Sample records for key management ckms

  1. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  2. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  3. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    SciTech Connect (OSTI)

    Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Aldridge, Hal [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

  4. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  5. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11T23:59:59.000Z

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  6. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  7. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  8. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  9. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  10. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  11. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  12. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  13. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  14. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  15. Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions

    E-Print Network [OSTI]

    1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we meeting biological and programmatic performance objectives established within the Columbia Basin Fish implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following

  16. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  17. Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies

    E-Print Network [OSTI]

    Kopec, Danny

    Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

  18. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada...

  19. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  20. Program management: The keys to a successful ERWM contract

    SciTech Connect (OSTI)

    Lenyk, R.G.; Cusack, J.G. [Foster Wheeler Environmental Corp., Oak Ridge, TN (United States)

    1995-12-31T23:59:59.000Z

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals.

  1. Securely Managing Cryptographic Keys used within a Cloud Environment

    E-Print Network [OSTI]

    , Co-tenancy, Distributed Management Cryptography essential to secure cloud operations Use of sound;Page 3 Cloud Service Provider (CSP) - Models Cloud Service Models Software as a Service (Saa CSP know who I am? How is my connection to cloud components protected? Administration Who

  2. Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management

    E-Print Network [OSTI]

    Foley, Simon

    Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

  3. Security Policies as the Foundation for Cryptographic

    E-Print Network [OSTI]

    Security Policies as the Foundation for Cryptographic Key Management Elaine Barker, CKMS Project to Layered Security Policies ­ From Information Management to Key Mngt. ­ From Dept. of Com. To NIST Employees · Security Domains ­ Simple to Complex · Key Management ­ Static to Configurable to Dynamic

  4. Key issues in starting a successful Demand-Side Management program

    SciTech Connect (OSTI)

    Gettings, L.K.

    1995-06-01T23:59:59.000Z

    From the perspective of an Energy Services Company (ESCO), this paper discusses several of the key issues involved in insuring a successful Demand Side Management (DSM) program. The paper focuses specifically on the need for demand side alternatives to capacity needs and the market and customer issues that effect the ultimate success of DSM programs. Among the issues discussed, an environment that is conducive to fostering and maintaining DSM is argued to be the fostering and maintaining DSM is argued to be the primary element necessary for prosperous DSM, and several aspects of the business of the local utility and the potential host customers make up the underlying components that will, if they are in place, make up the environment that will enable it to exist.

  5. BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele-

    E-Print Network [OSTI]

    Processing To meet United States Department of Energy projections, 110, 000 truckloads per day of feedstocksAgronomics BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele- ments of a production and delivery system include high-tonnage feedstocks, proven

  6. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    analyses the global waste market, with particular reference to municipal solid waste (MSW). Key NoteGlobal MSW Generation in 2007 estimated at two billion tons Global Waste Management Market between growth in wealth and increase in waste -- the more affluent a society becomes, the more waste

  7. KEY ELEMENTS FOR ECOLOGICAL PLANNING: MANAGEMENT PRINCIPLES, RECOMMENDATIONS, AND GUIDELINES FOR FEDERAL LANDS

    E-Print Network [OSTI]

    Keeton, William S.

    Ecosystem Management Project Columbia River Bioregion Campaign Science Working Group 41 South Palouse Street

  8. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  9. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  10. Conducting a Motor Survey: Key Step for Establishing a Motor Management Policy

    E-Print Network [OSTI]

    Miller, R. B.

    Roughly 70% of the energy consumed by manufacturing processes is used by electric motors. According to the U.S. Department of Energy, greater attention to motor systems management can reduce motor-related energy costs by 18%. Establishing a motor...

  11. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2014-05-28T23:59:59.000Z

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  12. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rachid, Caio T. C. C.; Balieiro, Fabiano C.; Fonseca, Eduardo S.; Peixoto, Raquel Silva; Chaer, Guilherme M.; Tiedje, James M.; Rosado, Alexandre S.

    2015-02-23T23:59:59.000Z

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments:more »monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.« less

  13. Communiquer dans un monde de normes l 125 Key words : management standards ; communication of influence ; communicational study of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    and controlled in organizations. The processes of international industrial standardization apply not only This proposal presents a communicational analysis of international management standards in the field of private the international standardization of societal security. The aim of this project is to study management standards

  14. Collaboration is the Key Strategy for the Department of Energy Environmental Management Program's Headquarters and Field Offices

    SciTech Connect (OSTI)

    Waisley, S.; Szilagyi, A. [Office of Deactivation and Decommissioning and Facility Engineering, U.S. Department of Energy, Germantown, MD (United States)

    2007-07-01T23:59:59.000Z

    This paper outlines the Office of Environmental Management (EM) Office of Deactivation and Decommissioning and Facility Engineering's (D and D/FE) program to developing and implementing innovative technologies and technical approaches, and providing technical assistance to the EM-complex. Utilizing a collaborative process, Headquarters staff, Field Federal Project Directors, and other personnel work hand-in-hand to develop a dual approach to meeting mission priorities. EM's DD/FE office approach to developing an investment portfolio of technology development and technical assistance is heavily focused on a collaborative approach of needs determinations from the field projects. Of importance is that 'Technology' is more than hardware application and development. It also encompasses processes, methods and practices for planning and for implementation of deactivation and decommissioning. Some activities through calendar year 2008 to implement this approach have been identified. More specific identification and selection of technologies for deployment will be decided during 2007. (authors)

  15. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  16. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  17. This module aims to provide students with an understanding of the underlying principles of Software Project Management, and of established techniques for the management of software projects. By introducing students to key concepts and techniques

    E-Print Network [OSTI]

    Oxford, University of

    and management systems; quality models and metrics Content Formal lectures: 24 hours (2 hours/week) Tutorial, and to requirements, risk and quality management, the module lays the foundation for their future contribution, assessment, control, resolution Quality management: characterisation of quality; quality control, assurance

  18. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  19. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  20. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  2. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  3. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  4. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  5. Financial Management: The Key to Farm-Firm Business Management 

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17T23:59:59.000Z

    and resources, should be prepared for each commodity and for the whole farm/ ranch. A long-term strategic assessment based ? on both historical data and current outlook information. This should include an assessment of government farm programs, the general... economic outlook (e.g., inflation, interest rates, taxes), specific industry/commodity outlook (trends and cycles), and technological developments. Individual enterprise budgets and a ? consolidated whole farm/ranch cash flow projection by month...

  6. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  7. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  8. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  9. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  10. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  11. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  12. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  13. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  14. Electronics - Key to Energy Control

    E-Print Network [OSTI]

    Nelson, K. P.

    1981-01-01T23:59:59.000Z

    % reduction planned by 1983. The methods and results of the TI energy management program will be presented....

  15. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Qian, Ning

    & MANAGEMENT HPM DEPARTMENT OF HEALTH POLICY & MANAGEMENT MSPH MAILMAN SCHOOL OF PUBLIC HEALTH |COLUMBIA UNIVERSITY May 2013 ISSUE 3 A Health Policy & Management Newsletter IN THIS ISSUE: HPM Q&A WITH SUSAN COHEN 9 FACULTY CORNER 11 HAVE YOU HEARD 12 HPM HIGHLIGHTS 14 HPM

  16. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  17. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  18. LRRB Pavement Management Systems Pavement Management Systems

    E-Print Network [OSTI]

    Minnesota, University of

    Survey: who is using what · Details about specific software/use · Case studies #12;Report (continued) Key Outcome ­ Matrix #12;Report (continued) Key Outcome ­ Case Studies (15 agencies) § Various levels of use Pavement Management Systems Workshop outline 1. Overview 2. Benefits 3. Elements 4. Case Studies 5

  19. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  20. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  1. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Lin, Qiao

    FULLTIME MANAGEMENT FTP FULLTIME POLICY GLOBAL GLOBAL HEALTH POLICY & MANAGEMENT HPM HAVE YOU HEARD 13 HPM HIGHLIGHTS 16 Practicum Day "understand how public health% of fulltime students entering HPM have never worked in a professional setting. To prepare students to enter

  2. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Grishok, Alla

    HPM DEPARTMENT OF HEALTH POLICY & MANAGEMENT MSPH MAILMAN SCHOOL OF PUBLIC HEALTH PTM Fall 2013 ISSUE 4 A Health Policy & Management Newsletter IN THIS ISSUE: HPM PAST & PRESENT 1 ALUMNI PROFILE 6 FACULTY CORNER 8 HAVE YOU HEARD 9 BOOK NOOK 10 HPM HIGHLIGHTS 11

  3. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Qian, Ning

    -TIME MANAGEMENT FTP FULL-TIME POLICY GLOBAL GLOBAL HEALTH POLICY & MANAGEMENT HPM DEPARTMENT OF HEALTH POLICY: WELCOME 1 MESSAGE FROM THE CHAIR 2 HPM HEALTHCARE 3 CONFERENCE STUDENT SPOTLIGHT 4 ALUMNI PROFILE 5 and your work in the healthcare field. HPM also has an important network of current students and alumni. We

  4. ABBREVIATION KEY: EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Grishok, Alla

    FULL-TIME MANAGEMENT CMPH COLUMBIA MPH GLOBAL GLOBAL HEALTH POLICY & MANAGEMENT HPM DEPARTMENT 6 HAVE YOU HEARD? 7 HPM EVENTS RECAP 8 HPM GOALS 11 HPM HIGHLIGHTS 12 Better Health Systems and quality HPM's expertise in analyzing US health policy in studying other countries' health systems while

  5. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  6. MIDDLE SNAKE SUBBASINS MANAGEMENT PLAN SUPPLEMENT PRIORITIZED IMPLEMENTATION

    E-Print Network [OSTI]

    MIDDLE SNAKE SUBBASINS MANAGEMENT PLAN SUPPLEMENT ­ PRIORITIZED IMPLEMENTATION NOVEMBER 24, 2004/Browsing..........................................................................................9 Key Limiting Factor #5: Water Quality............................................................................................................................11 Management Plan Considerations

  7. Key Blog Distillation: Ranking Aggregates

    E-Print Network [OSTI]

    Macdonald, C.; Ounis, I.

    Macdonald,C. Ounis,I. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, California, USA, October 26-30, 2008 ACM Press

  8. Development of a Soil Conservation Standard and Guidelines for OHV Recreation Management

    E-Print Network [OSTI]

    Ahmad, Sajjad

    Development of a Soil Conservation Standard and Guidelines for OHV Recreation Management, Sacramento, CA 95814 Key Terms: OHV Management, Soil Conservation Guidelines, Erosion Control, Applied Recreation Management also allowed for sustainability of trail systems and recreation opportunities. A key

  9. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  10. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16T23:59:59.000Z

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  11. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  12. State Lands Management Plan Clark Island at Cedar Key

    E-Print Network [OSTI]

    Slatton, Clint

    resources . . . . . . . . . 21. Plans for Non-renewable Natural and Cultural Resources . . . . 22 and Improvements . . . . . . . . . 4. Proximity to Significant Public Resources . . . . . . . . . . . 5 RESOURCES . . . . . . . . . . . . . . 8. Resources Listed in the Florida Natural Areas Inventory . . . . 9

  13. SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS

    E-Print Network [OSTI]

    into the IT system development life cycle, and rigorously select the products, algorithms, and protocols that meet

  14. Dynamic Encryption Key Design and Management for Embedded Systems with

    E-Print Network [OSTI]

    New South Wales, University of

    and an insecure off-chip memory. We aim to protect the data secrecy from the physical attack (for example Report UNSW-CSE-TR-201206 March 2012 THE UNIVERSITY OF NEW SOUTH WALES School of Computer Science

  15. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    District Heating Scheme. This service meets all the heating requirements by combusting municipal waste statistics, to convert energy consumption data. The totals are calculated using electricity, gas and district heating scheme* data. Year Emissions (Tonnes CO2) % change from 2005/06 2005/2006 17,400 N/A 2006/2007 15

  16. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed....

  17. Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenter Gets People Work,Amy Hollander: I'd likeFacilityby

  18. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  19. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  20. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  1. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  2. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  3. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  4. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  5. Seamless Energy Management Systems Part I: Assessment of Energy

    E-Print Network [OSTI]

    Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key to Engineer the Future Electric Energy System #12;#12;Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key Technological Requirements Final Project Report Project Faculty Team

  6. Product management in software as a service

    E-Print Network [OSTI]

    Rajasekharan, Karthikeyan

    2012-01-01T23:59:59.000Z

    Software product management within Software as a Service is key domain of interest given the recent advances in Cloud Computing. This thesis explores the product management challenges within this domain. It makes a ...

  7. Environmental Management System `We are implementing an

    E-Print Network [OSTI]

    in our Environmental Policy Statement. Specifically we will: · Comply with relevant environmental. · Publishing an environmental policy which sets out our key targets (see opposite). · EstablishingEnvironmental Management System `We are implementing an Environmental Management System to address

  8. Demand-Side Management and Energy Efficiency Revisited

    E-Print Network [OSTI]

    Auffhammer, Maximilian; Blumstein, Carl; Fowlie, Meredith

    2007-01-01T23:59:59.000Z

    EPRI). 1984. ”Demand Side Management. Vol. 1:Overview of Key1993. ”Industrial Demand-Side Management Programs: What’sJ. Kulick. 2004. ”Demand side management and energy e?ciency

  9. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  10. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  11. Chromidio: an interface for color tracking with key frames in Max and Nato

    E-Print Network [OSTI]

    Tucker, Amy Rebecca

    2002-01-01T23:59:59.000Z

    11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

  12. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  13. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  14. Deere & Company Energy Management Program 

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01T23:59:59.000Z

    An overview of the Deere & Company Energy Management Program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  15. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  16. Environmental Management

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  17. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  18. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  19. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  20. Student Survey Management Group The Student Survey Management Group, which reports to the Learning and Teaching Board via the Student Learning

    E-Print Network [OSTI]

    Greenaway, Alan

    Student Survey Management Group The Student Survey Management Group, which reports to the Learning are appropriately timed and "survey fatigue" is minimised. Key Student Surveys The Student Survey Management Group manages five student surveys key to HWU: Student Survey Framework and Process In June 2014, the Learning

  1. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  2. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  3. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  4. Thank you for joining: Managing Up

    E-Print Network [OSTI]

    Vertes, Akos

    Thank you for joining: Managing Up: The secret to exceeding expectations, navigating transitions with Adobe Connect, please call 18004223623. #12;Managing Up: The secret to exceeding expectations is your situation? #12;Managing Up ­ 3 Key Questions 1. Why do it? 2. What is it? 3. How do you do it? #12

  5. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  6. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  7. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  8. Environmental sensor networks and continuous data quality assurance to manage salinity within a highly regulated river basin

    E-Print Network [OSTI]

    Quinn, N.W.T.

    2010-01-01T23:59:59.000Z

    and Drainage System for Drainage Water Quality Management,quality management using a novel software tool, Aquarius. Commercial turn-key monitoring systems

  9. Defense acquisition program manager as program leader : improving program outcomes through key competencies and relationship management

    E-Print Network [OSTI]

    Baumann, B. Marc

    2013-01-01T23:59:59.000Z

    The US defense acquisition system is a massive enterprise charged with developing and acquiring state-of-the-art military technology and systems. For the past 65 years, many broad-reaching studies and commissions have ...

  10. On The Design and Implementation of a Home Energy Management System

    E-Print Network [OSTI]

    Boutaba, Raouf

    energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the key issues of home energy management in Smart Grid: a holistic management solution, improved device energy management and show the results in simulation studies. Index Terms--smart grid, home energy

  11. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  12. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  13. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  14. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  15. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  16. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  17. A liquid water management strategy for PEM fuel cell stacks

    E-Print Network [OSTI]

    Van Nguyen, Trung; Knobbe, M. W.

    2003-02-25T23:59:59.000Z

    Gas and water management are key to achieving good performance from a PEM fuel cell stack. Previous experimentation had found, and this experimentation confirms, that one very effective method of achieving proper gas and water management is the use...

  18. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  19. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  20. ENTERPRISE RISK MANAGEMENT 2009 Annual Report Letter to President Emmert . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    Kaminsky, Werner

    0 ENTERPRISE RISK MANAGEMENT 2009 Annual Report #12;1 Letter to President Emmert Analysis Employment Liability Seminar . . . . . . . . . . . 13 Human Resources ­ Managing Key Risks: President Mark Emmert From: President's Advisory Committee on Enterprise Risk Management Re: UW Enterprise

  1. Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  2. Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  3. Manure Harvesting Frequency: The Key to Feedyard Dust Control in a Summer Drought

    E-Print Network [OSTI]

    Auvermann, Brent W.; Parker, David B.; Sweeten, John M.

    2000-11-27T23:59:59.000Z

    Summer drought can make dust control in feedyards more challenging than usual. Supplemental water may not keep pace with daily evaporation. The key to dust control is managing the depth of dry manure in the pens by harvesting manure more frequently...

  4. Growing Green As part of its strategic plan to foster growth and development in key

    E-Print Network [OSTI]

    Denham, Graham

    reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key remediation technologies for hazardous industrial pollutants in soil and groundwater · Geotechnical Research contamination and remediation, and management of mine wastes For more information, please visit: www.uwo.ca/enviro

  5. Gatton College of Business and Economics MGT Management

    E-Print Network [OSTI]

    MacAdam, Keith

    . MGT 320 SURVEY OF HUMAN RESOURCE MANAGEMENT. (3) SurveyofthefieldofHumanResourceManagementGatton College of Business and Economics MGT Management KEY: # = new course * = course changed = course dropped University of Kentucky 2013-2014 Undergraduate Bulletin 1 MGT 301 BUSINESS MANAGEMENT. (3

  6. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  7. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  8. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  9. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  10. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  11. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  12. Model and control for cooperative energy management

    E-Print Network [OSTI]

    Ranade, Vinayak V

    2010-01-01T23:59:59.000Z

    Proto/Amorphous Cooperative Energy Management (PACEM) aims to build and deploy a highly scalable system for smart power grids that will enable efficient demand shaping for small-user networks. Two key problems are to provide ...

  13. Deere and Company Energy Management Program

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01T23:59:59.000Z

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  14. Deere and Company Energy Management Program 

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01T23:59:59.000Z

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  15. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  16. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  17. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  18. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  19. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  20. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  1. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  2. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  3. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  4. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  5. EPRI's Industrial Energy Management Program

    E-Print Network [OSTI]

    Mergens, E.; Niday, L.

    EPRI's INDUSTRIAL ENERGY MANAGEMENT PROGRAM ED MERGENS MANAGER EPRI's CHEMICALS & PETROLEUM OFFICE HOUSTON, TEXAS ABSTRACT The loss of American industry jobs to foreign competition is made worse by national concerns over fuels combustion... are funded at a level in excess of SlO million annually. By providing technical guidance and sponsoring research and development projects, these Centers and Offices are a key element in EPRI's role of improving the value of electricity to consumers...

  6. International waste management fact book

    SciTech Connect (OSTI)

    Amaya, J.P.; LaMarche, M.N.; Upton, J.F.

    1997-10-01T23:59:59.000Z

    Many countries around the world are faced with nuclear and environmental management problems similar to those being addressed by the US Department of Energy. The purpose of this Fact Book is to provide the latest information on US and international organizations, programs, activities and key personnel to promote mutual cooperation to solve these problems. Areas addressed include all aspects of closing the commercial and nuclear fuel cycle and managing the wastes and sites from defense-related, nuclear materials production programs.

  7. SUBCONTRACT MANAGEMENT

    Energy Savers [EERE]

    0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

  8. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  9. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  10. Hospitality Management Hospitality Management

    E-Print Network [OSTI]

    McConnell, Terry

    of the Department of Hospitality Management and to the recorder in the College of Human Ecology. Required HPM 114 Food Safety and Quality Assurance 2 AND HPM 115 Food Science I 3 AND HPM 216 Restaurant and Food Service Operations 4 OR NSD 225 Nutrition in Health 3 12 credits needed: HPM 300 Selected Topics: Advanced

  11. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  12. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  13. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  14. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  15. Energy Efficiency Improvement and Cost Saving Opportunities for the Fruit and Vegetable Processing Industry. An ENERGY STAR Guide for Energy and Plant Managers

    E-Print Network [OSTI]

    Masanet, Eric

    2008-01-01T23:59:59.000Z

    Energy monitoring systems are key tools that play an important role in energy management. Energy monitoring systems

  16. Storm Water Management through Infiltration Trenches1 Bhagu R. Chahar1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . An infiltration trench alone or in combination with other storm10 water management practice is a key element and the drain time of trench, which is a key15 parameter in operation of storm water management practice systems (SUDS), water sensitive38 urban design (WSUD), best management practices (BMP) or low impact urban

  17. September 10, 2012 Key Centric Identity and

    E-Print Network [OSTI]

    Example Use Case · Smart Grid ­ Management of devices in a home ­ A individual home owner should be able-to-peer communications · Sensor networks · Smart grid (wireless access fro control and sensors) · Health care (security for wireless health care devices) · Automotive and smart highway applications #12;Paul A. Lambert, Marvell

  18. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03T23:59:59.000Z

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  19. The X.509 Privilege Management Infrastructure

    E-Print Network [OSTI]

    Kent, University of

    Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

  20. FAQS Qualification Card – Waste Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  1. FAQS Qualification Card- Aviation Manager

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  2. FAQS Qualification Card- Construction Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  3. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  4. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  5. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  6. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  7. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  8. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  9. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  10. Statistical methods for nuclear material management

    SciTech Connect (OSTI)

    Bowen W.M.; Bennett, C.A. (eds.) [eds.

    1988-12-01T23:59:59.000Z

    This book is intended as a reference manual of statistical methodology for nuclear material management practitioners. It describes statistical methods currently or potentially important in nuclear material management, explains the choice of methods for specific applications, and provides examples of practical applications to nuclear material management problems. Together with the accompanying training manual, which contains fully worked out problems keyed to each chapter, this book can also be used as a textbook for courses in statistical methods for nuclear material management. It should provide increased understanding and guidance to help improve the application of statistical methods to nuclear material management problems.

  11. Problem and Preferred Management Practices Identification Workshop

    SciTech Connect (OSTI)

    Patchen, Douglas G.

    2003-03-10T23:59:59.000Z

    The goals for this workshop were: to introduce key players in the Appalachian basin oil industry to DOE's new Preferred Upstream Management Practices (PUMP) program; to explain the various elements of our two-year project in detail; to transfer technology through a series of short, invited talks; to identify technical problems and best management practices; and to recruit members for our Preferred Management Practices (PMP) Council.

  12. Aspects of Key Largo woodrat ecology

    E-Print Network [OSTI]

    McCleery, Robert Alan; Lopez, Roel R.

    2004-09-30T23:59:59.000Z

    or climax hammock habitat (DOI 1973, Brown 1978, Hersh 1978, Barbour and Humphrey 1982, Goodyear 1985, U. S. Fish and Wildlife Service [USFWS] 1999). These conclusions stemmed from observations of high densities of woodrat stick-nests within mature... hammock (Brown ____________ The format and style follow the Journal of Wildlife Management. 2 1978, Hersh 1978, Barbour and Humphrey 1982). Other studies have reported the KLWR will use hammock forests in varying degrees of succession (Goodyear...

  13. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  14. Operational Risk Management: Added Value of Advanced Methodologies

    E-Print Network [OSTI]

    Maume-Deschamps, Véronique

    Operational Risk Management: Added Value of Advanced Methodologies Paris, September 2013 Bertrand HASSANI Head of Major Risks Management & Scenario Analysis Santander UK Disclaimer: The opinions, ideas Measurement Key statements 1. Risk management moto: Si Vis Pacem Para Belum 1. Awareness 2. Prevention 3

  15. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework Computer Security Enterprise Risk Key activities in managing enterprise-level risk--risk resulting from the operation on a continuous basis #12;NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Risk Management Framework Security Life

  16. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  17. 5 Management Plan The management plan described in this section is a culmination of extraordinary efforts by the

    E-Print Network [OSTI]

    work together to "derive" and establish the key elements of the Management Plan. Assessment290 5 Management Plan The management plan described in this section is a culmination as a laborious result of carrying out the assessment and inventory work and formation of the vision, goals

  18. Appropriate Technologies and Systems to respond to Climate Change, Improved Water Resources Management, Waste Management and Sanitation

    E-Print Network [OSTI]

    Barthelat, Francois

    Resources Management, Waste Management and Sanitation A Review of Water Information Systems in the English availability, quality, use and demand. In this regard, Water Information Systems play a key role in the management of the resource. This paper examines the water information systems of St. Lucia, Jamaica

  19. Project Management Plan Resident Management System (RMS)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

  20. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  1. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  2. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  3. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  4. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  5. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  6. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  7. "Advances and Controversies" Orange County leads the world in innovative eye technology. In this two day symposium, key leading

    E-Print Network [OSTI]

    Cramer, Karina

    "Advances and Controversies" Orange County leads the world in innovative eye technology. In this two day symposium, key leading surgeons will discuss the many new technologies emerging in anterior segment, oculoplastic, and retinal surgery, innovative solutions to prevent and manage complications

  8. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  9. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  10. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  11. ENVIRONMENTAL FLOWS IN A HUMAN-DOMINATED SYSTEM: INTEGRATED WATER MANAGEMENT STRATEGIES FOR THE RIO GRANDE/BRAVO BASIN

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    Wiley & Sons, Ltd. key words: integrated water management; environmental flows; reservoir re Reach of the RGB. This study addresses the need for integrated water management in Big Bend by devel­2009), water allocation, and reservoir operations, and key human water management objectives (water supply

  12. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  13. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  14. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  15. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  16. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  17. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  18. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  19. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  20. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  1. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  2. Roles of Officers in Respect to Risk Management Policy and Procedures Commencement Date: 18 October, 2000

    E-Print Network [OSTI]

    Roles of Officers in Respect to Risk Management Policy and Procedures Commencement Date: 18 October Nil 5. POLICY STATEMENT 5.1 University-Wide Risk Management Plan There shall be a University wide Risk. The Risk Management Plan will examine the expected key outcomes for the University and assess, manage

  3. Public engagement on solar radiation management and why it needs to happen now

    E-Print Network [OSTI]

    Yung, Laurie

    Public engagement on solar radiation management and why it needs to happen now Wylie A. Carr, and governance of one branch of geoengineering, solar radiation management (SRM), in three key ways: 1;1 The context for public engagement in solar radiation management Solar radiation management (SRM) has recently

  4. Building commissioning: The key to quality assurance

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

  5. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  6. Management Analyst

    Broader source: Energy.gov [DOE]

    The Wind and Water Power Technologies Office (WWPTO) manages efforts to improve performance, lower costs, and accelerate deployment of wind and water power technologies, which can play a...

  7. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  8. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  9. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  10. Proper Lagoon Management to Reduce Odor and Excessive Sludge Accumulation

    E-Print Network [OSTI]

    Mukhtar, Saqib

    1999-10-19T23:59:59.000Z

    Proper management techniques to reduce odor and excessive sludge accumulation include maintaining pH and salt levels, pumping regularly, maintaining adequate bacteria levels, and designing for efficiency. Definitions of key words are boxed for easy...

  11. Managing the Risks of Climate Change and Terrorism

    SciTech Connect (OSTI)

    Rosa, Eugene; Dietz, Tom; Moss, Richard H.; Atran, Scott; Moser, Susanne

    2012-04-07T23:59:59.000Z

    The article describes challenges to comparative risk assessment, a key approach for managing uncertainty in decision making, across diverse threats such as terrorism and climate change and argues new approaches will be particularly important in addressing decisions related to sustainability.

  12. Proper Lagoon Management to Reduce Odor and Excessive Sludge Accumulation 

    E-Print Network [OSTI]

    Mukhtar, Saqib

    1999-10-19T23:59:59.000Z

    Proper management techniques to reduce odor and excessive sludge accumulation include maintaining pH and salt levels, pumping regularly, maintaining adequate bacteria levels, and designing for efficiency. Definitions of key words are boxed for easy...

  13. Intelligent energy management agent for a parallel hybrid vehicle 

    E-Print Network [OSTI]

    Won, Jong-Seob

    2004-09-30T23:59:59.000Z

    This dissertation proposes an Intelligent Energy Management Agent (IEMA) for parallel hybrid vehicles. A key concept adopted in the development of an IEMA is based on the premise that driving environment would affect fuel ...

  14. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  15. Successes in School Energy Management - Energy Monitoring

    E-Print Network [OSTI]

    Corbitt, C.

    2012-01-01T23:59:59.000Z

    Successes in School Energy Management ? Energy Monitoring Chad Corbitt, CEM, ATEM Energy Manager, Klein ISD jcorbitt1@kleinisd.net Wednesday, October 10, 2012 Keys to Energy Monitoring ? Develop an Energy Monitoring plan ? Define... the why, what, how and who of the plan ? Implement the Energy Monitoring plan ? Personnel, data system, reporting ? One Experience in Energy Monitoring Developing an Energy Monitoring Plan ? Why do we need to monitor energy? ? What information...

  16. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  17. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  18. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  19. Center for Ecological Management of Military Lands 1 Loading Handheld Data Files

    E-Print Network [OSTI]

    a parent table and a child table by the use of primary and foreign keys. A parent is defined with a data element or set of elements as a primary key. #12;Center for Ecological Management of Military Lands 2 The primary key is a unique value that constrains the entry of data into the dependent child table

  20. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  1. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  2. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  3. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  4. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  5. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  6. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  7. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  8. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  9. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  10. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  11. Project Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

  12. Management Analyst

    Broader source: Energy.gov [DOE]

    The incumbent in this position will serve as a Management Analyst in the Strategy Execution group of the Corporate Strategy organization (SE). The Strategy Execution group develops and coordinates...

  13. Managing Solutions

    E-Print Network [OSTI]

    Baker, Emily

    2007-01-01T23:59:59.000Z

    , and Texas Water --------------------------------------------- Project Managers Cecilia Wagner, Kevin Wagner, Danielle Supercinski, Dr. Bill Fox and Lucas Gregory work to link university researchers and Extension specialists to appropriate funding agen... Irrigators Network. Kevin Wagner, who joined TWRI in 2005 from TSSWCB, has spent several years working with environmental issues. He is currently pursuing his doctorate evaluating best management practices for reducing bacterial runoff from cattle wastes...

  14. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  15. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    E-Print Network [OSTI]

    K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada pktysowski@uwaterloo.ca M. Anwarul Hasan Dept. of Electrical & Computer Engineering University otherwise lead to outages if left unaddressed; excess capacity and idle cycles are avoided. The easy

  16. For Immediate Release --Thursday, May 15, 2014 Managing mistakes a key factor in developing nursing

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    mistakes impacts nursing students' clinical performance. He is looking to improve based on opinion alone and expect positive outcomes." Students are obviously in clinical settings. "Clinical is where nursing students really put everything

  17. Fault-Tolerant and Scalable Key Management for Dapeng Wu and Chi Zhou

    E-Print Network [OSTI]

    Wu, Dapeng Oliver

    to the power grid to facilitate real-time metering of customers, enable remote control of residential appliances via smart meters, and facilitate the wide-spread use of demand response programs permitting operation [6], [7]. For example, the user data or occupant profiling may be maliciously collected via means

  18. Rangeland Drought Management for Texans: Planning: The Key to Surviving Drought

    E-Print Network [OSTI]

    Hart, Charles R.; Carpenter, Bruce B.

    2001-05-02T23:59:59.000Z

    This publication outlines the steps that ranchers should take to survive a drought. Those steps include developing a plan for each enterprise of the operation, ranking strategic ranch goals, planning for resource flow, implementing and monitoring...

  19. "Turn-Key" Open Source Software Solutions for Energy Management of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeriesDepartmentSmall to Medium Sized Buildings

  20. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O

  1. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  2. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  3. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  4. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  5. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  6. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  7. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  8. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  9. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  10. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  11. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  12. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  13. Inventory Management Rutgers Business School Newark and New Brunswick

    E-Print Network [OSTI]

    Lin, Xiaodong

    Inventory Management 26:799:685 Rutgers Business School ­ Newark and New Brunswick Fall 2012-353-5017 Lecture: Wednesdays, 1-3:50pm, at 1 WP 528 Office Hours: by appointment Course Description: Inventory problems and key trade- offs in inventory management, (2) introduce the main stream literature that model

  14. Inventory Management Rutgers Business School Newark and New Brunswick

    E-Print Network [OSTI]

    Lin, Xiaodong

    Inventory Management 26:799:685 Rutgers Business School ­ Newark and New Brunswick Fall 2010-353-5017 Lecture: Wednesdays, 2-4:50pm, at 1 WP 528 Office Hours: by appointment Course Description: Inventory problems and key trade- offs in inventory management, (2) introduce the main stream literature that model

  15. Ph.D. Positions in "ICT for Sustainable Energy Management"

    E-Print Network [OSTI]

    Teschner, Matthias

    -edge applications for energy efficiency. We are developing and evaluating distributed systems for monitoring of complex systems Background in energy management and power systems is considered a plus Interest Ph.D. Positions in "ICT for Sustainable Energy Management" Key words: distributed information

  16. Investigating the Effort of Using Business Process Management Technology

    E-Print Network [OSTI]

    Ulm, Universität

    -Franck-Ring, 89069 Ulm, Germany Abstract Business Process Management (BPM) technology has become an important aspects and effects of BPM technology and BPM tools. Key words: Process-aware Information System, Workflow (e.g., WS-BPEL, BPMN), and business process manage- ment (BPM) tools (e.g., Tibco Staffware, FLOWer

  17. FAQS Qualification Card – Facility Maintenance Management

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  18. FAQS Qualification Card – Senior Technical Safety Manager

    Broader source: Energy.gov [DOE]

    A key element for the Department’s Technical Qualification Programs is a set of common Functional Area Qualification Standards (FAQS) and associated Job Task Analyses (JTA). These standards are developed for various functional areas of responsibility in the Department, including oversight of safety management programs identified as hazard controls in Documented Safety Analyses (DSA).

  19. Professional Master of Science and Engineering Management

    E-Print Network [OSTI]

    Dyer, Bill

    and advanced management concepts. Other topics include productivity improvement data collection, analysis a successful construction company. If you have a degree in engineering plus two or more years of relevant full with expertise in several areas. The course focuses on three key areas: leading people, leading the financial

  20. Business Management Analyst Business Manager Director of Communication Contracts Manager

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    · Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

  1. Computerized training management system

    DOE Patents [OSTI]

    Rice, H.B.; McNair, R.C.; White, K.; Maugeri, T.

    1998-08-04T23:59:59.000Z

    A Computerized Training Management System (CTMS) is disclosed for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base{trademark}, an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches. 18 figs.

  2. Computerized training management system

    DOE Patents [OSTI]

    Rice, Harold B. (Franklin Furnace, OH); McNair, Robert C. (East Setauket, NY); White, Kenneth (Shirley, NY); Maugeri, Terry (Wading River, NY)

    1998-08-04T23:59:59.000Z

    A Computerized Training Management System (CTMS) for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base.RTM., an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches.

  3. Managing contaminated sites

    SciTech Connect (OSTI)

    Asante-Duah, D.K.

    1997-12-31T23:59:59.000Z

    This book summarizes the generic principles of contaminated site management. The book walks the reader through contaminated site identification, risk assessment and the evaluation of remediation alternatives. The book is divided into two major sections, problem diagnosis and development of site restoration. In problem diagnosis, the general principles of site investigation are discussed, including the objectives and differences between tier 1,2, and 3 investigations. The principles of data collection and analysis are presented. A small quantitative discussion of statistical analysis is presented but in keeping with the objectives of the text is not sufficient comprehensive or detailed to provide much of a guide for the practitioner. Chapters on contaminant fate and transport processes and risk assessment help the reader understand the role of these issues in site investigation and remedial planning. A chapter is also included on elements of a site characterization activity, which summarizes some of the key considerations in conducting a site investigation.

  4. Water Resources Management (2006) 20: 359376 DOI: 10.1007/s11269-006-0325-4 C Springer 2006

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    in water supply operation. Key words: integrated management, operations research, water quality management- ified water quantity and quality requirements and manage reservoir systems under both criteria. FinallyWater Resources Management (2006) 20: 359­376 DOI: 10.1007/s11269-006-0325-4 C Springer 2006 Refill

  5. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  6. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  7. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  8. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  9. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  10. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  11. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  12. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  13. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  14. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  15. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  16. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  17. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01T23:59:59.000Z

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  18. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  19. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  20. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  1. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  2. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  3. Key Concepts in Project Development and Financing in Alaska

    Office of Environmental Management (EM)

    docsfy10osti46668.pdf; and http:thegreenwombat.com20071001denver-airport-goes-solar 42 Energy Service Companies (ESCo) * A long-term energy management partner *...

  4. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  5. Data Management Policy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

  6. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition...

  7. Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    ..............................................................................................................19 Bruce Hoagland, Oklahoma Biological Survey and the University of Oklahoma Forest Management Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook E-952 Oklahoma Cooperative . . . . . . . . . . . . . Oklahoma Conservation Commission Management Handbook #12

  8. Office of Legacy Management FY 2009 Energy Management Data Report...

    Office of Environmental Management (EM)

    Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data Report FY 2009 Energy Management Performance Summary...

  9. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

  10. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

  11. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  12. Electronic waste management approaches: An overview

    SciTech Connect (OSTI)

    Kiddee, Peeranart [Centre for Environmental Risk Assessment and Remediation, University of South Australia, Mawson Lakes Campus, Adelaide, SA 5095 (Australia); Cooperative Research Centre for Contamination Assessment and Remediation of the Environment, Mawson Lakes Campus, Adelaide, SA 5095 (Australia); Naidu, Ravi, E-mail: ravi.naidu@crccare.com [Centre for Environmental Risk Assessment and Remediation, University of South Australia, Mawson Lakes Campus, Adelaide, SA 5095 (Australia); Cooperative Research Centre for Contamination Assessment and Remediation of the Environment, Mawson Lakes Campus, Adelaide, SA 5095 (Australia); Wong, Ming H. [Croucher Institute for Environmental Sciences, Department of Biology, Hong Kong Baptist University, Kowloon Tong (China)

    2013-05-15T23:59:59.000Z

    Highlights: ? Human toxicity of hazardous substances in e-waste. ? Environmental impacts of e-waste from disposal processes. ? Life Cycle Assessment (LCA), Material Flow Analysis (MFA), Multi Criteria Analysis (MCA) and Extended Producer Responsibility (EPR) to and solve e-waste problems. ? Key issues relating to tools managing e-waste for sustainable e-waste management. - Abstract: Electronic waste (e-waste) is one of the fastest-growing pollution problems worldwide given the presence if a variety of toxic substances which can contaminate the environment and threaten human health, if disposal protocols are not meticulously managed. This paper presents an overview of toxic substances present in e-waste, their potential environmental and human health impacts together with management strategies currently being used in certain countries. Several tools including Life Cycle Assessment (LCA), Material Flow Analysis (MFA), Multi Criteria Analysis (MCA) and Extended Producer Responsibility (EPR) have been developed to manage e-wastes especially in developed countries. The key to success in terms of e-waste management is to develop eco-design devices, properly collect e-waste, recover and recycle material by safe methods, dispose of e-waste by suitable techniques, forbid the transfer of used electronic devices to developing countries, and raise awareness of the impact of e-waste. No single tool is adequate but together they can complement each other to solve this issue. A national scheme such as EPR is a good policy in solving the growing e-waste problems.

  13. Environmental Management System Plan

    SciTech Connect (OSTI)

    Fox, Robert; Thorson, Patrick; Horst, Blair; Speros, John; Rothermich, Nancy; Hatayama, Howard

    2009-03-24T23:59:59.000Z

    Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management establishes the policy that Federal agencies conduct their environmental, transportation, and energy-related activities in a manner that is environmentally, economically and fiscally sound, integrated, continually improving, efficient, and sustainable. The Department of Energy (DOE) has approved DOE Order 450.1A, Environmental Protection Program and DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management as the means of achieving the provisions of this Executive Order. DOE Order 450.1A mandates the development of Environmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: (1) Protect the air, water, land, and other natural and cultural resources potentially impacted by facility operations; (2) Meet or exceed applicable environmental, public health, and resource protection laws and regulations; and (3) Implement cost-effective business practices. In addition, the DOE Order 450.1A mandates that the EMS must be integrated with a facility's Integrated Safety Management System (ISMS) established pursuant to DOE P 450.4, 'Safety Management System Policy'. DOE Order 430.2B mandates an energy management program that considers energy use and renewable energy, water, new and renovated buildings, and vehicle fleet activities. The Order incorporates the provisions of the Energy Policy Act of 2005 and Energy Independence and Security Act of 2007. The Order also includes the DOE's Transformational Energy Action Management initiative, which assures compliance is achieved through an Executable Plan that is prepared and updated annually by Lawrence Berkeley National Laboratory (LBNL, Berkeley Lab, or the Laboratory) and then approved by the DOE Berkeley Site Office. At the time of this revision to the EMS plan, the 'FY2009 LBNL Sustainability Executable Plan' represented the most current Executable Plan. These DOE Orders and associated policies establish goals and sustainable stewardship practices that are protective of environmental, natural, and cultural resources, and take a life cycle approach that considers aspects such as: (1) Acquisition and use of environmentally preferable products; (2) Electronics stewardship; (3) Energy conservation, energy efficiency, and renewable energy; (4) Pollution prevention, with emphasis on toxic and hazardous chemical and material reduction; (5) Procurement of efficient energy and water consuming materials and equipment; (6) Recycling and reuse; (7) Sustainable and high-performance building design; (8) Transportation and fleet management; and (9) Water conservation. LBNL's approach to sustainable environmental stewardship required under Order 450.1A poses the challenge of implementing its EMS in a compliance-based, performance-based, and cost-effective manner. In other words, the EMS must deliver real and tangible business value at a minimal cost. The purpose of this plan is to describe Berkeley Lab's approach for achieving such an EMS, including an overview of the roles and responsibilities of key Laboratory parties. This approach begins with a broad-based environmental policy consistent with that stated in Chapter 11 of the LBNL Health and Safety Manual (PUB-3000). This policy states that Berkeley Lab is committed to the following: (1) Complying with applicable environmental, public health, and resource conservation laws and regulations. (2) Preventing pollution, minimizing waste, and conserving natural resources. (3) Correcting environmental hazards and cleaning up existing environmental problems, and (4) Continually improving the Laboratory's environmental performance while maintaining operational capability and sustaining the overall mission of the Laboratory. A continual cycle of planning, implementing, evaluating, and improving processes will be performed to achieve goals, objectives, and targets that will help LBNL carry out this policy. Each year, environmental aspects will be identified and their impacts to the environm

  14. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  15. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  16. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23T23:59:59.000Z

    . Stormwater also may wash bacteria and other pathogens into swimming areas, creating health hazards that often close beaches. Stormwater may carry debris, such as plastic bags, six-pack rings, and cigarette butts, into water bodies; such debris can choke... the development and implementation of best management practices (BMPs) and achievement of measurable goals at levels sufficient to satisfy each of six minimum control measures and an optional seventh control measure: 1. Public education and outreach...

  17. pre-acts -6th annual international conference of Territorial Intelligence -caENTI October 2008 1 SUSTAINABLE WATER MANAGEMENT METHODS IN HUNGARY

    E-Print Network [OSTI]

    Boyer, Edmond

    extraction protocols; more sophisticated water treatment methods, drilling deeper wells result in additional a useful sustainable water management model based on the rainwater harvesting practices. Key words: Rainwater, sustainable water management, drinking water, rainwater harvesting, cistern, precipitation

  18. Protocol for a randomised controlled trial of telemonitoring and self- management in the control of hypertension: Telemonitoring and self-management in hypertension.

    E-Print Network [OSTI]

    McManus, Richard; Bray, Emma P; Mant, Jonathan; Holder, Roger; Greenfield, Sheila; Bryan, Stirling; Jones, Miren I; Little, Paul; Williams, Bryan; Hobbs, F D Richard

    2009-02-16T23:59:59.000Z

    Abstract Background Controlling blood pressure with drugs is a key aspect of cardiovascular disease prevention, but until recently has been the sole preserve of health professionals. Self-management of hypertension is an under researched area...

  19. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  20. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  1. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  2. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  3. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  4. Landscape Management Systems The Visual Management System

    E-Print Network [OSTI]

    Standiford, Richard B.

    Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

  5. Management 301 Management and Organizational Behavior

    E-Print Network [OSTI]

    Young, Paul Thomas

    Management 301 Management and Organizational Behavior Section 003 Fall 2013 (8/20-12/3) College approaches management as that process of reaching organizational goals by working with and through people. Course Objectives 1. To understand management and organizational behavior (ob) concepts associated

  6. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  7. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service FirstData

  8. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service

  9. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID ServiceData

  10. SUBCONTRACT MANAGEMENT

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT

  11. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home and It'll LoveMail andAbout UsManagement

  12. Introduction Phagocytosis is a key capability through which the neutrophil

    E-Print Network [OSTI]

    Heinrich, Volkmar

    that this is indicative of active management of spare surface membrane availability geared towards facilitating presented with antibody-coated beads of radii 1.1 to 5.5 µm. In particular, we monitor the cortical tension

  13. Recommended Practice for Patch Management of Control Systems

    SciTech Connect (OSTI)

    Steven Tom; Dale Christiansen; Dan Berrett

    2008-12-01T23:59:59.000Z

    A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

  14. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  15. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  16. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  17. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  18. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  19. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  20. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  1. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  2. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  3. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  4. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  5. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  6. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  7. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  8. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  9. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  10. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  11. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  12. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  13. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  14. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  15. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  16. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  17. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  18. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  19. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  20. Research on Commercial Patterns of China Existing Building Energy Retrofit Based on Energy Management Contract 

    E-Print Network [OSTI]

    Han, Z.; Liu, C.; Sun, J.

    2006-01-01T23:59:59.000Z

    Existing building energy retrofit is one of the keys of building energy efficiency in China. According to experience in developed countries, implementation of energy management contract (EMC) is crucial to promote existing building energy retrofit...

  1. TOWARDS A SYSTEMATIC REPOSITORY OF KNOWLEDGE ABOUT MANAGING COLLABORATIVE DESIGN CONFLICTS1

    E-Print Network [OSTI]

    of concurrent engineering practices such as multi-disciplinary design teams (Klein 1994). A key barrier including computer science, industrial engineering, and management science, to mention just a few. Previous

  2. System team composition for a complex system to enable integration and attribute management

    E-Print Network [OSTI]

    Krishnaswami, Ram, 1966-

    2004-01-01T23:59:59.000Z

    The automatic transmission is a very complex system in a modern automobile with several hundred components performing mechanical, hydraulic and electronic functions. System integration and attribute management are key ...

  3. Research on Commercial Patterns of China Existing Building Energy Retrofit Based on Energy Management Contract

    E-Print Network [OSTI]

    Han, Z.; Liu, C.; Sun, J.

    2006-01-01T23:59:59.000Z

    Existing building energy retrofit is one of the keys of building energy efficiency in China. According to experience in developed countries, implementation of energy management contract (EMC) is crucial to promote existing building energy retrofit...

  4. Subsurface Flow Management and Real-Time Production Optimization using Model Predictive Control

    E-Print Network [OSTI]

    Lopez, Thomas Jai

    2012-02-14T23:59:59.000Z

    One of the key challenges in the Oil & Gas industry is to best manage reservoirs under different conditions, constrained by production rates based on various economic scenarios, in order to meet energy demands and maximize profit. To address...

  5. An exploration of supply chain management practices in the aerospace industry and in Rolls-Royce

    E-Print Network [OSTI]

    Tiwari, Mohit

    2005-01-01T23:59:59.000Z

    This thesis is a part of the Supply Chain 2020 research project which seeks to study best practices in supply chain management in multiple industries in order to develop a deeper understanding of key principles and practices ...

  6. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18T23:59:59.000Z

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  7. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  8. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  11. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  12. Key regulatory drivers affecting shipments of mixed transuranic waste from Los Alamos National Laboratory to the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Schumann, P.B.; Bacigalupa, G.A.; Kosiewicz, S.T.; Sinkule, B.J. [and others

    1997-02-01T23:59:59.000Z

    A number of key regulatory drivers affect the nature, scope, and timing of Los Alamos National Laboratory`s (LANL`s) plans for mixed transuranic (MTRU) waste shipments to the Waste Isolation Pilot Plant (WIPP), which are planned to commence as soon as possible following WIPP`s currently anticipated November, 1997 opening date. This paper provides an overview of some of the key drivers at LANL, particularly emphasizing those associated with the hazardous waste component of LANL`s MTRU waste (MTRU, like any mixed waste, contains both a radioactive and a hazardous waste component). The key drivers discussed here derive from the federal Resource Conservation and Recovery Act (RCRA) and its amendments, including the Federal Facility Compliance Act (FFCAU), and from the New Mexico Hazardous Waste Act (NMHWA). These statutory provisions are enforced through three major mechanisms: facility RCRA permits; the New Mexico Hazardous Waste Management Regulations, set forth in the New Mexico Administrative Code, Title 20, Chapter 4, Part 1: and compliance orders issued to enforce these requirements. General requirements in all three categories will apply to MTRU waste management and characterization activities at both WIPP and LANL. In addition, LANL is subject to facility-specific requirements in its RCRA hazardous waste facility permit, permit conditions as currently proposed in RCRA Part B permit applications presently being reviewed by the New Mexico Environment Department (NNED), and facility-specific compliance orders related to MTRU waste management. Likewise, permitting and compliance-related requirements specific to WIPP indirectly affect LANL`s characterization, packaging, record-keeping, and transportation requirements for MTRU waste. LANL must comply with this evolving set of regulatory requirements to begin shipments of MTRU waste to WIPP in a timely fashion.

  13. Extending the Horizons: Environmental Environmental Excellence as Key to Improving Operations.

    E-Print Network [OSTI]

    Corbett, C. J.; Klassen, R. D.

    2006-01-01T23:59:59.000Z

    investment in quality management systems had the oppositeISO 9000 series of quality management systems standards.environmental management systems drawn from earlier quality

  14. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  15. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  16. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  17. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  18. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  19. IT Project Manager

    Broader source: Energy.gov [DOE]

    This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

  20. environmental management radiation protection

    E-Print Network [OSTI]

    Entekhabi, Dara

    EHS environmental management biosafety radiation protection industrial hygiene safety Working: Biosafety, Environmental Management, Industrial Hygiene, Radiation Protection and Safety. Each specialized Management Program, Industrial Hygiene, Radiation Protection Program, and the Safety Program. (http

  1. Functional Facilities Management Energy Management Structure

    E-Print Network [OSTI]

    Gulliver, Robert

    Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

  2. Unique Energy Management Training Offers Certification and Energy Savings

    E-Print Network [OSTI]

    Ebbage, R.

    2004-01-01T23:59:59.000Z

    is rapidly becoming a mandatory practice in the maintance departments of commercial buildings around the world. Driven by increasing utility rates and shrinking budgets, energy-cost savings are often a requirement rather that just a good idea. Managers... the key to selecting the right project, stretching maintenance dollars and maximizing return on investment. These strict conditions have led commercial building managers and administrators to look for energy training programs that offer personnel...

  3. Energy Management Working Group: Accelerating Energy Management

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01T23:59:59.000Z

    for Standardization (ISO) published the ISO 50001 energy management standard in 2011. ISO 50001 provides industrial companies with guidelines for integrating energy efficiency into their management practices— including fine-tuning production processes... efficiency. GSEP’s Energy Management Working Group (EMWG) advocates the increased adoption of EnMS or ISO 50001 in industry and commercial buildings. It goal is to accelerate the adoption and use of energy management systems in industrial facilities...

  4. Load Management for Industry

    E-Print Network [OSTI]

    Konsevick, W. J., Jr.

    1982-01-01T23:59:59.000Z

    customer management programs exist. EPRI Report (EM-1606) loads to beneficially alter a'utility's load curve. (Page 1-2) list them as: Load management alternatives are covered. 1. Direct or voluntary control of customer Load management methods can... and Electric Power Research Institute (EPRI) Report energy management programs. (EM-1606) states that "the objective of load manage ment is to alter the real or apparent pattern of Our load management program was designed electricity use in order to...

  5. February 2002 RISK MANAGEMENT

    E-Print Network [OSTI]

    development life cycle (SDLC). Key to implementa tion of a successful enterprise-wide IT security program

  6. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  7. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR ­ IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

  8. Physics Department Management Review

    E-Print Network [OSTI]

    Homes, Christopher C.

    ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

  9. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 85% Cleanup EVM represents Earned Value Management. FY2011 Second Quarter Overall Contract and Project Management Improvement...

  10. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 Fourth Quarter Overall Contract and Project Management Improvement...

  11. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 First Quarter Overall Contract and Project Management Performance...

  12. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 89% Cleanup EVM represents Earned Value Management. FY2011 Third Quarter Overall Contract and Project Management Improvement...

  13. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  14. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  15. Target Cost Management Strategy

    E-Print Network [OSTI]

    Okano, Hiroshi

    1996-01-01T23:59:59.000Z

    Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

  16. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  17. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  18. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  19. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  20. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  1. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  2. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  3. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  4. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  6. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  7. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  8. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  9. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  10. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  11. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  12. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  13. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  14. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  15. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  16. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  17. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  18. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  19. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  20. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  1. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  2. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  3. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  4. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

  5. Environmental Best Management Practices

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

  6. Sport Management Academic Offerings

    E-Print Network [OSTI]

    Mather, Patrick T.

    production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

  7. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  8. Managing work-life policies in the European workplace: explorations for future research 

    E-Print Network [OSTI]

    den Dulk, Laura; Peper, Bram

    2009-01-01T23:59:59.000Z

    In this paper we focus on the implementation and management of work-life policies in the workplace and the key role of managers in this context. We review the existing literature, enabling us to set a research agenda focused on explaining managerial...

  9. Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation

    E-Print Network [OSTI]

    Shihada, Basem

    Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation Justin Manweiler Duke.rc@duke.edu ABSTRACT WiFi continues to be a prime source of energy consumption in mobile devices. This paper observes that, despite a rich body of research in WiFi energy management, there is room for improvement. Our key

  10. An Economic Approach to Adaptive Resource Management Neil Stratford and Richard Mortier \\Lambda

    E-Print Network [OSTI]

    Hand, Steven

    management using frequently renegotiated timed re­ source contracts. We use dynamic pricing as a congestion by applications; ffl Higher­level optimization across multiple resources, and various time­scales, using feedback provided by dynamic pricing. 1.1. Application Adaptation The key to solving the resource management problem

  11. he project focusses upon the changing role of physical intervention and manage-

    E-Print Network [OSTI]

    Davies, Christopher

    ­ the hardware and soft- ware of security planning ­ in combating new forms of terrorism against public places. The move is a departure from present arrange- ments where the management of security in public places and management of public places and transport systems. In doing so, it will address key questions about

  12. Abstract--Autonomic computing systems are intelligent systems that manage their own performance. An important characteristic

    E-Print Network [OSTI]

    their workloads. For a complex system such as the database management system (DBMS) to be self-managing, it should be adaptive to the type of the workload put upon it. Identifying the workload type is key to tuning a DBMS that automatically recognizes the workload type and assesses each type's concentration. Since a DBMS may experience

  13. HEALTH, SAFETY AND ENVIRONMENT MANAGEMENT SYSTEM : A METHOD FOR RANKING IMPACTS IN SMALL AND MEDIUM

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    99-57 HEALTH, SAFETY AND ENVIRONMENT MANAGEMENT SYSTEM : A METHOD FOR RANKING IMPACTS IN SMALL AND MEDIUM ENTERPRISES A. Accorsi', J.P. Pineau, A. Prats l. INERIS, Vemeuil-en-Halatte, France Key words : safety management System, ranking, health, safety, environment ABSTRACT ELF ATOCHEM and INERIS have

  14. Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state

    E-Print Network [OSTI]

    Painter, Kevin

    About Our MSc in Maritime Logistics and Supply Chain Management is designed to give you state of the art knowledge in international shipping and global logistics in addition to an excellent foundation in key supply chain management concepts and logistics practice. We have a full programme of courses, site

  15. Building the London Cycle Network Plus (LCN+) Steve Cardno LCN+ Project Manager

    E-Print Network [OSTI]

    Bertini, Robert L.

    Building the London Cycle Network Plus (LCN+) Steve Cardno ­ LCN+ Project Manager The Story So Far #12;Background to LCN+ London Cycling Design Standards (key principles) Project Management of the LCN+ Network Assessment Project Examples Lessons Learned Other Cycling Infrastructure Projects in London Ideas

  16. Management of Energy Technology for Sustainability: How to Fund Energy Technology R&D

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Management of Energy Technology for Sustainability: How to Fund Energy Technology R&D (Authors public policy problem: energy technology R&D portfolio management under climate change. We apply a multi to cost reduction, other times leading to better environmental outcomes. Key words : energy technology, R

  17. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01T23:59:59.000Z

    Buildings Challenge Houston Green Office Challenge Green Building Resolution LED Streetlight conversion Residential Energy Efficiency Program (REEP) City EE and Resource Management policy City facility benchmarking & transparency HOUSTON CITY ENERGY... usage by 74 million gallons ? Diverted 40 percent of waste from landfills by recycling ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Building Retrofits & Benchmarking ? Smith & Associates installed a...

  18. Farm Business Management for the 21st Century Purdue Extension

    E-Print Network [OSTI]

    Farm Business Management for the 21st Century Purdue Extension West Lafayette, IN 47907 Developing at the underlying purpose for which the business exists: its vision and mission. An important key to any successful planned vacation or like the initiation of a new business enterprise or restructuring of an existing

  19. ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS

    E-Print Network [OSTI]

    ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS CEMML@cemml.colostate.edu | http://www.cemml.colostate.edu Environmental compliance and pollution prevention are critical aspects of any successful environmental program. The Center provides technical support in these key areas. CEMML

  20. Sustainable Operation and Management of Data Center Chillers

    E-Print Network [OSTI]

    Ramakrishnan, Naren

    Sustainable Operation and Management of Data Center Chillers using Temporal Data Mining Debprakash mining solution to model and optimize performance of data center chillers, a key component of the cooling characterizations of chiller behavior, suit- able for a data center engineer. To aid in this transduc- tion

  1. High Performance Circuits for Power Management and Millimeter Wave Applications

    E-Print Network [OSTI]

    Amer, Ahmed 1979-

    2012-01-23T23:59:59.000Z

    to achieve the required goals in terms of small silicon area and power consumption while at the same time achieve high performance. Four key building blocks in power management and a switchable harmonic mixer with pre-amplifier and poly-phase generator as a...

  2. Power and Energy Management for Server Systems Ricardo Bianchini

    E-Print Network [OSTI]

    Bianchini, Ricardo

    , of servers and supporting cooling infrastructures. Research on power and energy management for servers can requests coming from remote clients or other servers. Common examples are Web and application servers consumption have become key concerns in data centers. The peak power consumption dictates the required cooling

  3. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  4. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  5. Management of National Nuclear Power Programs for assured safety

    SciTech Connect (OSTI)

    Connolly, T.J. (ed.)

    1985-01-01T23:59:59.000Z

    Topics discussed in this report include: nuclear utility organization; before the Florida Public Service Commission in re: St. Lucie Unit No. 2 cost recovery; nuclear reliability improvement and safety operations; nuclear utility management; training of nuclear facility personnel; US experience in key areas of nuclear safety; the US Nuclear Regulatory Commission - function and process; regulatory considerations of the risk of nuclear power plants; overview of the processes of reliability and risk management; management significance of risk analysis; international and domestic institutional issues for peaceful nuclear uses; the role of the Institute of Nuclear Power Operations (INPO); and nuclear safety activities of the International Atomic Energy Agency (IAEA).

  6. Risk assessment in environmental management

    SciTech Connect (OSTI)

    Asante-Duah, D.K.

    1998-07-01T23:59:59.000Z

    This book is a straightforward exposition of US EPA-based procedures for the risk assessment and risk management of contaminated land, interwoven with discussions on some of the key fundamentals on the fate and transport of chemicals in the environment and the toxic action of environmental chemicals. The book is logically structured, commencing with a general overview of the principles of risk assessment and the interface with environmental legislation. There follows an introduction to environmental fate and transport, modeling, toxicology and uncertainty analysis, and a discussion of the elements of a risk assessment (site characterization, exposure analysis, toxic action and risk characterization), intake of a chemical with its environmental concentration and activity-related parameters such as inhalation rate and exposure time. The book concludes with a discussion on the derivation of risk-based action levels and remediation goals.

  7. Encrusting growth and retreat of Montastrea annularis (Anthozoa; Scleractinia) following the grounding of a freighter on Molasses Reef, Key Largo, Florida

    E-Print Network [OSTI]

    Choi, Kwang-Sik

    1987-01-01T23:59:59.000Z

    ). Because of its accessibility, it is one of the most visited reefs in the upper Florida Keys (Voss, 1984). Voss (1984) characterized the usage of Molasses Reef by divers as "heavya and use for fishing as "moderate". Structurally, ix, has s, well-developed... management, quantitative evaluation on destructive processes of coral is very necessary as well as that of constructive processes. It is suggested that the influence of previously discussed environmental factors on coral tissue retreat as well as growth...

  8. Information requirements of self-managing teams

    SciTech Connect (OSTI)

    Van Aken, E.M.

    1992-12-31T23:59:59.000Z

    In response to the significant challenges organizations face today, many managers have put in place continuous improvement efforts to help the organization on enhance its competitive position. A key element of continuous improvement efforts is employee involvement, and one of the most complex, mature, and effective forms of employee involvement is self-managing teams. A self-managing team is a group of employees, usually eight to fifteen, which is responsible for planning, implementing, controlling, and improving work processes. There are many characteristics of self-managing teams which are discussed frequently in the literature and are common topics of seminars and workshops on SMTs, including the role of the first-line supervisor, the structure of teams, the training necessary, and the pay system for SMTs. However, one area which has not been as widely researched is the role of information - what types of information do self-managing teams need? This paper addresses this question. Results from a multiple case study research project focusing on the information requirements of SMTs are presented. Specifically, seven types of information SMTs need are identified, as well as general characteristics of the information system. By information system, I mean very broadly, the system (both formal and informal) which provides information of any kind to a self-managing team. The results of this research can be thought of as ``design features`` for an information system to support SMTs. Practicing managers can use these design features in two ways: they can design them into beginning SMT efforts; or, for SMTs already established, managers can compare them to the existing information system and adjust accordingly.

  9. Information requirements of self-managing teams

    SciTech Connect (OSTI)

    Van Aken, E.M.

    1992-01-01T23:59:59.000Z

    In response to the significant challenges organizations face today, many managers have put in place continuous improvement efforts to help the organization on enhance its competitive position. A key element of continuous improvement efforts is employee involvement, and one of the most complex, mature, and effective forms of employee involvement is self-managing teams. A self-managing team is a group of employees, usually eight to fifteen, which is responsible for planning, implementing, controlling, and improving work processes. There are many characteristics of self-managing teams which are discussed frequently in the literature and are common topics of seminars and workshops on SMTs, including the role of the first-line supervisor, the structure of teams, the training necessary, and the pay system for SMTs. However, one area which has not been as widely researched is the role of information - what types of information do self-managing teams need This paper addresses this question. Results from a multiple case study research project focusing on the information requirements of SMTs are presented. Specifically, seven types of information SMTs need are identified, as well as general characteristics of the information system. By information system, I mean very broadly, the system (both formal and informal) which provides information of any kind to a self-managing team. The results of this research can be thought of as design features'' for an information system to support SMTs. Practicing managers can use these design features in two ways: they can design them into beginning SMT efforts; or, for SMTs already established, managers can compare them to the existing information system and adjust accordingly.

  10. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  11. Management and Program Analyst (Operations Manager)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

  12. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  13. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  14. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  15. 'Audit Society' in action: a study of audit and performance management in the National Health Service in Scotland 

    E-Print Network [OSTI]

    Cumming, Alison Jane

    2014-07-02T23:59:59.000Z

    This thesis seeks to understand the role of audit in managing the performance of the NHS in Scotland and the impact which the relationship between performance and audit has upon key actors, including NHS organisations ...

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  18. Keys to Profitable Texas Sweet Potato Production, Storage and Marketing.

    E-Print Network [OSTI]

    Roberts, Roland E.; Longbrake, Thomas D.; Cotner, Sam; Menges, Terry; McCraw, B. Dean; Paterson, Donald R.

    1979-01-01T23:59:59.000Z

    consumption. Site Selection and Soil Management A sandy loam, fine sandy loam or loamy fine sand, at least 18 to 24 inches deep, underlaid by a clay loam or sandy clay loam is best suited for sweet potato production. Sandy soils produce smooth skinned... roots of desirable shape. Clay loams and silt loams are un suitable. Use crop rotations which allow at least 3 years before sweet potatoes are planted again on the same land. Some growers are now coming back every other year using land where winter...

  19. Other utilities, not IPPs key concern for electric executives

    SciTech Connect (OSTI)

    O'Driscoll, M.

    1994-01-12T23:59:59.000Z

    The evolving competitive electric utility world is making executives more cautious and focused on their core businesses at the expense of high-profile issues like international investment, global warming, demand side management and electric and magnetic fields, a new survey shows. The 1994 Electric Utility Outlook, conducted by the Washington International Energy Group, also shows growing concern about utility-on-utility competition and a decline of the independent power producer threat, a growing but grudging acknowledgement of retail wheeling and increasing discomfort with nuclear power.

  20. Small Businesses Key in Hydropower Tech Advancement | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCO OverviewRepositoryManagement | DepartmentImpact of Teaming

  1. Midstream Infrastructure Improvements Key to Realizing Full Potential of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of the National 93-4 AcquisitionO 231.1BDomestic Natural Gas |

  2. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01T23:59:59.000Z

    DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

  3. Hanford Site environmental management specification

    SciTech Connect (OSTI)

    Grygiel, M.L.

    1998-06-10T23:59:59.000Z

    The US Department of Energy, Richland Operations Office (RL) uses this Hanford Site Environmental Management Specification (Specification) to document top-level mission requirements and planning assumptions for the prime contractors involved in Hanford Site cleanup and infrastructure activities under the responsibility of the US Department of Energy, Office of Environmental Management. This Specification describes at a top level the activities, facilities, and infrastructure necessary to accomplish the cleanup of the Hanford Site and assigns this scope to Site contractors and their respective projects. This Specification also references the key National Environmental Policy Act of 1969 (NEPA), Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), and safety documentation necessary to accurately describe the cleanup at a summary level. The information contained in this document reflects RL`s application of values, priorities, and critical success factors expressed by those involved with and affected by the Hanford Site project. The prime contractors and their projects develop complete baselines and work plans to implement this Specification. These lower-level documents and the data that support them, together with this Specification, represent the full set of requirements applicable to the contractors and their projects. Figure 1-1 shows the relationship of this Specification to the other basic Site documents. Similarly, the documents, orders, and laws referenced in this specification represent only the most salient sources of requirements. Current and contractual reference data contain a complete set of source documents.

  4. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  5. Benefits and costs of load management: a technical assistance and resource material handbook

    SciTech Connect (OSTI)

    Mueller, Ronald; Ackerman, Gary; Lau, Ronald; Patmore, James; Ma, Fred; Sechan, Neil; Schoor, Alan; Simon, Lois; Bleiweis, Bruce; Lloyd, Kevin

    1980-06-01T23:59:59.000Z

    This handbook will assist state regulatory authorities and electric utilities in complying with the Load Management Standard of the Public Utility Regulatory Policies Act of 1978. The handbook has two major sections. The first discusses load-management techniques in terms of equipment, customer applications, combinations of techniques, etc. Key steps for evaluating the costs and benefits of load management options also are presented. These steps are intended to sequentially eliminate ineffective load-management options as the cost-benefit calculation becomes more detailed. The second section includes up-to-date information on available load-management technologies, models for utility costing, load-management data transfer, prescreening of load-management options, and the load-management literature.

  6. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01T23:59:59.000Z

    Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

  7. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  8. Inter-organizational fault management: Functional and organizational core aspects of management architectures

    E-Print Network [OSTI]

    Marcu, Patricia; 10.5121/ijcnc.2011.3107

    2011-01-01T23:59:59.000Z

    Outsourcing -- successful, and sometimes painful -- has become one of the hottest topics in IT service management discussions over the past decade. IT services are outsourced to external service provider in order to reduce the effort required for and overhead of delivering these services within the own organization. More recently also IT services providers themselves started to either outsource service parts or to deliver those services in a non-hierarchical cooperation with other providers. Splitting a service into several service parts is a non-trivial task as they have to be implemented, operated, and maintained by different providers. One key aspect of such inter-organizational cooperation is fault management, because it is crucial to locate and solve problems, which reduce the quality of service, quickly and reliably. In this article we present the results of a thorough use case based requirements analysis for an architecture for inter-organizational fault management (ioFMA). Furthermore, a concept of th...

  9. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

  10. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  11. Portfolio Manager Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portfolio Manager 3 | TAP Webcast eere.energy.gov What is Portfolio Manager? Free, web-based tool for benchmarking existing buildings Measure and track the energy use of...

  12. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18T23:59:59.000Z

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

  13. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  14. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  15. Computerized Maintenance Management Systems

    Broader source: Energy.gov [DOE]

    Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

  16. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

  17. Personalized diabetes management

    E-Print Network [OSTI]

    O'Hair, Allison Kelly

    2013-01-01T23:59:59.000Z

    In this thesis, we present a system to make personalized lifestyle and health decisions for diabetes management, as well as for general health and diet management. In particular, we address the following components of the ...

  18. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  19. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  20. Benchmarking Corporate Energy Management

    E-Print Network [OSTI]

    Norland, D. L.

    BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

  1. Extending the Horizons: Environmental Environmental Excellence as Key to Improving Operations.

    E-Print Network [OSTI]

    Corbett, C. J.; Klassen, R. D.

    2006-01-01T23:59:59.000Z

    line. Environmental Quality Management, 10(4) 1-12. th1998. The effects of total quality management on corporateEnvironmental Quality Management. Winter. 1-10. Evans,

  2. Extending the Horizons: Environmental Environmental Excellence as Key to Improving Operations.

    E-Print Network [OSTI]

    Corbett, C. J.; Klassen, R. D.

    2006-01-01T23:59:59.000Z

    of Purchasing and Materials Management. 33(3) 10-17. Newman,of Purchasing and Materials Management. 34(2) 2-11. Wolf,defined as the materials management activities needed to

  3. Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE

    E-Print Network [OSTI]

    , and destruction. BMD oversees WFMO's personal property management, Freedom of Information Act responses, Entry, organizing, and administering comprehensive human resources management programs in collaboration wMay 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE

  4. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  5. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  6. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  7. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  8. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  9. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

  10. Risk Management Strategy Introduction

    E-Print Network [OSTI]

    Edinburgh, University of

    Risk Management Strategy Introduction 1. The risk of adverse consequences is inherent in all activity. Dynamic enterprise will inevitably create new risks. Risk management is about ensuring that all significant relevant risks are understood and prioritised as part of normal management

  11. Forest Resources and Management

    E-Print Network [OSTI]

    Forest Resources and Management Centre for The Centre for Forest Resources and Management aims the forest resource. Our aim is that British forests ­ from their creation to maturity and regeneration-energy development, forest resource forecasting, genetic improvement, woodland regeneration and creation, management

  12. Environmental Management at

    E-Print Network [OSTI]

    : ANUgreen for the HotRot Organic Recycling Project Sustainable Transport Category Winner: LEAD Development Themes: 1. Community Engagement 2. Energy and Greenhouse Management 3. Water Management 4. Recycling and Waste Management 5. Transport 6. Pollution Prevention and Environmental Risk 7. Biodiversity The Future

  13. Medical Management Treatment Manual

    E-Print Network [OSTI]

    Bezrukov, Sergey M.

    Medical Management Treatment Manual: A Clinical Guide for Researchers and Clinicians) This manual is an adaptation of: Medical Management Treatment Manual: A Clinical Research Guide for Medically, Maryland #12;Message to the Users of this Medical Management (MM) Manual from the Editors Background

  14. FRESH THINKING FOR MANAGEMENT

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    FOR TECHNOLOGY MANAGEMENT Technology Acceptance in Organizations: What Can We Do to Improve it? by Patricia in organizations is thus an important topic in both management research and management practice. Technology choice of a mobile phone. In organizations, there are two steps in technology adoption. First

  15. Records Management Administration & Finance

    E-Print Network [OSTI]

    Wu, Shin-Tson

    SUBJECT: Records Management Administration & Finance Number: 4010 Effective Date: 02 applies to the retention and disposal of public records. The university records management liaison officer for Administration and Finance,will provide liaison and assistance in allphases of the records management process

  16. Database Management Certificate Program

    E-Print Network [OSTI]

    Rose, Michael R.

    Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

  17. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31T23:59:59.000Z

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

  18. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  19. Risk & QualityRisk & Quality ManagementManagement

    E-Print Network [OSTI]

    liability."" [Balsaono RR, Brown[Balsaono RR, Brown MK, Risk ManagementMK, Risk Management inin Legal

  20. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  1. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  2. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  3. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  4. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  5. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  6. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  7. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  8. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  9. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  10. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  11. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  12. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  13. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01T23:59:59.000Z

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  14. Managing power system security and optimization

    SciTech Connect (OSTI)

    O'Grady, M.J. (Potomac Electric Power Co., Washington, DC (United States)); Briggs, W.T.; Stadlin, W.O.

    1994-10-01T23:59:59.000Z

    Power system control objectives of energy management systems (EMSs) are well defined and understood: reliability, security, and optimization. However, the approaches to achieving these objectives have often resulted in disjointed solutions and poor acceptance by system operators. This article describes how the new PEPCO EMS provides unique system-wide (generation, transmission, distribution) security and optimization strategies via a coordinated suite of real-time closed-loop control functions. System operators played a key role in defining the application features and user interfaces, ensuring correct operating practices.

  15. CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S

    E-Print Network [OSTI]

    Powers, Robert

    CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012'S ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012-2017 Report Outline Building a Big: Student Recruitment Initiatives Sharing Our Story of Quality Improving the Academic Profile and Student

  16. CSREES Nutrient Management Working Meeting

    E-Print Network [OSTI]

    planning process ­ Nutrient management training ­ P-Indexes and tools developed ­ Educational materials #12Welcome CSREES Nutrient Management Working Meeting May 4 and 5, 2004 Atlanta, GA #12;University Objectives · Information Sharing Among States ­ Nutrient management regulations ­ Nutrient management

  17. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03T23:59:59.000Z

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  18. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  19. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  20. Management of Decommissioning on a Multi-Facility Site

    SciTech Connect (OSTI)

    Laraia, Michele; McIntyre, Peter; Visagie, Abrie [IAEA, Vienna and NECSA (South Africa)

    2008-01-15T23:59:59.000Z

    The management of the decommissioning of multi-facility sites may be inadequate or inappropriate if based on approaches and strategies developed for sites consisting of only a single facility. The varied nature of activities undertaken, their interfaces and their interdependencies are likely to complicate the management of decommissioning. These issues can be exacerbated where some facilities are entering the decommissioning phase while others are still operational or even new facilities are being built. Multi-facility sites are not uncommon worldwide but perhaps insufficient attention has been paid to optimizing the overall site decommissioning in the context of the entire life cycle of facilities. Decommissioning management arrangements need to be established taking a view across the whole site. A site-wide decommissioning management system is required. This should include a project evaluation and approval process and specific arrangements to manage identified interfaces and interdependencies. A group should be created to manage decommissioning across the site, ensuring adequate and consistent practices in accordance with the management system. Decommissioning management should be aimed at the entire life cycle of facilities. In the case of multi facility sites, the process becomes more complex and decommissioning management arrangements need to be established with a view to the whole site. A site decommissioning management system, a group that is responsible for decommissioning on site, a site project evaluation and approval process and specific arrangements to manage the identified interfaces are key areas of a site decommissioning management structure that need to be addressed to ensure adequate and consistent decommissioning practices. A decommissioning strategy based on single facilities in a sequential manner is deemed inadequate.