneva, S; Nikolashvili, M G; Sigua, L A; Tornikoski, M; Volvach, L N

    2015-01-01

    We observed the prototype blazar, BL Lacertae, extensively in optical and radio bands during an active phase in the period 2010--2013 when the source showed several prominent outbursts. We searched for possible correlations and time lags between the optical and radio band flux variations using multifrequency data to learn about the mechanisms producing variability. During an active phase of BL Lacertae, we searched for possible correlations and time lags between multifrequency light curves of several optical and radio bands. We tried to estimate any possible variability timescales and inter-band lags in these bands. We performed optical observations in B, V, R and I bands from seven telescopes in Bulgaria, Georgia, Greece and India and obtained radio data at 36.8, 22.2, 14.5, 8 and 4.8 GHz frequencies from three telescopes in Ukraine, Finland and USA. Significant cross-correlations between optical and radio bands are found in our observations with a delay of cm-fluxes with respect to optical ones of ~250 days...

  14. Variably insulating portable heater/cooler

    DOE Patents [OSTI]

    Potter, T.F.

    1998-09-29

    A compact vacuum insulation panel is described comprising a chamber enclosed by two sheets of metal, glass-like spaces disposed in the chamber between the sidewalls, and a high-grade vacuum in the chamber includes apparatus and methods for enabling and disabling, or turning ``on`` and ``off`` the thermal insulating capability of the panel. One type of enabling and disabling apparatus and method includes a metal hydride for releasing hydrogen gas into the chamber in response to heat, and a hydrogen grate between the metal hydride and the chamber for selectively preventing and allowing return of the hydrogen gas to the metal hydride. Another type of enabling and disabling apparatus and method includes a variable emissivity coating on the sheets of metal in which the emissivity is controllably variable by heat or electricity. Still another type of enabling and disabling apparatus and method includes metal-to-metal contact devices that can be actuated to establish or break metal-to-metal heat paths or thermal short circuits between the metal sidewalls. 25 figs.

  15. WECC Variable Generation Planning Reference Book: Appendices

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Du, Pengwei; Etingov, Pavel V.; Ma, Jian; Vyakaranam, Bharat

    2013-05-13

    The document titled “WECC Variable Generation Planning Reference Book”. This book is divided into two volumes; one is the main document (volume 1)and the other is appendices (volume 2). The main document is a collection of the best practices and the information regarding the application and impact of variables generation on power system planning. This volume (appendices) has additional information on the following topics: Probabilistic load flow problems. 2. Additional useful indices. 3. high-impact low-frequency (HILF) events. 4. Examples of wide-area nomograms. 5. Transmission line ratings, types of dynamic rating methods. 6. Relative costs per MW-km of different electric power transmission technologies. 7. Ultra-high voltage (UHV) transmission. 8.High voltage direct current (VSC-HVDC). 9. HVDC. 10. Rewiring of existing transmission lines. 11. High-temperature low sag (HTLS) conductors. 12. The direct method and energy functions for transient stability analysis in power systems. 13.Blackouts caused by voltage instability. 14. Algorithm for parameter continuation predictor-corrector methods. 15. Approximation techniques available for security regions. 16. Impacts of wind power on power system small signals stability. 17. FIDVR. 18. FACTS. 19. European planning standard and practices. 20. International experience in wind and solar energy sources. 21. Western Renewable Energy Zones (WREZ). 22. various energy storage technologies. 23. demand response. 24. BA consolidation and cooperation options. 25. generator power management requirements and 26. European planning guidelines.

  16. Variable temperature seat climate control system

    DOE Patents [OSTI]

    Karunasiri, Tissa R. (Van Nuys, CA); Gallup, David F. (Pasadena, CA); Noles, David R. (Glendale, CA); Gregory, Christian T. (Alhambra, CA)

    1997-05-06

    A temperature climate control system comprises a variable temperature seat, at least one heat pump, at least one heat pump temperature sensor, and a controller. Each heat pump comprises a number of Peltier thermoelectric modules for temperature conditioning the air in a main heat exchanger and a main exchanger fan for passing the conditioned air from the main exchanger to the variable temperature seat. The Peltier modules and each main fan may be manually adjusted via a control switch or a control signal. Additionally, the temperature climate control system may comprise a number of additional temperature sensors to monitor the temperature of the ambient air surrounding the occupant as well as the temperature of the conditioned air directed to the occupant. The controller is configured to automatically regulate the operation of the Peltier modules and/or each main fan according to a temperature climate control logic designed both to maximize occupant comfort during normal operation, and minimize possible equipment damage, occupant discomfort, or occupant injury in the event of a heat pump malfunction.

  17. Variably insulating portable heater/cooler

    DOE Patents [OSTI]

    Potter, Thomas F. (Denver, CO)

    1998-01-01

    A compact vacuum insulation panel comprising a chamber enclosed by two sheets of metal, glass-like spaces disposed in the chamber between the sidewalls, and a high-grade vacuum in the chamber includes apparatus and methods for enabling and disabling, or turning "on" and "off" the thermal insulating capability of the panel. One type of enabling and disabling apparatus and method includes a metal hydride for releasing hydrogen gas into the chamber in response to heat, and a hydrogen grate between the metal hydride and the chamber for selectively preventing and allowing return of the hydrogen gas to the metal hydride. Another type of enabling and disabling apparatus and method includes a variable emissivity coating on the sheets of metal in which the emissivity is controllably variable by heat or electricity. Still another type of enabling and disabling apparatus and method includes metal-to-metal contact devices that can be actuated to establish or break metal-to-metal heat paths or thermal short circuits between the metal sidewalls.

  18. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  19. USING CLOUD CLASSIFICATION TO MODEL SOLAR VARIABILITY Matthew J. Reno

    E-Print Network [OSTI]

    With increasing amounts of solar energy on the electric grid, understanding the solar variability for different applications for predicting variability or ramp rates at locations with PV plants. For example, if the cloud dispatch could be controlled based on the expected variability and ramp rates from solar power plants

  20. Managing Variable Energy Resources to Increase Renewable Electricity's

    E-Print Network [OSTI]

    Managing Variable Energy Resources to Increase Renewable Electricity's Contribution to the Grid P o Contribution of Renewable Energy to Total Electricity Generation? 15 ManaGInG VaRIablE EnERGy REsouRCEs 16 What to Better Respond to Variability? 19 How Can the Siting of Renewable Energy Projects Be Improved? 20 What

  1. Fine density/design variable Computational Science and Engineering

    E-Print Network [OSTI]

    Paulino, Glaucio H.

    1400 1600 FE Analysis Optimization Initialization Buildings designed to minimize seismic or wind·Fine density/design variable mesh Computational Science and Engineering 2013 Annual Meeting.01 Fine design variable mesh Fine density variable mesh Comparison of forced vibration results 1

  2. GLOBAL PATTERN OF MESOSCALE VARIABILITY IN SEA SURFACE HEIGHT

    E-Print Network [OSTI]

    Kaplan, Alexey

    GLOBAL PATTERN OF MESOSCALE VARIABILITY IN SEA SURFACE HEIGHT AND ITS DYNAMICAL CAUSES Alexey separate the mesoscale variability of sea surface heights into its spatial and temporal components of mesoscale variability in different areas to dynamical causes. Major portion of it can be explained

  3. Exploiting Passive Dynamics with Variable Stiffness Actuation in Robot Brachiation

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    Exploiting Passive Dynamics with Variable Stiffness Actuation in Robot Brachiation Jun Nakanishi.nakanishi@ed.ac.uk, sethu.vijayakumar@ed.ac.uk Abstract--This paper explores a passive control strategy with variable present our passive control strategy considering a pendulum with variable stiffness actuation. Then, we

  4. Continuously Controlled K-Theory with Variable Coefficients

    E-Print Network [OSTI]

    Continuously Controlled K-Theory with Variable Coefficients Douglas R. Anderson and Hans J modules with bounded control and variable coefficients to construct a homology theory on a certain control at infinity and variable coefficients, it has been less clear whether such a theory would have any

  5. SLUDGE BATCH VARIABILITY STUDY WITH FRIT 418

    SciTech Connect (OSTI)

    Johnson, F.; Edwards, T.

    2010-11-29

    The Defense Waste Processing Facility (DWPF) initiated processing Sludge Batch 6 (SB6) in the summer of 2010. In support of processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frit 418 to process SB6. This recommendation was based on assessments of the compositional projections for SB6 available at the time from the Liquid Waste Organization (LWO) and SRNL (using a model-based approach). To support qualification of SB6, SRNL executed a variability study to assess the applicability of the current durability models for SB6. The durability models were assessed over the expected Frit 418-SB6 composition range. Seventeen glasses were selected for the variability study based on the sludge projections used in the frit recommendation. Five of the glasses are based on the centroid of the compositional region, spanning a waste loading (WL) range of 32 to 40%. The remaining twelve glasses are extreme vertices (EVs) of the sludge region of interest for SB6 combined with Frit 418 and are all at 36% WL. These glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). After initiating the SB6 variability study, the measured composition of the SB6 Tank 51 qualification glass produced at the SRNL Shielded Cells Facility indicated that thorium was present in the glass at an appreciable concentration (1.03 wt%), which made it a reportable element for SB6. This concentration of ThO{sub 2} resulted in a second phase of experimental studies. Five glasses were formulated that were based on the centroid of the new sludge compositional region combined with Frit 418, spanning a WL range of 32 to 40%. These glasses were fabricated and characterized using chemical composition analysis and the PCT. Based on the measured PCT response, all of the glasses (with and without thorium) were acceptable with respect to the Environmental Assessment (EA) reference glass regardless of thermal history. All of the normalized boron releases were less than 1 g/L. While all of the targeted glass compositions were predictable with respect to the Product Composition Control System (PCCS) models for durability, a small number of the measured glass compositions were located outside of the lower prediction limit indicating poorer durability than what was actually measured. These unpredictable glasses were in the same lithium metaborate (LM) preparation block during the chemical analyses, which resulted in measured compositions that were not representative of the target compositions. A review of the data did not indicate a clear cause for the problem. Re-digestion and re-measurement of three glasses from this preparation block yielded glass compositions closer to the target values and predicted PCT responses within the PCCS model uncertainty. Therefore, it is believed that the glasses were correctly fabricated and the targeted compositions are closer representations of the true compositions. Per the requirements of the DWPF Glass Product Control Program, the PCCS durability models have been shown to be applicable for the SB6/Frit 418 glass system. PCT results from the glasses fabricated as part of the variability study were shown to be predictable and/or acceptable with respect to the DWPF PCCS models. In addition, the inclusion of ThO{sub 2} was shown to have minimal impact on the acceptability and predictability of the variability study glasses.

  6. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  7. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  8. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  9. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  10. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  11. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  12. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  13. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  14. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    is a multilateral effort to develop the next generation of economical and safe nuclear reactors, and the ITERBetter Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  15. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  16. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing- able, server-passive and user-anonymous timed release public-key encryption scheme which allows precise in our scheme is completely passive -- no interaction between it and the sender or receiver is needed

  17. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  18. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  19. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  20. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  1. On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    E-Print Network [OSTI]

    Kashyap, Navin

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model Manuj Mukherjee Navin Kashyap Abstract--Communication complexity refers to the minimum rate of public communication required for generating a maximal- rate secret key (SK) in the multiterminal source model of Csisz

  2. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  3. DEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs

    E-Print Network [OSTI]

    passionate for sustainability. Performance Goals & Key Indicators for the University The following are ourDEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs GEOGRAPHY 446 and implementing social sustainability at the University of British Columbia University of British Columbia

  4. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  5. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  6. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  7. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  8. Evaluation of the effects of a highway improvement project on Key deer 

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30

    Deer-vehicle collisions (DVCs) along a 5.6-km segment of United States Highway 1 (US 1) on Big Pine Key (BPK), Florida responsible for approximately 26% of endangered Florida Key deer (Odocoileus virginianus clavium) annual mortalities. The Florida...

  9. Ntru-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ntr¯u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian) as well as non-associative Octonions (a power-associative and alternative algebra of dimension eight over: Public Key Cryptography, Ntr¯u, Alternative algebra, lattice based cryptogra- phy, non

  10. Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    - 1 - Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma and Jun Ao School. China machunbo@guet.edu.cn Abstract. Many practical applications use hybrid encryption mechanism to deal scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows

  11. Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and 192, 256-bit key AES for TOP SECRET information [19]. In the last ten years AES has been subject 197 [18]. In June 2003 the US government has approved the use of 128, 192, 256 bit key AES for SECRET block. We concatenate four such local collisions together and add another 6-round trail on top in order

  12. Reaction Attacks on Public Key Cryptosystems Based on the Word Problem

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Mar#19;#16;a Isabel Gonz#19 for public key cryptosystems based on the hardness of the word problem for #12;nitely presented groups. In particular, the evidenced hardness of the classical problems for #12;nitely presented groups (the word

  13. A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying

    E-Print Network [OSTI]

    Ayazi, Farrokh

    A 100 MHz MEMS SiBAR Phase Modulator for Quadrature Phase Shift Keying Logan Sorenson and Farrokh of a MEMS resonator to form the basic component of a switchless quadrature phase shift keying (QPSK) scheme. INTRODUCTION In recent years, microelectromechanical systems (MEMS)- based solutions have gained acceptance

  14. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  15. The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean

    E-Print Network [OSTI]

    The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

  16. Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    E-Print Network [OSTI]

    Chee, Yeow Meng

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications Yeow Meng Chee, Han Technological University, Singapore Abstract--Single-tone frequency shift keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance

  17. Future methane, hydroxyl, and their uncertainties: key climate and emission parameters for future predictions

    E-Print Network [OSTI]

    Holmes, C. D; Prather, M. J; Sovde, O. A; Myhre, G.

    2013-01-01

    changes in tropospheric hydroxyl radical and methane life-of Global Atmospheric Hydroxyl, Science, 331, 67–69, doi:variability of atmospheric hydroxyl radicals over the past

  18. Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution

    E-Print Network [OSTI]

    Jian-Yu Guan; Zhu Cao; Yang Liu; Guo-Liang Shen-Tu; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Xiongfeng Ma; Qiang Zhang; Jian-Wei Pan

    2015-05-29

    In quantum key distribution (QKD), the bit error rate is used to estimate the information leakage and hence determines the amount of privacy amplification --- making the final key private by shortening the key. In general, there exists a threshold of the error rate for each scheme, above which no secure key can be generated. This threshold puts a restriction on the environment noises. For example, a widely used QKD protocol --- BB84 --- cannot tolerate error rates beyond 25%. A new protocol, round-robin differential phase shifted (RRDPS) QKD, essentially removes this restriction and can in principle tolerate more environment disturbance. Here, we propose and experimentally demonstrate a passive RRDPS QKD scheme. In particular, our 500 MHz passive RRDPS QKD system is able to generate a secure key over 50 km with a bit error rate as high as 29%. This scheme should find its applications in noisy environment conditions.

  19. Remote Key Establishment by Mode Mixing in Multimode Fibres and Optical Reciprocity

    E-Print Network [OSTI]

    Bromberg, Yaron; Popoff, Sebastien M; Cao, Hui

    2015-01-01

    Disorder and scattering in photonic systems have long been considered a nuisance that should be circumvented. Recently, disorder has been harnessed for a rapidly growing number of applications, including imaging, sensing and spectroscopy. The chaotic dynamics and extreme sensitivity to external perturbations make random media particularly well-suited for optical cryptography. However, using random media for distribution of secret keys between remote users still remains challenging, since it requires the users have access to the same scattering system. Here we utilize random mode mixing in multimode fibres to generate and distribute keys simultaneously. Fast fluctuations in the fibre mode mixing provide the source of randomness for the key generation, and optical reciprocity guarantees that the keys at the two ends of the fibre are identical. We experimentally demonstrate the scheme using classical light and off-the-shelf components, opening the door for cost effective key establishment at the physical-layer o...

  20. Classification of birth weights based on dichotomous variables 

    E-Print Network [OSTI]

    Perry, Lynn McIver

    1980-01-01

    . Multinomial Models With Three Pred1ctor Var1ables . 12. M1sclassif1cation Probabilities . 13. Models With Four Predictor Variables ? SMOK, OH, NS, OA 10 13 15 17 29 30 36 37 40 45 14. Models With Four Predictor Variables ? SNOK, OH, NS, CYCR.... . . 46 15. Models With Four Pred1ctor Variables ? SMOK, OH, OA, CYCR. . . 47 16. Models With Four Predictor Variables ? SMOK, OH, WH, CYCR. . . 48 17. Models With Four Predictor Variables ? SMOK, NEDU, NS, OA. . . 49 18. Models With Four Predictor...