National Library of Energy BETA

Sample records for key management ckms

  1. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    SciTech Connect (OSTI)

    Duren, Mike; Aldridge, Hal; Abercrombie, Robert K; Sheldon, Frederick T

    2013-01-01

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

  3. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  4. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  5. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  6. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  7. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  8. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  9. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  10. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  11. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  12. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  13. Financial Management: The Key to Farm-Firm Business Management 

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17

    want to succeed need to de- velop a farm/ranch business plan that outlines, in detail, how they plan to generate a profit and manage business risks. They should start by outlining specific business/personal goals and objectives and preparing... should be kept from the time the plan is implemented. Financial statements and cash flow projections with ?what if? analysis should be prepared and adjusted as often as necessary to analyze risks and keep the plan on track. Successful business...

  14. Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions

    E-Print Network [OSTI]

    -hydro agency responsibilities. #12;2 Strategic Category: Hydro RM&E The following are the primary management1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following

  15. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  16. Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest management

    E-Print Network [OSTI]

    Evans, Tom

    Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest in urban settings with a specific focus on sustainable urban forest management. We conclude that urban management . Urban forest policy. Institutional analysis . Ecosystem services . Public goods . Sustainability

  17. Project Management: Key to the future success of your office

    E-Print Network [OSTI]

    a case for project management in our offices Provide an easy entry point into project management Focus, Cost, Quality, HR, Communication, Risk, Procurement, and Stakeholder Management #12;Educational Opportunities HR classes 3rd party education companies New Horizons PMI Extensive professional development

  18. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  19. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  20. Soil and Vegetation Management: Keys to Water Conservation on Rangeland 

    E-Print Network [OSTI]

    Schuster, Joseph L.

    2001-01-11

    The amount of water that soaks into the soil largely determines plant productivity. We can manage and conserve water where and when it falls, and by controlling the kind of vegetation we can make the fullest use of rain ...

  1. Program management: The keys to a successful ERWM contract

    SciTech Connect (OSTI)

    Lenyk, R.G.; Cusack, J.G. [Foster Wheeler Environmental Corp., Oak Ridge, TN (United States)

    1995-12-31

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals.

  2. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  3. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr. The proposed cloud-based re-encryption model is secure, efficient, and highly scalable in a cloud computing the performance of the model. Keywords-Distributed systems, mobile computing, security. I. INTRODUCTION Cloud

  4. 64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development

    E-Print Network [OSTI]

    Rhoads, James

    64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development, integration, emphasis on the field of systems engineering. Though and evaluation. In a sense, these terms describe the five engineers with system functions can be found in almost stages -of the systems engineering

  5. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market analyses the global waste market, with particular reference to municipal solid waste (MSW). Key Note. Industrial waste generally has a greater tonnage than MSW, but its management is the responsibility

  6. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  7. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  8. Managing Business-to-Business Customer Relationships Following Key Contact Employee Turnover in a Vendor Firm

    E-Print Network [OSTI]

    Bendapudi, Neeli; Leone, Robert P.

    2002-04-01

    Customers form relationships with the employees who serve them as well as with the vendor firms these employees represent. In many cases, a customer’s relationship with an employee who is closest to them, a key contact employee, may be stronger than...

  9. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  10. Conducting a Motor Survey: Key Step for Establishing a Motor Management Policy 

    E-Print Network [OSTI]

    Miller, R. B.

    2002-01-01

    Roughly 70% of the energy consumed by manufacturing processes is used by electric motors. According to the U.S. Department of Energy, greater attention to motor systems management can reduce motor-related energy costs by 18%. Establishing a motor...

  11. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K.; Peters, Scott

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  12. Rangeland Drought Management for Texans: Planning: The Key to Surviving Drought 

    E-Print Network [OSTI]

    Hart, Charles R.; Carpenter, Bruce B.

    2001-05-02

    survival strategy. However, even survival requires that you have a plan flexible enough to deal with the individual circum- stances of each drought as it comes. What is a drought? Droughts are a part of all environments and have plagued agriculturalists... in 2 of every 5 years. How can I survive a drought? Surviving drought requires planning for it. Your plan should include strategies for finances, grazing manage- ment and stock reduction, as well as for vegetation recov- ery after the drought ends...

  13. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rachid, Caio T. C. C.; Balieiro, Fabiano C.; Fonseca, Eduardo S.; Peixoto, Raquel Silva; Chaer, Guilherme M.; Tiedje, James M.; Rosado, Alexandre S.

    2015-02-23

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments:more »monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.« less

  14. The US Department of Energy's Federal Energy Management Program (FEMP) works with key individuals to accomplish energy change within organizations

    E-Print Network [OSTI]

    Pennycook, Steve

    through energy efficiency and renewable energy projects in buildings and fleets. As a key contributor to accomplish energy change within organizations by bringing expertise from all levels of project and policy centralized project development services to FEMP. In doing so, ORNL supports the following FEMP activities

  15. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  16. 2003 Veblen, T.T. Key issues in fire regime research for fuels management and ecological restoration. Pages 259-276 in: P. Omi and L. Joyce (technical eds). Fire,

    E-Print Network [OSTI]

    Veblen, Thomas T.

    2003 Veblen, T.T. Key issues in fire regime research for fuels management and ecological restoration. Pages 259-276 in: P. Omi and L. Joyce (technical eds). Fire, Fuel Treatments and Ecological, Forest Service, Rocky Mountain Research Station. 475 p. AN INTRODUCTION TO KEY ISSUES IN FIRE REGIME

  17. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  18. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  19. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  20. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  1. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  2. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  4. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  5. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  6. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  7. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  8. Web-based energy information systems for energy management and demand response in commercial buildings

    E-Print Network [OSTI]

    Motegi, Naoya; Piette, Mary Ann; Kinney, Satkartar; Herter, Karen

    2003-01-01

    Energy Management .William R. , 2002. “Energy Management – The Last UntamedOlin, 2002. “Enterprise Energy Management Software - The Key

  9. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  10. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  11. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  12. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  13. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  14. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  15. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  16. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  17. December 2010 FACILITIES & PROPERTY MANAGEMENT

    E-Print Network [OSTI]

    change with carbon management being the key issue for many organisations. The HE sector must play itsDecember 2010 FACILITIES & PROPERTY MANAGEMENT CARBON MANAGEMENT AND SUSTAINABILITY ACTIVITIES REPORT 2009/10 #12;Contents Page · Introduction 1 · Carbon and Energy Management 3 · Waste and Recycling

  18. Service management solutions To support your IT objectives

    E-Print Network [OSTI]

    IT integrate incident, problem, change and release management. Two key components of these solutions -- IBMService management solutions To support your IT objectives management tasks. Consequently, service levels and the effectiveness of asset management suffer. Without accurate, complete, reliable data from

  19. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  20. Key Blog Distillation: Ranking Aggregates

    E-Print Network [OSTI]

    Macdonald, C.; Ounis, I.

    Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

  1. Business & Finance BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Operations Manager, Production Manager, Quality Control, Logistics Manager, Business Interpreter, Marketing, Operations Management, Commercial Law and Human Resource Management. Finance subjects include Finance Theory or public administration. Operating in international markets requires an understanding of international

  2. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  3. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  4. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  5. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  6. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  7. "Turn-Key" Open Source Software Solutions for Energy Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 28, 2013 - 12:00pm Addthis This funding opportunity is closed Buildings consume over 40% of the total energy consumption in the U.S. A significant portion of the...

  8. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Verification Protocol (IPMVP) as Option C: Whole BuildingAnalysis. However, IPMVP notes that for Option C “billing

  9. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01

    ) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost...

  10. Managing Supply Chain Key for Hawaii Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold.

  11. Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsState ofSavings forTitleJulyAmy Hollander: I'd

  12. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  13. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  14. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  15. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  16. Effects of Vegetation Structure and Elevation on Lower Keys Marsh Rabbit Density 

    E-Print Network [OSTI]

    Dedrickson, Angela

    2012-02-14

    LKMR density on lands managed by the United States Navy, Naval Air Station Key West and evaluate how vegetation structure and patch elevation effect LKMR population density. I conducted fecal pellet counts to determine LKMR density, collected...

  17. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  18. Engineering Management Postgraduate MSc Program

    E-Print Network [OSTI]

    Arnold, Anton

    Engineering Management Postgraduate MSc Program Master of Science (MSc) 3 semesters, part-time engineering.tuwien.ac.at Vienna University of Technology M ScEngine ering Manag em ent 20Years #12;Engineering Management Your key to the top engineering league This part-time MSc Program is tailor-made for the demands

  19. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  20. Management Plan Management Plan

    E-Print Network [OSTI]

    Management Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids in the Deschutes River. The Management Plan consists of five elements described in the Council's program: 1

  1. Demand-Side Management and Energy Efficiency Revisited

    E-Print Network [OSTI]

    Auffhammer, Maximilian; Blumstein, Carl; Fowlie, Meredith

    2007-01-01

    EPRI). 1984. ”Demand Side Management. Vol. 1:Overview of Key1993. ”Industrial Demand-Side Management Programs: What’sJ. Kulick. 2004. ”Demand side management and energy e?ciency

  2. Energy Risk Management 1 -Master course Instructor: Dean FANTAZZINI

    E-Print Network [OSTI]

    Kaplan, Alexander

    Energy Risk Management 1 - Master course Instructor: Dean FANTAZZINI · Course Objectives: This course introduces master students to the key issues of Energy Risk Management. The structure #12;Energy Risk Management 1 - Master course Instructor: Dean FANTAZZINI Course Outline: Financial

  3. Energy Risk Management 1 -Inter Faculty course Instructor: Dean FANTAZZINI

    E-Print Network [OSTI]

    Kaplan, Alexander

    Energy Risk Management 1 - Inter Faculty course Instructor: Dean FANTAZZINI · Course Objectives: This course introduces master students to the key issues of Energy Risk Management. The structure Clewlow and Chris Strickland. Energy Derivatives: Pricing and Risk Management (London: Lacima Publications

  4. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  5. Deere & Company Energy Management Program 

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01

    An overview of the Deere & Company Energy Management Program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  6. 5) Management 5) Management

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken & Thieret (1997) · Types of information utilized Ecological impacts #12;5) Management c) Control impacts Economic impacts #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken

  7. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  8. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  9. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  10. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  11. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  12. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  13. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  14. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  15. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  16. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  17. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  18. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  19. Session B--Maintenance of Key Biodiversity Attributes--Gray, Blackwell USDA Forest Service Gen. Tech. Rep. PSW-GTR-189. 2008. 49

    E-Print Network [OSTI]

    Session B--Maintenance of Key Biodiversity Attributes--Gray, Blackwell USDA Forest Service Gen. Tech. Rep. PSW-GTR-189. 2008. 49 The Maintenance of Key Biodiversity Attributes Through Ecosystem Restoration Operations1 Robert W. Gray2 and Bruce A. Blackwell3 Abstract The requirement to manage for key

  20. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  1. Accident management for severe accidents

    SciTech Connect (OSTI)

    Bari, R.A.; Pratt, W.T.; Lehner, J.; Leonard, M.; Disalvo, R.; Sheron, B.

    1988-01-01

    The management of severe accidents in light water reactors is receiving much attention in several countries. The reduction of risk by measures and/or actions that would affect the behavior of a severe accident is discussed. The research program that is being conducted by the US Nuclear Regulatory Commission focuses on both in-vessel accident management and containment and release accident management. The key issues and approaches taken in this program are summarized. 6 refs.

  2. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  3. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  4. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  5. Defense acquisition program manager as program leader : improving program outcomes through key competencies and relationship management

    E-Print Network [OSTI]

    Baumann, B. Marc

    2013-01-01

    The US defense acquisition system is a massive enterprise charged with developing and acquiring state-of-the-art military technology and systems. For the past 65 years, many broad-reaching studies and commissions have ...

  6. Industrial Engineering and Management Summer Term 2015

    E-Print Network [OSTI]

    Stein, Oliver

    and Management (M.Sc.) 6 2 Key Skills 7 3 Module Handbook - a helpful guide throughout the studies 10 4 ActualIndustrial Engineering and Management (M.Sc.) Summer Term 2015 Short version Date: 26.02.2015 Department of Economics and Management KIT - University of the State of Baden-Wuerttemberg and National

  7. Industrial Engineering and Management Summer Term 2015

    E-Print Network [OSTI]

    Stein, Oliver

    and Management (M.Sc.) 14 2 Key Skills 15 3 Module Handbook - a helpful guide throughout the studies 18 4 ActualIndustrial Engineering and Management (M.Sc.) Summer Term 2015 Long version Date: 26.02.2015 Department of Economics and Management KIT - University of the State of Baden-Wuerttemberg and National

  8. Managing talent flow. 2006 Energy and Resources

    E-Print Network [OSTI]

    Managing talent flow. 2006 Energy and Resources Talent Pulse Survey Report Consulting #12;Executive ................................................................ 13 Contents #12;1 Managing talent flow 2006 Energy and Resources Talent Pulse Survey Report 2006 strategy. 1 #12;2 Managing talent flow 2006 Energy and Resources Talent Pulse Survey Report Key findings

  9. SPECIAL REPORT Incurred Cost Audit Coverage of Non- Management...

    Office of Environmental Management (EM)

    Year 2015 (DOEIG-0924, October 2014). A key control for improving overall contract management and reducing the risk that unallowable costs will be incurred by contractors is...

  10. A liquid water management strategy for PEM fuel cell stacks

    E-Print Network [OSTI]

    Van Nguyen, Trung; Knobbe, M. W.

    2003-02-25

    Gas and water management are key to achieving good performance from a PEM fuel cell stack. Previous experimentation had found, and this experimentation confirms, that one very effective method of achieving proper gas and water management is the use...

  11. Manure Harvesting Frequency: The Key to Feedyard Dust Control in a Summer Drought 

    E-Print Network [OSTI]

    Auvermann, Brent W.; Parker, David B.; Sweeten, John M.

    2000-11-27

    Summer drought can make dust control in feedyards more challenging than usual. Supplemental water may not keep pace with daily evaporation. The key to dust control is managing the depth of dry manure in the pens by harvesting manure more frequently...

  12. ENTERPRISE RISK MANAGEMENT 2009 Annual Report Letter to President Emmert . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    Kaminsky, Werner

    0 ENTERPRISE RISK MANAGEMENT 2009 Annual Report #12;1 Letter to President Emmert Analysis Employment Liability Seminar . . . . . . . . . . . 13 Human Resources ­ Managing Key Risks: President Mark Emmert From: President's Advisory Committee on Enterprise Risk Management Re: UW Enterprise

  13. Management of severe accidents

    SciTech Connect (OSTI)

    Jankowski, M.W.

    1988-01-01

    The definition and the multidimensionality aspects of accident management have been reviewed. The suggested elements in the development of a programme for severe accident management have been identified and discussed. The strategies concentrate on the two tiered approaches. Operative management utilizes the plant's equipment and operators capabilities. The recovery management concentrates on preserving the containment, or delaying its failure, inhibiting the release, and on strategies once there has been a release. The inspiration for this paper was an excellent overview report on perspectives on managing severe accidents in commercial nuclear power plants and extending plant operating procedures into the severe accident regime; and by the most recent publication of the International Nuclear Safety Advisory Group (INSAG) considering the question of risk reduction and source term reduction through accident prevention, management and mitigation. The latter document concludes that active development of accident management measures by plant personnel can lead to very large reductions in source terms and risk, and goes further in considering and formulating the key issue: The most fruitful path to follow in reducing risk even further is through the planning of accident management.

  14. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  15. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  16. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  17. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  18. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  19. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  20. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  1. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  2. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  3. Deere and Company Energy Management Program 

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  4. Model and control for cooperative energy management

    E-Print Network [OSTI]

    Ranade, Vinayak V

    2010-01-01

    Proto/Amorphous Cooperative Energy Management (PACEM) aims to build and deploy a highly scalable system for smart power grids that will enable efficient demand shaping for small-user networks. Two key problems are to provide ...

  5. Integrated Energy and Greenhouse Gas Management System 

    E-Print Network [OSTI]

    Spates, C. N.

    2010-01-01

    , the results obtained and the lessons learned in developing an integrated Energy and Greenhouse Gas Management System with a major industrial manufacturing company in the Midwest. Key subject areas covered include: Integration of Climate Change and Energy...

  6. 5 Management Plan The management plan described in this section is a culmination of extraordinary efforts by the

    E-Print Network [OSTI]

    290 5 Management Plan The management plan described in this section is a culmination and synthesis into the final construct. As a result, this management plan depends upon an assimilation work together to "derive" and establish the key elements of the Management Plan. Assessment

  7. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  8. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  9. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  10. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  11. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  12. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  13. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  14. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  15. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  16. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  17. International waste management fact book

    SciTech Connect (OSTI)

    Amaya, J.P.; LaMarche, M.N.; Upton, J.F.

    1997-10-01

    Many countries around the world are faced with nuclear and environmental management problems similar to those being addressed by the US Department of Energy. The purpose of this Fact Book is to provide the latest information on US and international organizations, programs, activities and key personnel to promote mutual cooperation to solve these problems. Areas addressed include all aspects of closing the commercial and nuclear fuel cycle and managing the wastes and sites from defense-related, nuclear materials production programs.

  18. Shopping for outage management systems

    SciTech Connect (OSTI)

    Chou, Y.C.; Konneker, L.K.; Watkins, T.R.

    1995-12-31

    Customer service is becoming increasingly important to electric utilities. Outage management is an important part of customer service. Good outage management means quickly responding to outages and keeping customers informed about outages. Each outage equals lost customer satisfaction and lost revenue. Outage management is increasingly important because of new competition among utilities for customers, pressure from regulators, and internal pressure to cut costs. The market has several existing software products for outage management. How does a utility judge whether these products satisfy their specific needs? Technology is changing rapidly to support outage management. Which technology is proven and cost-effective? The purpose of this paper is to outline the procedure for evaluating outage management systems, and to discuss the key features to look for. It also gives our opinion of the features that represent state of the art. This paper will not discuss specific products or list vendors names.

  19. NIST Interagency Report 7609 Cryptographic Key

    E-Print Network [OSTI]

    and public welfare by providing technical leadership for the nation's measurement and standards include the development of technical, physical, administrative, and management standards and guidelines of Standards and Technology Gaithersburg, MD 20899-8930 January 2010 U.S. Department of Commerce Gary Locke

  20. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    DomesticWater Stormwater Management 26 Research, Education & Civic Engagement Research & Education Student conservation, and research, education, and civic engagement. In addition to providing further statistical since 2008, even with the addition of more than 560,000 square feet of building space. · Electricity

  1. Energy Efficiency Improvement and Cost Saving Opportunities for the Fruit and Vegetable Processing Industry. An ENERGY STAR Guide for Energy and Plant Managers

    E-Print Network [OSTI]

    Masanet, Eric

    2008-01-01

    Energy monitoring systems are key tools that play an important role in energy management. Energy monitoring systems

  2. Storage resource manager

    SciTech Connect (OSTI)

    Perelmutov, T.; Bakken, J.; Petravick, D.; /Fermilab

    2004-12-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management on shared storage components on the Grid[1,2]. SRMs support protocol negotiation and reliable replication mechanism. The SRM standard supports independent SRM implementations, allowing for a uniform access to heterogeneous storage elements. SRMs allow site-specific policies at each location. Resource Reservations made through SRMs have limited lifetimes and allow for automatic collection of unused resources thus preventing clogging of storage systems with ''orphan'' files. At Fermilab, data handling systems use the SRM management interface to the dCache Distributed Disk Cache [5,6] and the Enstore Tape Storage System [15] as key components to satisfy current and future user requests [4]. The SAM project offers the SRM interface for its internal caches as well.

  3. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  4. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  5. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  6. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  7. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  8. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  9. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  10. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  11. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  12. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  13. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  14. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  15. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  16. FAQS Qualification Card- Aviation Manager

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  17. FAQS Qualification Card- Construction Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  18. FAQS Qualification Card – Emergency Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  19. FAQS Qualification Card – Waste Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  20. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  1. Aspects of Key Largo woodrat ecology 

    E-Print Network [OSTI]

    McCleery, Robert Alan; Lopez, Roel R.

    2004-09-30

    population has declined even within protected areas (Frank et al. 1997, USFWS 1999). Still, little is known about KLWR ecology and what may be causing its decline. Feral cats (Felix domestica, Humphrey 1992, Frank et al. 1997, USFWS 1999 ), fire ants... of 26, 42, and 30 also suggest the original estimate of 106 was likely an overestimation of the population. MANAGEMENT IMPLICATIONS No clear evidence has been found to explain the decline of the KLWR. Feral cats (Felix domestica, Humphrey 1992...

  2. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    SciTech Connect (OSTI)

    Clayton, Dwight A.; Poore, III, Willis P.

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Mark I plant for those instrumentation systems considered most important for accident management purposes.

  3. Statistical methods for nuclear material management

    SciTech Connect (OSTI)

    Bowen W.M.; Bennett, C.A.

    1988-12-01

    This book is intended as a reference manual of statistical methodology for nuclear material management practitioners. It describes statistical methods currently or potentially important in nuclear material management, explains the choice of methods for specific applications, and provides examples of practical applications to nuclear material management problems. Together with the accompanying training manual, which contains fully worked out problems keyed to each chapter, this book can also be used as a textbook for courses in statistical methods for nuclear material management. It should provide increased understanding and guidance to help improve the application of statistical methods to nuclear material management problems.

  4. Problem and Preferred Management Practices Identification Workshop

    SciTech Connect (OSTI)

    Patchen, Douglas G.

    2003-03-10

    The goals for this workshop were: to introduce key players in the Appalachian basin oil industry to DOE's new Preferred Upstream Management Practices (PUMP) program; to explain the various elements of our two-year project in detail; to transfer technology through a series of short, invited talks; to identify technical problems and best management practices; and to recruit members for our Preferred Management Practices (PMP) Council.

  5. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management . . . . . . . . . . . . . . . . . . . . .Distributed Energy Management . . . . . . . . . . . . . . .Energy Management . . . . . . . . . . . . . . . . . . . . .

  6. Operational Risk Management: Added Value of Advanced Methodologies

    E-Print Network [OSTI]

    Maume-Deschamps, Véronique

    Operational Risk Management: Added Value of Advanced Methodologies Paris, September 2013 Bertrand HASSANI Head of Major Risks Management & Scenario Analysis Santander UK Disclaimer: The opinions, ideas Measurement Key statements 1. Risk management moto: Si Vis Pacem Para Belum 1. Awareness 2. Prevention 3

  7. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework Computer Security Enterprise Risk Key activities in managing enterprise-level risk--risk resulting from the operation on a continuous basis #12;NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Risk Management Framework Security Life

  8. Achieving Flexibility and Performance for Packet Forwarding and Data Center Management

    E-Print Network [OSTI]

    Moon, Daekyeong

    2010-01-01

    2.2 Data Center Networking6 Ripcord: Platform for Data Center Routing and ManagementKey Criteria for Data Center Networking . . . . . . . . . .

  9. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  10. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  11. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  12. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  13. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  14. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  15. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  16. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  17. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  18. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  19. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  20. Managing work-life policies in the European workplace: explorations for future research 

    E-Print Network [OSTI]

    den Dulk, Laura; Peper, Bram

    2009-01-01

    In this paper we focus on the implementation and management of work-life policies in the workplace and the key role of managers in this context. We review the existing literature, enabling us to set a research agenda focused ...

  1. Chapter 212: Role of Standardization in Technology Development, Transfer, Diffusion and Management

    E-Print Network [OSTI]

    Bagby, John

    . Successful IT standardization exhibits demand side economies of scale. This is a form of bandwagon effectChapter 212: Role of Standardization in Technology Development, Transfer, Diffusion and Management and technology management. Key Words Antitrust; Conformity Assessment; Intellectual Property; Standards

  2. Lecturer, Management Lally School of Management

    E-Print Network [OSTI]

    Salama, Khaled

    Lecturer, Management Lally School of Management Rensselaer Polytechnic Institute The enterprise management and organization area of The Lally School of Management at Rensselaer Polytechnic Institute degree equivalent in management, strategy, organization behavior, or an appropriate related field

  3. Roles of Officers in Respect to Risk Management Policy and Procedures Commencement Date: 18 October, 2000

    E-Print Network [OSTI]

    Roles of Officers in Respect to Risk Management Policy and Procedures Commencement Date: 18 October Nil 5. POLICY STATEMENT 5.1 University-Wide Risk Management Plan There shall be a University wide Risk. The Risk Management Plan will examine the expected key outcomes for the University and assess, manage

  4. project management

    National Nuclear Security Administration (NNSA)

    3%2A en Project Management and Systems Support http:www.nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  5. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  6. Twin Cities Campus Office of Classroom Management Academic Support Resources

    E-Print Network [OSTI]

    Ciocan-Fontanine, Ionut

    Technical Services Technology standards, planning, design, installation & maintenance Campus AV experts coordination, planning, and technology. Key areas include classroom space utilization, classroom standards physical standards, service levels, and room readiness FF&E standards and management Coordination

  7. Human Resource Management: Employee Attraction and Selection Guide 

    E-Print Network [OSTI]

    Fogleman, Sarah L.; Anderson, David P.; McCorkle, Dean

    2009-04-08

    Successful managers know that recruiting and training key personnel is critical to the health of any business. This publication discusses the five steps to recruiting and selecting the best employees....

  8. Proper Lagoon Management to Reduce Odor and Excessive Sludge Accumulation 

    E-Print Network [OSTI]

    Mukhtar, Saqib

    1999-10-19

    Proper management techniques to reduce odor and excessive sludge accumulation include maintaining pH and salt levels, pumping regularly, maintaining adequate bacteria levels, and designing for efficiency. Definitions of key words are boxed for easy...

  9. Quality Management Systems for Zero Energy Ready Home Webinar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    quality management system? And again, I'm not going to spend all the time here. It takes multi-day training from ISO 9001 to go into all of it. But there are some of the key parts...

  10. Managing the Risks of Climate Change and Terrorism

    SciTech Connect (OSTI)

    Rosa, Eugene; Dietz, Tom; Moss, Richard H.; Atran, Scott; Moser, Susanne

    2012-04-07

    The article describes challenges to comparative risk assessment, a key approach for managing uncertainty in decision making, across diverse threats such as terrorism and climate change and argues new approaches will be particularly important in addressing decisions related to sustainability.

  11. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  12. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  13. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  14. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  15. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  16. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  17. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  18. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  19. Constrained marine resource management

    E-Print Network [OSTI]

    Murray, Jason Hastings

    2007-01-01

    areas as a risk management tool A. Introduction . . . . .1. Effort management without Technologicalwith Technological Progress Under Effort Management F.

  20. Effective risk management

    SciTech Connect (OSTI)

    Ball, C.J. [Corpfinance International Ltd., Toronto (Canada)

    1997-01-01

    Most independent power financial proposals contain one or more elements of a non-recourse nature. Traditionally, this means prospective lenders will not have a substantial corporate credit or state guarantee standing behind a project loan, which forces attention to be focused on a single asset as the security and debt repayment source. While this major risk remains present, if properly understood, uncertainty can be mitigated and managed, including financial and development hazards inherent in hydropower projects. The specific risk points that a project developer or sponsor must satisfy from the lender`s purposes are numerous. However, they can be grouped primarily into seven key risk areas: project profile, site securing, power sales agreements, government agreements, in-service management, construction and insurance. While a developer strives for a minimum internal rate of return of at least 20 percent, the lender`s expectations are much more modest. Often, developers need to place themselves in the proverbial shoes of the other entity, namely the independent lender, whose only attraction may be some interest, fee income and placement of capital in a safe investment which provides a return in an orderly and uninterrupted manner. Only then is it possible to objectively view and effectively manage the risks mentioned earlier.

  1. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  2. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  3. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  4. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  5. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  6. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  7. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  8. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  9. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  10. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  11. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  12. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  13. A Key Management Scheme in Distributed Sensor Networks Using Attack Probabilities

    E-Print Network [OSTI]

    Poovendran, Radha

    , Radha Poovendran and Ming-Ting Sun spchan@u.washington.edu, {radha,sun}@ee.washington.edu Department such as real-time traffic monitoring, mili- tary sensing and tracking, wildlife monitoring and tracking, etc

  14. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: Apple

  15. "Turn-Key" Open Source Software Solutions for Energy Management of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12 Beta-3 Racetracks Y-12 Beta-3of thePolicies Act of 1978

  16. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  17. Time Management Managing Time and Tasks

    E-Print Network [OSTI]

    Kunkle, Tom

    Time Management Managing Time and Tasks What is time management? Time can't be managed ­ but you can manage the amount of time you use each day for fun, work, rest, and time spent with others. Why is time management important? You have responsibilities to yourself, to your family and friends, to your

  18. Palouse Subbasin Management Plan 3. Management Plan

    E-Print Network [OSTI]

    Palouse Subbasin Management Plan 3. Management Plan FINAL DRAFT ~ May 2004 Project Lead: Palouse-Rock Lake Conservation District Trevor Cook, Project Manager PO Box 438 St. John WA 99171 (509) 648;Palouse Subbasin Plan: MANAGEMENT PLAN Management Plan: Page 3 - 1 3. Management Plan 3.1 Background

  19. FAQS Qualification Card – Technical Program Manager

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  20. FAQS Qualification Card – Senior Technical Safety Manager

    Office of Energy Efficiency and Renewable Energy (EERE)

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  1. FAQS Qualification Card – Facility Maintenance Management

    Office of Energy Efficiency and Renewable Energy (EERE)

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  2. Ph.D. Positions in "ICT for Sustainable Energy Management"

    E-Print Network [OSTI]

    Teschner, Matthias

    -edge applications for energy efficiency. We are developing and evaluating distributed systems for monitoring of complex systems Background in energy management and power systems is considered a plus Interest Ph.D. Positions in "ICT for Sustainable Energy Management" Key words: distributed information

  3. Inspiring research transforming scholarship Digital Asset Management concerns

    E-Print Network [OSTI]

    Applebaum, David

    Inspiring research ­ transforming scholarship Digital Asset Management concerns the processes in organisations. Effective digital asset management is a key factor for the future success of content industries such as libraries, archives and museums. The Department of Digital Humanities (DDH) is part of the School of Arts

  4. MANAGEMENT OF GROUNDWATER IN SALT WATER INGRESS COASTAL AQUIFERS

    E-Print Network [OSTI]

    Kumar, C.P.

    MANAGEMENT OF GROUNDWATER IN SALT WATER INGRESS COASTAL AQUIFERS C. P. Kumar Scientist `E1 dealing with exploitation, restoration and management of fresh groundwater in coastal aquifers, the key is disturbed by groundwater withdrawals and other human activities that lower groundwater levels, reduce fresh

  5. Managing Performance Testing with Release Certification and Data Correlation

    E-Print Network [OSTI]

    Csallner, Christoph

    Managing Performance Testing with Release Certification and Data Correlation Tuli Nivas Performance@uta.edu ABSTRACT Performance testing is a key element of industrial software development. While basic performance testing concepts are well understood, it is less clear how to manage performance tests in practice. I

  6. Economic Principles of Wildland Fire Management Policy1

    E-Print Network [OSTI]

    Economic Principles of Wildland Fire Management Policy1 Hayley Hesseln,2 Douglas B. Rideout3 and the growing number of regulations and laws. Key economic principles, such as the Coase Theorem, are developed in the context of contemporary policies and institutions. Economic principles of specific management situations

  7. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  8. Computerized training management system

    DOE Patents [OSTI]

    Rice, Harold B. (Franklin Furnace, OH); McNair, Robert C. (East Setauket, NY); White, Kenneth (Shirley, NY); Maugeri, Terry (Wading River, NY)

    1998-08-04

    A Computerized Training Management System (CTMS) for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base.RTM., an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches.

  9. Computerized training management system

    DOE Patents [OSTI]

    Rice, H.B.; McNair, R.C.; White, K.; Maugeri, T.

    1998-08-04

    A Computerized Training Management System (CTMS) is disclosed for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base{trademark}, an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches. 18 figs.

  10. Economic Life Cycle Assessment as element of sustainability certification – a key success factor moving beyond Life Cycle Costing 

    E-Print Network [OSTI]

    Trinius, W.; Hirsch, H.

    2009-01-01

    Lakenbrink, DU Diederichs Project Management, Munich, Germany Title Economic Life Cycle Assessment as element of sustainability certification ? a key success factor moving beyond Life Cycle Costing The move from considering environmental impacts... on sustainability of construction works, and relating to the emerging European standards in this field, the recently established German Sustainable Building Council (GeSBC / DGNB) presented a certification scheme applying a holistic life cycle model. While...

  11. Managing the Management: CORBAbased Instrumentation of Management Systems

    E-Print Network [OSTI]

    Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network Management Team Department of Computer Science, TU MË? unchen Arcisstr. 21, D­80333 Munich, Germany akeller@ieee.org Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM'99), Boston

  12. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  13. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  14. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  15. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  16. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  17. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  18. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  19. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  20. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  1. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  2. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  3. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  4. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  5. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  6. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  7. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  8. Energy: Critical Infrastructure and Key Resources Sector-Specific...

    Office of Environmental Management (EM)

    of the National Infrastructure Protection Plan (NIPP) Base Plan, a comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and...

  9. Together with Key Allies, DOE Launches New Data Collaborative...

    Office of Environmental Management (EM)

    streamline the complex and difficult process of managing and standardizing building energy data. "There is an unprecedented amount of new data as cities and states, across the...

  10. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  11. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    management assessments. Management assessment results mustbe documented. WMG management must take prompt action tolegal advice to Laboratory management, periodically conducts

  12. Management'': Sunderraman

    E-Print Network [OSTI]

    Brass, Stefan

    INFSCI 2710 ``Database Management'': B. Oracle SQL*Plus B­1 Appendix B: Oracle SQL*Plus I have used: Oracle/SQL Tutorial, 1999. http://www.db.cs.ucdavis.edu/teaching/sqltutorial/ . Stefan Brass: Skript zur Vorlesung Informationssysteme (in German), UniversitË? at Hildesheim, 1996/97. . SQL*Plus User's Guide

  13. Part Two ATM Traffic Management and Control A Comparative Performance Analysis of Call Admission Control

    E-Print Network [OSTI]

    Elsayed, Khaled Fouad

    -mail: hp@eos.ncsu.edu Key words: Call Admission Control, Traffic Management, ATM Networks, Quality (which is typically a workstation attached to the switch). The resource manager controls the operations113 Chapter 5 Part Two ATM Traffic Management and Control A Comparative Performance Analysis

  14. Division of IT Convergence Engineering Optimal Demand-Side Energy Management Under

    E-Print Network [OSTI]

    Boutaba, Raouf

    Division of IT Convergence Engineering Optimal Demand-Side Energy Management Under Real-time Demand and wastage through better demand-side management and control is considered a key solution ingredient of appliance specific adapters. Designed and implemented GHS Modeled the demand-side energy management

  15. On The Design and Implementation of a Home Energy Management System

    E-Print Network [OSTI]

    Boutaba, Raouf

    On The Design and Implementation of a Home Energy Management System Jian Li, Jae Yoon Chung, Jin energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the design and implementation of Green Home Service (GHS) for home energy management. Our approach addresses

  16. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  17. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  18. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  19. Environmental Engineering and Management

    E-Print Network [OSTI]

    Mirza, Umar Karim

    2001-01-01

    Review: Environmental Engineering and Management By J.M.H. Power (Eds. ). Environmental Engineering and Management.Conference on Environmental Engineering and Management,

  20. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    OIA/OCA/assurance-sys/IA/index.html Management Program, R-3 • Environmental Management System Plan References 30.targets, and Environmental Management Programs 6. Structure

  1. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  2. Presented by FACILITIES MANAGEMENT

    E-Print Network [OSTI]

    Meyers, Steven D.

    Presented by FACILITIES MANAGEMENT TRANSFORMING USF'S TAMPA CAMPUS SUMMER 2011 #12; WELCOME Facili:es Management #12; Facili:es Management #12; NEW CONSTRUCTION Facili

  3. Stargate: Energy Management Techniques

    E-Print Network [OSTI]

    Vijay Raghunathan; Mani Srivastava; Trevor Pering; Roy Want

    2004-01-01

    Stargate: Energy Management Techniques Vijay Raghunathan,Platform specific energy management is crucial for longSolution: System level energy management techniques and

  4. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    430.2B mandates an energy management program that considersSTAR® or Federal Energy Management Programs, and USDA-Environmental, Energy, and Transportation Management (

  5. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

  6. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  7. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  8. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    #12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

  9. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  10. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  11. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  12. Environmental Management System Plan

    SciTech Connect (OSTI)

    Fox, Robert; Thorson, Patrick; Horst, Blair; Speros, John; Rothermich, Nancy; Hatayama, Howard

    2009-03-24

    Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management establishes the policy that Federal agencies conduct their environmental, transportation, and energy-related activities in a manner that is environmentally, economically and fiscally sound, integrated, continually improving, efficient, and sustainable. The Department of Energy (DOE) has approved DOE Order 450.1A, Environmental Protection Program and DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management as the means of achieving the provisions of this Executive Order. DOE Order 450.1A mandates the development of Environmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: (1) Protect the air, water, land, and other natural and cultural resources potentially impacted by facility operations; (2) Meet or exceed applicable environmental, public health, and resource protection laws and regulations; and (3) Implement cost-effective business practices. In addition, the DOE Order 450.1A mandates that the EMS must be integrated with a facility's Integrated Safety Management System (ISMS) established pursuant to DOE P 450.4, 'Safety Management System Policy'. DOE Order 430.2B mandates an energy management program that considers energy use and renewable energy, water, new and renovated buildings, and vehicle fleet activities. The Order incorporates the provisions of the Energy Policy Act of 2005 and Energy Independence and Security Act of 2007. The Order also includes the DOE's Transformational Energy Action Management initiative, which assures compliance is achieved through an Executable Plan that is prepared and updated annually by Lawrence Berkeley National Laboratory (LBNL, Berkeley Lab, or the Laboratory) and then approved by the DOE Berkeley Site Office. At the time of this revision to the EMS plan, the 'FY2009 LBNL Sustainability Executable Plan' represented the most current Executable Plan. These DOE Orders and associated policies establish goals and sustainable stewardship practices that are protective of environmental, natural, and cultural resources, and take a life cycle approach that considers aspects such as: (1) Acquisition and use of environmentally preferable products; (2) Electronics stewardship; (3) Energy conservation, energy efficiency, and renewable energy; (4) Pollution prevention, with emphasis on toxic and hazardous chemical and material reduction; (5) Procurement of efficient energy and water consuming materials and equipment; (6) Recycling and reuse; (7) Sustainable and high-performance building design; (8) Transportation and fleet management; and (9) Water conservation. LBNL's approach to sustainable environmental stewardship required under Order 450.1A poses the challenge of implementing its EMS in a compliance-based, performance-based, and cost-effective manner. In other words, the EMS must deliver real and tangible business value at a minimal cost. The purpose of this plan is to describe Berkeley Lab's approach for achieving such an EMS, including an overview of the roles and responsibilities of key Laboratory parties. This approach begins with a broad-based environmental policy consistent with that stated in Chapter 11 of the LBNL Health and Safety Manual (PUB-3000). This policy states that Berkeley Lab is committed to the following: (1) Complying with applicable environmental, public health, and resource conservation laws and regulations. (2) Preventing pollution, minimizing waste, and conserving natural resources. (3) Correcting environmental hazards and cleaning up existing environmental problems, and (4) Continually improving the Laboratory's environmental performance while maintaining operational capability and sustaining the overall mission of the Laboratory. A continual cycle of planning, implementing, evaluating, and improving processes will be performed to achieve goals, objectives, and targets that will help LBNL carry out this policy. Each year, environmental aspects will be identified and their impacts to the environm

  13. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23

    ), nitrogen (fertilizer), pesticides, oil and grease, concrete truck washout, and construction chemicals. Who Applies for Permits? Managers should designate an employee to be responsible for applying for the proper construction permits. The USEPA has labeled... of flowing water. When materials impervious to water, such as pavement and concrete, cover the ground or when soils are compacted, runoff increases. Differences between areas with natural ground cover (before urban development) and those with impervious...

  14. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  15. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  16. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  17. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  18. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  19. Best Management Practice #1: Water Management Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  20. pre-acts -6th annual international conference of Territorial Intelligence -caENTI October 2008 1 SUSTAINABLE WATER MANAGEMENT METHODS IN HUNGARY

    E-Print Network [OSTI]

    Boyer, Edmond

    a useful sustainable water management model based on the rainwater harvesting practices. Key words: Rainwater, sustainable water management, drinking water, rainwater harvesting, cistern, precipitation practical way to meet our everyday water needs is rainwater harvesting. Practically, this water is free

  1. Environmental and managing

    E-Print Network [OSTI]

    Virginia Tech

    Environmental Education Assessing and managing visitor experiences and impacts Managing natural. A conservation worker Use your communications and management skills in an environmental organization, a government agen- cy, or in cooperative extension to enhance the environmental management. A nature guide

  2. PROJECT MANAGEMENT Professional Organizations

    E-Print Network [OSTI]

    Acton, Scott

    PROJECT MANAGEMENT Professional Organizations: Association of Collegiate Computing Services) Project Management Institute (PMI) Events & Training: UVA Local Support Partners (LSP) program training Project Management Institute webinars Project Management Institute events Scrum Alliance events Learning

  3. PROJECT MANAGEMENT Professional Organizations

    E-Print Network [OSTI]

    Acton, Scott

    PROJECT MANAGEMENT Professional Organizations: Project Management Institute International Association of Project and Program Management (IAPPM) Events & Training: UVa Center for Leadership Excellence classes SkillSoft classes PMO Symposium through PMI Project Management Institute (PMI) webinars American

  4. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  5. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  6. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  7. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  8. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  9. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  10. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  11. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  12. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  13. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  14. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  15. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  16. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  17. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  18. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  19. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  20. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  1. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  2. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  3. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  4. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  5. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  6. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  7. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  8. Keys To Profitable Cotton Production in the Coastal Bend. 

    E-Print Network [OSTI]

    Ashlock, Lanny; Metzer, Robert B.

    1979-01-01

    . If a thorough stalk destruction program is not carried out, benefits of the pest management program can be nul lified. Disease Control Treat seed with one of the following protectant fungicides: Table 1. Protectant fungicides for treating...

  9. DEACTIVATION MANAGEMENT

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About UsEnergyofSoftware Engineering Institute | DepartmentAugust8,,MANAGEMENT The

  10. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars perManagement Council Emilio Bunel

  11. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars perManagement Council Emilio

  12. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  13. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  14. Emergency Management Guide EMERGENCY MANAGEMENT GUIDE

    E-Print Network [OSTI]

    Dahlquist, Kam D.

    Emergency Management Guide #12;EMERGENCY MANAGEMENT GUIDE TABLE OF CONTENTS EXECUTIVE SUMMARY 2 Emergency Management Guide provides guidance to the LMU community to prevent, plan for and respond to events, property, financial condition and reputation of the University. The LMU Emer- gency Management Guide

  15. Recommended Practice for Patch Management of Control Systems

    SciTech Connect (OSTI)

    Steven Tom; Dale Christiansen; Dan Berrett

    2008-12-01

    A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

  16. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  17. Successes in School Energy Management - Energy Monitoring 

    E-Print Network [OSTI]

    Corbitt, C.

    2012-01-01

    stream_source_info ESL-KT-12-10-27.pdf.txt stream_content_type text/plain stream_size 2031 Content-Encoding ISO-8859-1 stream_name ESL-KT-12-10-27.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Successes in School... Energy Management ? Energy Monitoring Chad Corbitt, CEM, ATEM Energy Manager, Klein ISD jcorbitt1@kleinisd.net Wednesday, October 10, 2012 Keys to Energy Monitoring ? Develop an Energy Monitoring plan ? Define the why, what, how and who...

  18. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  19. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  20. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  1. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  2. Research on Commercial Patterns of China Existing Building Energy Retrofit Based on Energy Management Contract 

    E-Print Network [OSTI]

    Han, Z.; Liu, C.; Sun, J.

    2006-01-01

    Existing building energy retrofit is one of the keys of building energy efficiency in China. According to experience in developed countries, implementation of energy management contract (EMC) is crucial to promote existing building energy retrofit...

  3. Subsurface Flow Management and Real-Time Production Optimization using Model Predictive Control 

    E-Print Network [OSTI]

    Lopez, Thomas Jai

    2012-02-14

    One of the key challenges in the Oil & Gas industry is to best manage reservoirs under different conditions, constrained by production rates based on various economic scenarios, in order to meet energy demands and maximize profit. To address...

  4. An exploration of supply chain management practices in the aerospace industry and in Rolls-Royce

    E-Print Network [OSTI]

    Tiwari, Mohit

    2005-01-01

    This thesis is a part of the Supply Chain 2020 research project which seeks to study best practices in supply chain management in multiple industries in order to develop a deeper understanding of key principles and practices ...

  5. Reverse supply chain forecasting and decision modeling for improved inventory management

    E-Print Network [OSTI]

    Petersen, Brian J. (Brian Jude)

    2013-01-01

    This thesis details research performed during a six-month engagement with Verizon Wireless (VzW) in the latter half of 2012. The key outcomes are a forecasting model and decision-support framework to improve management of ...

  6. System team composition for a complex system to enable integration and attribute management

    E-Print Network [OSTI]

    Krishnaswami, Ram, 1966-

    2004-01-01

    The automatic transmission is a very complex system in a modern automobile with several hundred components performing mechanical, hydraulic and electronic functions. System integration and attribute management are key ...

  7. Supplier relationship management best practices applied to the manufacture of a helicopter airframe in China

    E-Print Network [OSTI]

    King, R. Jon (Ralph Jon)

    2009-01-01

    Sikorsky's recently begun program to manufacture the S-76 helicopter airframe at a supplier in China is examined as a case study of supplier relationship management. Best practices and key principles from the literature ...

  8. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  9. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  10. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  11. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  12. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  13. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  14. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  15. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  16. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  17. Key regulatory drivers affecting shipments of mixed transuranic waste from Los Alamos National Laboratory to the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Schumann, P.B.; Bacigalupa, G.A.; Kosiewicz, S.T.; Sinkule, B.J.

    1997-02-01

    A number of key regulatory drivers affect the nature, scope, and timing of Los Alamos National Laboratory`s (LANL`s) plans for mixed transuranic (MTRU) waste shipments to the Waste Isolation Pilot Plant (WIPP), which are planned to commence as soon as possible following WIPP`s currently anticipated November, 1997 opening date. This paper provides an overview of some of the key drivers at LANL, particularly emphasizing those associated with the hazardous waste component of LANL`s MTRU waste (MTRU, like any mixed waste, contains both a radioactive and a hazardous waste component). The key drivers discussed here derive from the federal Resource Conservation and Recovery Act (RCRA) and its amendments, including the Federal Facility Compliance Act (FFCAU), and from the New Mexico Hazardous Waste Act (NMHWA). These statutory provisions are enforced through three major mechanisms: facility RCRA permits; the New Mexico Hazardous Waste Management Regulations, set forth in the New Mexico Administrative Code, Title 20, Chapter 4, Part 1: and compliance orders issued to enforce these requirements. General requirements in all three categories will apply to MTRU waste management and characterization activities at both WIPP and LANL. In addition, LANL is subject to facility-specific requirements in its RCRA hazardous waste facility permit, permit conditions as currently proposed in RCRA Part B permit applications presently being reviewed by the New Mexico Environment Department (NNED), and facility-specific compliance orders related to MTRU waste management. Likewise, permitting and compliance-related requirements specific to WIPP indirectly affect LANL`s characterization, packaging, record-keeping, and transportation requirements for MTRU waste. LANL must comply with this evolving set of regulatory requirements to begin shipments of MTRU waste to WIPP in a timely fashion.

  18. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  19. 8 Management Plan Introduction

    E-Print Network [OSTI]

    312 8 Management Plan Introduction The management plan integrates the vision for the Lower Mid and populations which form the bulk of the management plan is derived from that input. The scope of the management and inventory are designed and may be used to guide restoration and management actions by many parties under

  20. Approved Module Information for EM4002, 2014/5 Module Title/Name: Strategic Management Module Code: EM4002

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for EM4002, 2014/5 Module Title/Name: Strategic Management Module Code: The purpose of this module is to introduce students to the concepts and techniques of strategic management: * demonstrate their understanding of key terms and concepts of strategic management * undertake strategic

  1. A near-Zero Run-time Energy Overhead within a Computation Outsourcing Framework for Energy Management in Mobile Devices

    E-Print Network [OSTI]

    Helal, Abdelsalam

    incurring a near-Zero run-time overhead. Key Words- Energy Management, Outsourcing, Smart Spaces, Energy Monitor, Battery Monitor. 1. Introduction Energy/Power management in mobile devices has been and continues and therefore their energy consumption must be managed. The energy problem has been and continues to be tackled

  2. Abstract--Smart Grid technology appears necessary to succeed in activating the demand through demand side management

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    demand side management (DSM) programs. This would in turn improve energy efficiency and achieve is envisioning. Index Terms-- Demand-Side Management; Dynamic Pricing; Generation Mix; Isolated Market-grid technology is a key component in the development of demand-side management schemes. As underlined by many

  3. Extending the Horizons: Environmental Environmental Excellence as Key to Improving Operations.

    E-Print Network [OSTI]

    Corbett, C. J.; Klassen, R. D.

    2006-01-01

    competitive advantage. Strategic Management Journal. 15(Freeman, R.E. , 1984. Strategic Management: A Stakeholderbalanced scorecard as a strategic management system. Harvard

  4. Virginia Commonwealth University Facilities Management

    E-Print Network [OSTI]

    Hammack, Richard

    .3 Solid Waste Management 14 018.4 Pest Management Plan 14 Facilities Management Construction & Design Virginia Commonwealth University Facilities Management Construction & Design Construction Management (804) 6285199 VCU Construction & Inspection Management jghosh

  5. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a...

  6. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and...

  7. DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan

    E-Print Network [OSTI]

    DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan DRAFT May 25 2004 Group 5. FIFTEENMILE SUBBASIN MANAGEMENT PLAN Management Plans

  8. Decision support for disaster management

    E-Print Network [OSTI]

    Rolland, Erik; Patterson, Raymond A.; Ward, Keith; Dodin, Bajis

    2010-01-01

    of the disaster management organizations. Therefore, thishybrid meta-heuristics. Keywords Disaster management . Meta-heuristics . Project management . Scheduling . Decision

  9. Essays on University Technology Management

    E-Print Network [OSTI]

    Drivas, Kyriakos

    2011-01-01

    of university technology management and their implicationson University Technology Management by Kyriakos Drivas Aon University Technology Management by Kyriakos Drivas

  10. Summary - Environmental Management Waste Management Facility...

    Office of Environmental Management (EM)

    Oak Ridge, TN EM Project: EM Waste Management Facility ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External...

  11. Run manager module for CORAL laboratory management

    E-Print Network [OSTI]

    Klann, Jeffrey G

    2004-01-01

    This thesis describes a new module, the Run Manager (RM), for Stanford Nanofabrication Facility's Common Object Representation for Advanced Laboratories (CORAL). CORAL is the lab manager with which MIT's Microsystems ...

  12. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  13. Fleet Management | Department of Energy

    Energy Savers [EERE]

    Property Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management...

  14. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  15. Classroom Management Study through

    E-Print Network [OSTI]

    Douches, David S.

    Classroom Management Study through Michigan State Extension What is the Incredible Years Teacher Classroom Management (IYTCM) Program? This program is an evidence-based interven4on focused on improving teachers' skills in using classroom management

  16. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  17. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  1. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  2. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  3. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  4. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  5. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  6. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  7. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  9. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  10. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  11. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  12. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  13. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  14. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  15. Plant perspective on electronic document management systems for process safety management programs

    SciTech Connect (OSTI)

    Mannan, M.; Lee, W.S. [RMT/Jones and Neuse, Inc., Austin, TX (United States)

    1996-08-01

    As mandated by the Clean Air Act Amendments of 1990, the Occupational Safety and Health Administration (OSHA) promulgated on February 24, 1992 the Process Management (PSM) rule: 29 CFR 1910.119. Compliance with the PSM requirements is causing a significant impact on both financial resources and manpower for the covered facilities. A major portion of the efforts have been concentrated on developing and compiling a vast amount of data in various formats (i.e., autocad, word processing, and numeric databases). Because of the need to access and revise these data on a continuous basis, many facilities have started to implement computer-based document management systems to store, manage, and maintain these data. This paper provides a plant perspective of the necessary features and characteristics of a computer-based document management system. An electronic document management system can also form the basis for a plant workflow system. Once, all the information related to a plant`s PSM program are inputted into the system, it is possible to control the plant workflow using the management of change system and maintenance work requests. Other key issues that must be included in a computer-based system are redlining capabilities, execution of management of change authorization, and interfacing with existing computer programs (many plants are already using different kinds of software for a variety of objectives). This paper provides a roadmap for the development and implementation of an electronic document management system.

  16. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  17. Contract/Project Management

    Office of Environmental Management (EM)

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011...

  18. Contract/Project Management

    Office of Environmental Management (EM)

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- &...

  19. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- &...

  20. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- &...

  1. Contract/Project Management

    Energy Savers [EERE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP...

  2. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final...

  3. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  4. Contract/Project Management

    Office of Environmental Management (EM)

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  5. Contract/Project Management

    Office of Environmental Management (EM)

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  6. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  7. Digital Data Management Plans

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Digital Data Management Plans Digital Data Management Plans Investigating the field of high energy physics through experiments that strengthen our fundamental understanding of...

  8. Contract/Project Management

    Energy Savers [EERE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast...

  9. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  10. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  11. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  12. Summary of key directives governing permanent disposal in a geologic repository

    SciTech Connect (OSTI)

    Sands, S.C. III

    1993-11-01

    This document was developed in support of the Idaho National Engineering Laboratory (INEL) Spent Fuel and Waste Management Technology Development Program (SF&WMTDP). It is largely comprised of flow diagrams summarizing the key regulatory requirements which govern permanent disposal in a geologic repository. The key purposes are (1) to provide an easy and effective tool for referencing or cross referencing federal directives (i.e., regulations and orders), (2) to provide a method for examining the requirements in one directive category against the requirements in another, and (3) to list actions that must be taken to ensure directive compliance. The document is categorically broken down into a Transportation section and a Mined Geologic Disposal System (MGDS) section to ensure that the interrelationship of the entire disposal system is considered. The Transportation section describes the transportation packaging requirements, testing methods, and safety requirements imposed on fissile material shipments. The MGDS section encompasses technical aspects involved in siting, licensing, waste interaction with the container, container design features, physical characteristics of the surrounding environment, facility design features, barrier systems, safety features, criticality considerations, migration restrictions, implementation guidelines, and so forth. For purposes of illustration, the worst case scenario is outlined. It is important that the approaches and considerations contained in this document be integrated into the efforts of the SF&WMTDP so that every applicable aspect of the regulatory requirements can be evaluated to avoid investing large sums of money into projects that do not take into account all of the aspects of permanent waste disposal. Not until an overall picture and clear understanding of these regulations is established can a basis be developed to govern the direction of future activities of the SF&WMTDP.

  13. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  14. Risk Management Policy 1 Risk Management Policy (December, 2014)

    E-Print Network [OSTI]

    Wapstra, Erik

    Risk Management Policy 1 Risk Management Policy (December, 2014) Risk Management Policy Responsible Governance Level Principle No. 2 - Risk Management Responsible Organisational Unit Audit & Risk CONTENTS 1 ........................................................................................................2 3.1 Effective Risk Management

  15. PERFORMANCE MANAGEMENT TIP SHEET Performance Management for New Employees

    E-Print Network [OSTI]

    PERFORMANCE MANAGEMENT TIP SHEET Performance Management for New Employees NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION UNITED STATES DEPARTMENT OF COMMERCE Workforce Management Office Ready to Perform Management at NOAA Performance Management is the process used to communicate expectations, evaluate employee

  16. High Performance Circuits for Power Management and Millimeter Wave Applications 

    E-Print Network [OSTI]

    Amer, Ahmed 1979-

    2012-01-23

    to achieve the required goals in terms of small silicon area and power consumption while at the same time achieve high performance. Four key building blocks in power management and a switchable harmonic mixer with pre-amplifier and poly-phase generator as a...

  17. Managing and Querying Transaction-time Databases under Schema Evolution

    E-Print Network [OSTI]

    Zaniolo, Carlo

    problem of managing the history of database in- formation is now made more urgent and complex by fast by intro- ducing two key pieces of new technology. The first is a method for publishing the history evolution history. 1. INTRODUCTION The ability of archiving past database information and supporting

  18. ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS

    E-Print Network [OSTI]

    ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS CEMML@cemml.colostate.edu | http://www.cemml.colostate.edu Environmental compliance and pollution prevention are critical aspects of any successful environmental program. The Center provides technical support in these key areas. CEMML

  19. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1 Stochastic Information Management in Smart Grid

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    Management in Smart Grid Hao Liang, Member, IEEE, Amit Kumar Tamang, Weihua Zhuang, Fellow, IEEE, and Xuemin electric power grid toward smart grid. A key enabler of the smart grid is the two-way communications devices, demand side management (DSM) tools, and electric vehicles (EVs) in the future smart grid

  20. Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state

    E-Print Network [OSTI]

    Painter, Kevin

    About Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state of the art knowledge in international shipping and global logistics in addition to an excellent foundation in key supply chain management concepts and logistics practice. We have a full programme of courses, site

  1. A Stochastic Approximation Method to Compute Bid Prices in Network Revenue Management Problems

    E-Print Network [OSTI]

    Topaloglu, Huseyin

    A Stochastic Approximation Method to Compute Bid Prices in Network Revenue Management Problems approximation method to compute bid prices in network revenue management problems. The key idea is to visualize the total expected revenue as a function of the bid prices and to use sample path-based derivatives

  2. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA and Finance MSc in Managing Innovation and Projects MSc in Technology and Innovation Management Research 156-157 MBA You will have at least three years' management experience in a professional work

  3. 6 Management Plan Introduction

    E-Print Network [OSTI]

    147 6 Management Plan Introduction The management plan integrates the vision for the White Salmon for restoration of fish and wildlife habitat and populations which form the bulk of the management plan is derived from that input. The scope of the management plan is somewhat narrower than the scope of the assessment

  4. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  5. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  6. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  7. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Management of National Nuclear Power Programs for assured safety

    SciTech Connect (OSTI)

    Connolly, T.J.

    1985-01-01

    Topics discussed in this report include: nuclear utility organization; before the Florida Public Service Commission in re: St. Lucie Unit No. 2 cost recovery; nuclear reliability improvement and safety operations; nuclear utility management; training of nuclear facility personnel; US experience in key areas of nuclear safety; the US Nuclear Regulatory Commission - function and process; regulatory considerations of the risk of nuclear power plants; overview of the processes of reliability and risk management; management significance of risk analysis; international and domestic institutional issues for peaceful nuclear uses; the role of the Institute of Nuclear Power Operations (INPO); and nuclear safety activities of the International Atomic Energy Agency (IAEA).

  10. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  11. Benchmarking Corporate Energy Management 

    E-Print Network [OSTI]

    Norland, D. L.

    2001-01-01

    CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company's energy management... procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy management practices...

  12. Single, Key Gene Discovery Could Streamline Production of Biofuels |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|inWestMay 13,DiscussofDepartmentManagementOEinstallation

  13. Driving change in commodity management in engineering led firms through optimization studies, modeling, and data driven decision making

    E-Print Network [OSTI]

    Weinstein, Jeremy (Jeremy Seth Benjamin)

    2006-01-01

    Engineering focused companies often find difficulty in managing costs. As the innovations begin to slow and key products are commoditized these companies often find themselves far behind their competition from a cost ...

  14. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management . . . . . . . . . . . . . . . . . . . . .116 Energy Scheduling . . . . . .Distributed Energy Management . . . . . . . . . . . . . . .

  15. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  16. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  17. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  18. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  19. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  20. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  1. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  2. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  3. Hanford Site environmental management specification

    SciTech Connect (OSTI)

    Grygiel, M.L.

    1998-06-10

    The US Department of Energy, Richland Operations Office (RL) uses this Hanford Site Environmental Management Specification (Specification) to document top-level mission requirements and planning assumptions for the prime contractors involved in Hanford Site cleanup and infrastructure activities under the responsibility of the US Department of Energy, Office of Environmental Management. This Specification describes at a top level the activities, facilities, and infrastructure necessary to accomplish the cleanup of the Hanford Site and assigns this scope to Site contractors and their respective projects. This Specification also references the key National Environmental Policy Act of 1969 (NEPA), Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), and safety documentation necessary to accurately describe the cleanup at a summary level. The information contained in this document reflects RL`s application of values, priorities, and critical success factors expressed by those involved with and affected by the Hanford Site project. The prime contractors and their projects develop complete baselines and work plans to implement this Specification. These lower-level documents and the data that support them, together with this Specification, represent the full set of requirements applicable to the contractors and their projects. Figure 1-1 shows the relationship of this Specification to the other basic Site documents. Similarly, the documents, orders, and laws referenced in this specification represent only the most salient sources of requirements. Current and contractual reference data contain a complete set of source documents.

  4. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  5. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  6. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  7. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  8. Uncertainties and severe-accident management

    SciTech Connect (OSTI)

    Kastenberg, W.E. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Severe-accident management can be defined as the use of existing and or alternative resources, systems, and actions to prevent or mitigate a core-melt accident. Together with risk management (e.g., changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-indepth safety philosophy for severe accidents. A significant number of probabilistic safety assessments have been completed, which yield the principal plant vulnerabilities, and can be categorized as (a) dominant sequences with respect to core-melt frequency, (b) dominant sequences with respect to various risk measures, (c) dominant threats that challenge safety functions, and (d) dominant threats with respect to failure of safety systems. Severe-accident management strategies can be generically classified as (a) use of alternative resources, (b) use of alternative equipment, and (c) use of alternative actions. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These include (a) uncertainty in key phenomena, (b) uncertainty in operator behavior, (c) uncertainty in system availability and behavior, and (d) uncertainty in information availability (i.e., instrumentation). This paper focuses on phenomenological uncertainties associated with severe-accident management strategies.

  9. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01

    III I II QUALITY ASSURANCE IMPLEMENTING MANAGEMENT PLAN I III SECTION 1 - MANAGEMENT Criterion 1 - Program II II WM-AND SAFETY DIVISION Waste Management Quality Assurance

  10. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01

    AND SAFETY DIVISION Waste Management Quality AssuranceII I RECORD I WM-QAIMP Waste Management Quality Assurancefor hazardous waste management that have leadership

  11. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  12. Research Data Management - Data Management Plans

    E-Print Network [OSTI]

    Collins, Anna

    2012-01-01

    -Graduate Teaching Materials for Research Data Management Adapted by Anna Collins (2012) from modules created by Lindsay Lloyd-Smith (2011) for post-graduate training in Archaeology It makes use of training materials produced by the UK Data Archive on Managing...

  13. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  14. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  15. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  16. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  17. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  18. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  19. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  20. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  1. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  2. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  3. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  4. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  5. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  6. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Optimal Energy Management in Microgrids . . . . . . . . . .Management in Microgrids . . . . . . . . . . . . . . . .Hatziargyriou, and A. Dimeas, “Microgrids management,” IEEE

  7. Extending the Horizons: Environmental Environmental Excellence as Key to Improving Operations.

    E-Print Network [OSTI]

    Corbett, C. J.; Klassen, R. D.

    2006-01-01

    1972. Is pollution profitable? Risk Management, 19(4) 9-18.of profitable pollution reduction. Management Science. 48(2)both an environmental management system (EMS) and pollution

  8. Benefits and costs of load management: a technical assistance and resource material handbook

    SciTech Connect (OSTI)

    Mueller, Ronald; Ackerman, Gary; Lau, Ronald; Patmore, James; Ma, Fred; Sechan, Neil; Schoor, Alan; Simon, Lois; Bleiweis, Bruce; Lloyd, Kevin

    1980-06-01

    This handbook will assist state regulatory authorities and electric utilities in complying with the Load Management Standard of the Public Utility Regulatory Policies Act of 1978. The handbook has two major sections. The first discusses load-management techniques in terms of equipment, customer applications, combinations of techniques, etc. Key steps for evaluating the costs and benefits of load management options also are presented. These steps are intended to sequentially eliminate ineffective load-management options as the cost-benefit calculation becomes more detailed. The second section includes up-to-date information on available load-management technologies, models for utility costing, load-management data transfer, prescreening of load-management options, and the load-management literature.

  9. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Admin Chg 1 dated 4-10-2014, supersedes DOE O 410.2.

  10. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Supersedes DOE G 413.3-7.

  11. Enabling better water management

    E-Print Network [OSTI]

    Greenslade, Diana

    CASE STUDY Enabling better water management Seasonal Streamflow Forecast Service influencing water decisions Water management decisions made with confidence Using the Bureau's streamflow forecasting, ACTEW Water confidently removed temporary water restrictions after the millennium drought. Millennium drought

  12. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  13. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  14. Management Associate I

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an analyst and advisor to an organization's manager and other managers within the organization within BPA. The position serves as a point of...

  15. Management Excellence by Sandra Waisley

    Office of Environmental Management (EM)

    Roadmap Goal 7 Achieve Excellence in Management and Leadership, www.em.doe.gov safety performance cleanup closure E M Environmental Management 1 Achieve Excellence in Management...

  16. Energy manager design for microgrids

    E-Print Network [OSTI]

    Firestone, Ryan; Marnay, Chris

    2005-01-01

    Energy Manager Design for Microgrids Hillier, F. , and G.Energy Manager Design for Microgrids Appendix A: Smart*DER:Manager Design for Microgrids Prepared for the California

  17. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    LBNL/PUB-5352, Revision 6 Waste Management QualityAssurance Plan Waste Management Group Environment, HealthRev. 6 WM QA Plan Waste Management Quality Assurance Plan

  18. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    Waste Management group organization chart. Revised to updatecurrent practices. New organization chart, roles, andManagement Group organization chart. EH&S Waste Management

  19. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  20. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  1. Conservation and drought management 

    E-Print Network [OSTI]

    Finch, Calvin

    2012-01-01

    Column by Dr. Calvin Finch, Water Conservation and Technology Center director Conservation and Drought Management WAT E R CONSERVATION & TECHNOLOGY CENTER Securing Our Water Future Water conservation and drought management are related..., but they are not the same. Water conservation is a long-term e?ort to reduce the amount of water it takes to manufacture goods, manage households and care for landscapes. Drought management is water-use rules initiated to deal with reduced water supply or increased...

  2. Toward Strategic Watershed Management

    E-Print Network [OSTI]

    Toward Strategic Watershed Management: Lessons from the Boone River Watershed Program Evaluation Resources Ecology and Management June, 2013 #12;2 Introduction Water quality is a growing problem throughout management on private and working lands. The Iowa Soybean Association (ISA) began work in the Boone River

  3. NJIT STRATEGIC ENROLLMENT MANAGEMENT

    E-Print Network [OSTI]

    NJIT STRATEGIC ENROLLMENT MANAGEMENT PLAN: FIRST STAGE YEARS 2015 TO 2020 #12;1 NJIT STRATEGIC ENROLLMENT MANAGEMENT PLAN: FIRST STAGE YEARS 2015 TO 2020 SEM AT NJIT 2015-2020 2015-2020 "Strategic addressing all aspects of the institutions mission. " - A Practical Guide to Strategic Enrollment Management

  4. Risk Management Strategy Introduction

    E-Print Network [OSTI]

    Edinburgh, University of

    Risk Management Strategy Introduction 1. The risk of adverse consequences is inherent in all activity. Dynamic enterprise will inevitably create new risks. Risk management is about ensuring that all significant relevant risks are understood and prioritised as part of normal management

  5. February 2002 RISK MANAGEMENT

    E-Print Network [OSTI]

    February 2002 RISK MANAGEMENT GUIDANCE FOR INFORMATION TECHNOLOGY SYSTEMS By Joan S. Hash, Computer is the ability to iden tify and protect critical information assets. A sound risk management pro gram-30, Risk Management Guide For Information Technology Systems, by Gary Stoneburner, Alice Goguen, and Alexis

  6. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

  7. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Supersedes DOE O 2200.13.

  8. HAZARDOUS WASTE MANAGEMENT REFERENCE

    E-Print Network [OSTI]

    Winfree, Erik

    HAZARDOUS WASTE MANAGEMENT REFERENCE GUIDE Prepared by Environment, Health and Safety Office@caltech.edu http://safety.caltech.edu #12;Hazardous Waste Management Reference Guide Page 2 of 36 TABLE OF CONTENTS Satellite Accumulation Area 9 Waste Accumulation Facility 10 HAZARDOUS WASTE CONTAINER MANAGEMENT Labeling

  9. MAINTENANCE MANAGEMENT PROFESSIONAL (MMP)

    E-Print Network [OSTI]

    Saskatchewan, University of

    MAINTENANCE MANAGEMENT PROFESSIONAL (MMP) CERTIFICATE PROGRAM & Distance Education Ron and Jane for Continuing & Distance Education Module 1--Maintenance Management Skills and Techniques latest developments and trendsModule 1 introduces the basic concepts of physical asset management and the in effective

  10. Manage Your Time 

    E-Print Network [OSTI]

    White, Lynn

    2000-06-27

    People view time in different ways, but we all could do a better job of managing our time. This publication explains three different time management tools: the 24-hour time log and chart; a self-assessment of thinking styles and time management...

  11. University of Manchester Researchers Into Management Researchers into Management

    E-Print Network [OSTI]

    Higham, Nicholas J.

    University of Manchester ­ Researchers Into Management ! ! ! ! Researchers into Management ! ! Institute of Leadership and Management Candidate Guide and Unit Requirements ! !1 Version Updated December 2013 ! Institute of Leadership & Management Candidate Guide & Unit Requirements for Level 5 Award

  12. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  13. DOE - Office of Legacy Management -- Fernald Environmental Management...

    Office of Legacy Management (LM)

    Fernald Environmental Management Project - 027 FUSRAP Considered Sites Site: Fernald Environmental Management Project (027) Designated Name: Alternate Name: Location: Evaluation...

  14. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  15. Christopher J. Martin BUSINESS MANAGEMENT

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Christopher J. Martin DIRECTOR BUSINESS MANAGEMENT Joanna M. Hutchins ADMINISTRATIVE ASSISTANT BUSINESS MANAGEMENT BUSINESS PROCESS MANAGEMENTCLUSTER MANAGERS & DIRECTORS OF FINANCIAL AFFAIRSFREEHAFER OPERATIONS #12;Christopher J. Martin DIRECTOR BUSINESS MANAGEMENT *Andrew J. Bean PHARMACY *Kristi L. Mickle

  16. A Manager's Approach to Energy Cost Management 

    E-Print Network [OSTI]

    Spencer, R. J.

    1985-01-01

    A major responsibility of management is the control and containment of operating costs. Energy costs are a major portion of the industrial budget. GM has developed a 3 phase approach to energy conservation. Phase I -Administrative Controls...

  17. Managing a Process Safety Management inspection

    SciTech Connect (OSTI)

    Mulvey, N.P. [AcuTech Consulting, Inc., Princeton, NJ (United States)

    1995-12-31

    The Occupational Safety and Health Administration (OSHA) Process Safety Management (PSM) regulations (29 CFR {section} 1910.119) have been in effect for almost three years. State level risk management programs, in New Jersey, California, and Delaware have been in effect for over six years. More recently, Nevada and Louisiana have enacted process safety management programs. These regulations have had a significant impact on all phases of plant operations, including preliminary design, construction, startup, and operations. Through proper planning and the commitment of resources, many facilities are beginning to realize the benefits of well developed PSM programs. This paper will discuss in greater detail some of these benefits, and in particular, the subject of governmental inspections of facilities for process safety management programs.

  18. Energy Management Working Group: Accelerating Energy Management 

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01

    of energy management systems (EnMS) in the industrial and commercial building sectors. EnMS can help organizations potentially conserve 10%-40% of their energy use by institutionalizing the policies, procedures and tools to systematically track, analyze...

  19. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  20. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  1. Social Impact Management Plans: Innovation in corporate and public policy

    SciTech Connect (OSTI)

    Franks, Daniel M.; Vanclay, Frank

    2013-11-15

    Social Impact Assessment (SIA) has traditionally been practiced as a predictive study for the regulatory approval of major projects, however, in recent years the drivers and domain of focus for SIA have shifted. This paper details the emergence of Social Impact Management Plans (SIMPs) and undertakes an analysis of innovations in corporate and public policy that have put in place ongoing processes – assessment, management and monitoring – to better identify the nature and scope of the social impacts that might occur during implementation and to proactively respond to change across the lifecycle of developments. Four leading practice examples are analyzed. The International Finance Corporation (IFC) Performance Standards require the preparation of Environmental and Social Management Plans for all projects financed by the IFC identified as having significant environmental and social risks. Anglo American, a major resources company, has introduced a Socio-Economic Assessment Toolbox, which requires mine sites to undertake regular assessments and link these assessments with their internal management systems, monitoring activities and a Social Management Plan. In South Africa, Social and Labour Plans are submitted with an application for a mining or production right. In Queensland, Australia, Social Impact Management Plans were developed as part of an Environmental Impact Statement, which included assessment of social impacts. Collectively these initiatives, and others, are a practical realization of theoretical conceptions of SIA that include management and monitoring as core components of SIA. The paper concludes with an analysis of the implications for the practice of impact assessment including a summary of key criteria for the design and implementation of effective SIMPs. -- Highlights: • Social impact management plans are effective strategies to manage social issues. • They are developed in partnership with regulatory agencies, investors and community. • SIMPs link assessment to ongoing management and address social and community issues. • SIMPs clarify responsibilities in the management of impacts, opportunities and risks. • SIMPs demonstrate a shift to include management as a core component of SIA practice.

  2. Master of Science in Engineering and Technology Management Engineering Management Concentration Management of Technology Concentration

    E-Print Network [OSTI]

    Selmic, Sandra

    Master of Science in Engineering and Technology Management Engineering Management Concentration Management of Technology Concentration Core Courses 21 Core Courses 6 FINC 577 Finance and Accounting for Non Management INEN 505 Manufacturing and Operations Analysis INEN 507 Engineering Administration Quantitative

  3. The management of fire-prone forests, especially within the national forests of the west, is one of the

    E-Print Network [OSTI]

    California at Berkeley, University of

    The management of fire-prone forests, especially within the national forests of the west, is one). Many forests, however, have been degraded over the past century by misguided fire management, as well fire regimes in some forest types (Covington and Moore 1994; Schoennagel et al. 2004). Key structural

  4. Parallax: Managing Storage for a Million Machines Andrew Warfield, Russ Ross, Keir Fraser, Christian Limpach, Steven Hand

    E-Print Network [OSTI]

    Hand, Steven

    Parallax: Managing Storage for a Million Machines Andrew Warfield, Russ Ross, Keir Fraser vir- tualization improves the utility, manageability, and scal- ability of large-scale environments, we believe that it is not sufficient in itself. In this paper we argue that the next key challenge

  5. Environmental Management Performance Report June 2000

    SciTech Connect (OSTI)

    EDER, D.M.

    2000-06-01

    The purpose of this report is to provide the Department of Energy Richland Operations Office (DOE-RL) a monthly summary of the Project Hanford Management Contractor's (PHMC) Environmental Management (EM) performance by Fluor Hanford (FH) and its subcontractors. In addition to project-specific information, it includes some PHMC-level data not detailed elsewhere in the report. Section A, Executive Summary, provides an executive level summary of the cost, schedule, and technical performance described in this report. It summarizes performance for the period covered, highlights areas worthy of management attention, and provides a forward look to some of the upcoming key performance activities as extracted from the PHMC baseline. The remaining sections provide detailed performance data relative to each individual Project (e.g., Waste Management, Spent Nuclear Fuels, etc.), in support of Section A of the report. Unless otherwise noted, the Safety, Conduct of Operations, and Cost/Schedule data contained herein is as of April 30, 2000. All other information is updated as of May 19, unless otherwise noted.

  6. Environmental Management Performance Report March 2000

    SciTech Connect (OSTI)

    EDER, D.M.

    2000-03-16

    The purpose of this report is to provide the Department of Energy Richland Operations Office (DOE-RL) a report of the Project Hanford Management Contractors' (PHMC) Environmental Management (EM) performance by Fluor Hanford (FH) and its subcontractors. This report is a monthly publication that summarizes the PHMC EM performance. In addition, it includes some PHMC-level data not detailed elsewhere in the report. Section A, Executive Summary, provides an executive level summary of the cost, schedule, and technical performance described in this report. It summarizes performance for the period covered, highlights areas worthy of management attention, and provides a forward look to some of the upcoming key performance activities as extracted from the PHMC baseline. The remaining sections provide detailed performance data relative to each individual mission area (e.g., Waste Management, Spent Nuclear fuels , etc.), in support of Section A of the report. A glossary of terms is provided at the end of this report for reference purposes. Unless otherwise noted, the Safety, Conduct of Operations, and Cost/schedule data contained herein is as of January 31, 2000. All other information is as of March 1, 2000.

  7. Environmental Management Performance Report May 2000

    SciTech Connect (OSTI)

    EDER, D.M.

    2000-05-01

    The purpose of this report is to provide the Department of Energy Richland Operations Office (DOE-FU) a report of the Project Hanford Management Contractors' (PHMC)' Environmental Management (EM) performance by Fluor Hanford (FH) and its subcontractors. This report is a monthly publication that summarizes the PHMC EM performance. In addition, it includes some PHMC-level data not detailed elsewhere in the report. Section A, Executive Summary, provides an executive level summary of the cost, schedule, and technical performance described in this report. It summarizes performance for the period covered, highlights areas worthy of management attention, and provides a forward look to some of the upcoming key performance activities as extracted from the PHMC baseline. The remaining sections provide detailed performance data relative to each individual Project (e.g., Waste Management, Spent Nuclear Fuels, etc.), in support of Section A of the report. A glossary of terms is provided at the end of this report for reference purposes. Unless otherwise noted, the Safety, Conduct of Operations, Metrics, and Cost/Schedule data contained herein is as of March 31, 2000. All other information is updated as noted.

  8. Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Technical Service Providers

    E-Print Network [OSTI]

    Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Management Planning Technical Guidance.Management Planning Technical Guidance. Manure and Wastewater Handling Nutrient ManagementNutrient Management ­­ Record KeepingRecord Keeping ­­ Feed ManagementFeed Management

  9. Weed Management Costs, Weed Best Management Practices, and The Roundup Ready Weed Management Program

    E-Print Network [OSTI]

    Mitchell, Paul D.

    Weed Management Costs, Weed Best Management Practices, and The Roundup Ready® Weed Management-commercial purposes by any means, provide that this copyright notice appears on all such copies. #12;1 Weed Management Costs, Weed Best Management Practices, and The Roundup Ready® Weed Management Program T.M. Hurley

  10. Sandia National Laboratories, California Chemical Management Program annual report.

    SciTech Connect (OSTI)

    Brynildson, Mark E.

    2012-02-01

    The annual program report provides detailed information about all aspects of the Sandia National Laboratories, California (SNL/CA) Chemical Management Program. It functions as supporting documentation to the SNL/CA Environmental Management System Program Manual. This program annual report describes the activities undertaken during the calender past year, and activities planned in future years to implement the Chemical Management Program, one of six programs that supports environmental management at SNL/CA. SNL/CA is responsible for tracking chemicals (chemical and biological materials), providing Material Safety Data Sheets (MSDS) and for regulatory compliance reporting according to a variety of chemical regulations. The principal regulations for chemical tracking are the Emergency Planning Community Right-to-Know Act (EPCRA) and the California Right-to-Know regulations. The regulations, the Hazard Communication/Lab Standard of the Occupational Safety and Health Administration (OSHA) are also key to the CM Program. The CM Program is also responsible for supporting chemical safety and information requirements for a variety of Integrated Enabling Services (IMS) programs primarily the Industrial Hygiene, Waste Management, Fire Protection, Air Quality, Emergency Management, Environmental Monitoring and Pollution Prevention programs. The principal program tool is the Chemical Information System (CIS). The system contains two key elements: the MSDS library and the chemical container-tracking database that is readily accessible to all Members of the Sandia Workforce. The primary goal of the CM Program is to ensure safe and effective chemical management at Sandia/CA. This is done by efficiently collecting and managing chemical information for our customers who include Line, regulators, DOE and ES and H programs to ensure compliance with regulations and to streamline customer business processes that require chemical information.

  11. Method of assessing severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.; Okrent, D.; Jae, M.; Lim, H.; Milici, T.; Park, H.; Swider, J.; Xing, L.; Yu, D. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Accident management can be defined as the innovative use of existing and or alternative resources, systems, and actions to prevent or mitigate a severe accident. A significant number of probabilistic safety assessments (PSAs) have been completed that yield the principal plant vulnerabilities. These vulnerabilities can be categorized as (1) dominant sequences with respect to core-melt frequency. (2) dominant sequences with respect to various risk measures. (3) dominant threats that challenge safety functions. (4) dominant threats with respect to failure of safety systems. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainties in key phenomena, operator behavior, system availability and behavior, and available information. This paper presents a methodology for assessing severe accident management strategies given the key uncertainties delineated at two workshops held at the University of California, Los Angeles. Based on decision trees and influence diagrams, the methodology is currently being applied to two case studies: cavity flooding in a pressurized water reactor (PWR) to prevent vessel penetration or failure, and drywell flooding in a boiling water reactor to prevent vessel and/or containment failure.

  12. International nuclear waste management fact book

    SciTech Connect (OSTI)

    Abrahms, C W; Patridge, M D; Widrig, J E

    1995-11-01

    The International Nuclear Waste Management Fact Book has been compiled to provide current data on fuel cycle and waste management facilities, R and D programs, and key personnel in 24 countries, including the US; four multinational agencies; and 20 nuclear societies. This document, which is in its second year of publication supersedes the previously issued International Nuclear Fuel Cycle Fact Book (PNL-3594), which appeared annually for 12 years. The content has been updated to reflect current information. The Fact Book is organized as follows: National summaries--a section for each country that summarizes nuclear policy, describes organizational relationships, and provides addresses and names of key personnel and information on facilities. International agencies--a section for each of the international agencies that has significant fuel cycle involvement and a list of nuclear societies. Glossary--a list of abbreviations/acronyms of organizations, facilities, and technical and other terms. The national summaries, in addition to the data described above, feature a small map for each country and some general information that is presented from the perspective of the Fact Book user in the US.

  13. Environmental Management Performance Report October 2000

    SciTech Connect (OSTI)

    EDER, D.M.

    2000-10-01

    This section provides an executive level summary of the performance information covered in this report and is intended to bring to Management's attention that information considered to be most noteworthy. All cost, schedule, milestone commitments, performance measures. and safety data is current as of August 31. Accomplishments, Issues and Integration items are current as of September 18 unless otherwise noted. The section begins with a description of notable accomplishments that have occurred since the last report and are considered to have made the greatest contribution toward safe, timely, and cost-effective clean up. Following the accomplishment section is an overall fiscal year-to-date summary analysis addressing cost, schedule, and milestone performance. Overviews of safety ensue. The next segment of the Executive Summary, entitled Critical Issues, is designed to identify the high-level challenges to achieving cleanup progress. The next section includes FY 2000 EM Management Commitment High Visibility Project Milestones and Critical Few Performance Measures. The Key Integration Activities section follows next, highlighting PHMC activities that cross contractor boundaries and demonstrate the shared value of partnering with other Site entities to accomplish the work. Concluding the Executive Summary, a forward-looking synopsis of Upcoming Planned Key Events is provided.

  14. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  15. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  16. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  17. US electric utility demand-side management, 1994

    SciTech Connect (OSTI)

    NONE

    1995-12-26

    The report presents comprehensive information on electric power industry demand-side management (DSM) activities in US at the national, regional, and utility levels. Objective is provide industry decision makers, government policy makers, analysts, and the general public with historical data that may be used in understanding DSM as it relates to the US electric power industry. The first chapter, ``Profile: US Electric Utility Demand-Side Management,`` presents a general discussion of DSM, its history, current issues, and a review of key statistics for the year. Subsequent chapters present discussions and more detailed data on energy savings, peak load reductions, and costs attributable to DSM.

  18. Radiotherapy in the management of early breast cancer

    SciTech Connect (OSTI)

    Wang, Wei

    2013-03-15

    Radiotherapy is an indispensible part of the management of all stages of breast cancer. In this article, the common indications for radiotherapy in the management of early breast cancer (stages 0, I, and II) are reviewed, including whole-breast radiotherapy as part of breast-conserving treatment for early invasive breast cancer and pre-invasive disease of ductal carcinoma in situ, post-mastectomy radiotherapy, locoregional radiotherapy, and partial breast irradiation. Key clinical studies that underpin our current practice are discussed briefly.

  19. Managing Increased Charging Demand

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing Increased Charging Demand Carrie Giles ICF International, Supporting the Workplace Charging Challenge Workplace Charging Challenge Do you already own an EV? Are you...

  20. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy...